Authentication strength configuration task summary
To configure authentication strength levels, complete the instructions in each of the following sections:
- Establishing an authentication strength policy
- Specify authentication levels
- Authentication strength login form
- Create a protected object policy
- Specify network-based access restrictions
- Attaching a protected object policy to a protected resource
- Enforcing user identity match across authentication levels
- Controlling the login response for unauthenticated users
- Stepping up authentication at higher levels
Parent topic: Authentication strength policy (step-up)