Authentication strength configuration task summary

To configure authentication strength levels, complete the instructions in each of the following sections:

  1. Establishing an authentication strength policy
  2. Specify authentication levels
  3. Authentication strength login form
  4. Create a protected object policy
  5. Specify network-based access restrictions
  6. Attaching a protected object policy to a protected resource
  7. Enforcing user identity match across authentication levels
  8. Controlling the login response for unauthenticated users
  9. Stepping up authentication at higher levels

Parent topic: Authentication strength policy (step-up)