The following are few example configuration to describe how you can use risk-based authentication:
Scenario: Calculating Risk Based on the Device Type
Scenario: Calculating Risk Based on the Location from Where an Access Request Originates
Scenario: Calculating Risk Based on the HTTP Header Value
Scenario: Evaluating the Grant Permissions using the Historical Access Data
Scenario: Calculating Risk Using Device Fingerprinting
Scenario: Determining an Improbable Travel Event