User history details for a risk policy provides the flexibility to segregate the history details as per your requirement. Consider a situation where you have configured the following two risk policies:
A risk policy to assess authentication requests from internal users in an organization.
A risk policy to assess authentication requests from users external to the organization.
You can enable recording user history for the following risk rules:
Custom Rule
Device Fingerprint Rule
Geolocation Rule
IP Address Rule
User Time of Login Rule
Configuring user history involves the following steps:
Configuring an external database. (Configuring an External Database to Store User History)
Enabling user history. (Enabling User History)
Enabling user history while configuring a rule. (Configuring Rules)
Configuring user history for a risk policy. (Creating a Risk-based Authentication Class:)