Risk-based authentication helps you in achieving the following goals:
Reduce fraud and the risk of improper access
Enforce different levels of authentication depending on factors such as user activity and geolocation, and calculated risk score
Improve user experience. Users need to provide additional details for authentication only when the associated risk prevails
Access control in federated setups
Consider a scenario where a company named Company1 wants to protect its payroll application. Using Risk-based authentication, Company1 can achieve the following actions on the payroll application:
Restrict access to its contractual employees.
Grant access to permanent employees during the business hours between 9 a.m. to 5 p.m. After business hours, all employees must specify a one-time password in addition to login credentials.
Grant special privileges to employees who work in the Finance department. For example, these employees do not need to specify an OTP even if they log in beyond business hours.
Grant access to the Self-Service tool along with the payroll application when contractual employees use Intranet to log in.
Determine actions based on the priority of rule conditions. For example, type of employment is the most important criterion to grant access followed by the location of the user, and then the time of the login attempt.
Grant access without any additional authentication if the user has successfully logged in within one month.
Restrict access when an employee tries to log in from a specific geographical location.
Grant or deny access based on the version of the web browser used for the login attempt.
Deny access to any login attempt that originates from a handheld device.