Overview of the Intelligent Adaptive Authentication Integration
  • 28 Oct 2024
  • 1 Minute à lire
  • Sombre
    Lumière

Overview of the Intelligent Adaptive Authentication Integration

  • Sombre
    Lumière

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

With Intelligent Adaptive Authentication you can integrate user registration, authenticator activation, and flows with remote authentication performed by a trusted device. Such a trusted device is a mobile application with an integration of the OneSpan Mobile Security Suite Orchestration SDK.

Preparing the integration of Intelligent Adaptive Authentication

Integration of Intelligent Adaptive Authentication with OneSpan Mobile Security Suite Orchestration SDK

To prepare the integration of Intelligent Adaptive Authentication into your solution, proceed with the following steps:

Integration steps

To integrate Intelligent Adaptive Authentication step-by-step

  1. Integrate the OneSpan CDDC JavaScript into the login page of your web application.

  2. Implement the Intelligent Adaptive Authentication user registration in your web application to start the authenticator provisioning handled by the Orchestration SDK.

  3. Register your application for notification in the OneSpan Community Portal and integrate the Orchestration SDK in your mobile application.

  4. Implement Intelligent Adaptive Authentication login and transaction in your web application to support intelligent adaptive authentication.

    When implementing Intelligent Adaptive Authentication, ensure to select the correct endpoints and request body values from the OneSpan Trusted Identity platform API:

Changing Risk Management component rules

When you have set up your sandbox environment and integrated all necessary components, you can log on to the Risk Management component and browse to the default rules provided for Intelligent Adaptive Authentication.

By defining rules and rule criteria in the Risk Management component you centrally define criteria to analyze risks and set the appropriate action you want to perform (reject a login, challenge the user with biometric authentication etc.). To access the Adaptive Authentication rules, in the Risk Management component navigate to DESIGN RULES & ACTIONS > Rule Management > Rules and configure the rules as required.

For a detailed description of rules in the Risk Management component and how to change them, refer to the Risk Analytics Admin Guides.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle