iovation Integration Kit

Adding risk results to your authentication policy

By modifying your authentication policy to include risk results, you can dynamically change authentication requirements for higher-risk users.

About this task

These steps are designed to help you add to an existing authentication policy. For general information about configuring authentication policies, see Policies in the PingFederate documentation.

Steps

  1. Sign on to the PingFederate administrative console.

  2. On the Identity Provider screen, under Authentication Policies, click Policies.

  3. Open an existing authentication policy, or create a new one.

    See Defining authentication policies in the PingFederate documentation.

  4. In the Policy area, in the Select list, select an iovation IdP Adapter instance.

    Screen capture of example adapter instance selection options.
  5. Map the user ID into the iovation IdP Adapter instance.

    Screen capture of the Incoming User ID section with the HTML form adapter as the source and username as the attribute.
    1. Under the iovation IdP Adapter instance, click Options.

    2. On the Options dialog, from the Source list, select a previous authentication source that collects the user ID.

    3. From the Attribute list, select the user ID. Click Done.

  6. Define policy paths based on risk results.

    Screen capture of the Rules section that shows three policy paths with transactionRiskResults as the Attribute Name.
    1. Under the iovation IdP Adapter instance, click Rules.

    2. On the Rules dialog, in the Attribute Name list, select transactionRiskResult.

    3. In the Condition list, select equal to.

    4. In the Value field, enter allow, review, or deny.

    5. In the Result field, enter a name. This appears as a new policy path that branches from the authentication source.

    6. If you want to add more authentication paths, click Add and repeat steps a-d.

    7. Clear the Default to success check box.

    8. Click Done.

  7. Configure each of the authentication paths, including Fail, Success, and the paths that you defined in the Rules dialog.

    In case the iovation API is unreachable or returns an error, we recommend that you allow users continue to sign on by satisfying stricter authentication requirements.

    You can do this in your authentication policy by setting the Fail outcome of the iovation IdP Adapter instance to point to a second authentication factor, as shown in the example below.

    Alternately, you can do this in your iovation IdP Adapter instance by setting the Failure mode as shown in Configuring an adapter instance.

    Screen capture showing authentication paths for Fail, Allow, and Review, the three policy paths configured based on risk results in step 6.
  8. Click Done.

  9. In the Policies window, click Save.