These steps are designed to help you add to an existing authentication policy. For general information about configuring authentication policies, see Policies in the PingFederate documentation.
  1. Sign on to the PingFederate administrative console.
  2. On the Identity Provider screen, under Authentication Policies, click Policies.
  3. Open an existing authentication policy, or create a new one. See Defining authentication policies in the PingFederate documentation.
  4. In the Policy area, in the Select list, select an iovation IdP Adapter instance.
  5. Map the user ID into the iovation IdP Adapter instance.
    1. Under the iovation IdP Adapter instance, click Options.
    2. On the Options dialog, from the Source list, select a previous authentication source that collects the user ID.
    3. From the Attribute list, select the user ID. Click Done.
  6. Define policy paths based on risk results.
    1. Under the iovation IdP Adapter instance, click Rules.
    2. On the Rules dialog, in the Attribute Name list, select transactionRiskResult.
    3. In the Condition list, select equal to.
    4. In the Value field, enter allow, review, or deny.
    5. In the Result field, enter a name. This appears as a new policy path that branches from the authentication source.
    6. If you want to add more authentication paths, click Add and repeat steps a-d.
    7. Clear the Default to success check box.
    8. Click Done.
  7. Configure each of the authentication paths, including Fail, Success, and the paths that you defined in the Rules dialog.
    Note: In case the iovation API is unreachable or returns an error, we recommend that you allow users continue to sign on by satisfying stricter authentication requirements.

    You can do this in your authentication policy by setting the Fail outcome of the iovation IdP Adapter instance to point to a second authentication factor, as shown in the example below.

    Alternately, you can do this in your iovation IdP Adapter instance by setting the Failure mode as shown in Configuring an adapter instance.

  8. Click Done.
  9. In the Policies window, click Save.