all InfoSec news
Understanding Risk-Based Authentication (RBA)
Heimdal Security Blog heimdalsecurity.com
Risk-Based Authentication (also known as RBA, context-based authentication, or adaptive authentication) is a security mechanism that looks at the profile (IP address, device, behavior, time of access, history, and so on) of the agent asking for access to the system in order to assess the potential risk associated with that transaction. How Does It Work? […]
The post Understanding Risk-Based Authentication (RBA) appeared first on Heimdal Security Blog.
access access management adaptive authentication address agent asking authentication context device history ip address it work order profile risk risk-based authentication security system transaction understanding understanding risk work