O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Adaptive Risk Authentication

In the last chapter we covered two factor authentication as a way of providing a higher level of authentication to our users. However, we shouldn’t always burden users with additional authentication if it isn’t needed. OpenAM can determine the risk of particular access requests and then provide higher or lower levels of authentication using Adaptive Risk authentication.

Understanding Adaptive Risk authentication

Adaptive Risk authentication allows OpenAM to determine the risk of a particular authentication, and decide whether additional authentication steps are required due to the risk.

A popular example is banking. If a user has logged in for the first time using a valid username and password then that’s fine. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required