O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring the Adaptive Risk module

  1. Click on the link to the Adaptive Risk module you created.
    Configuring the Adaptive Risk module
    • Risk Threshold is the value required to be met or exceeded for authentication to fail. By default this is set to 1 which means only one of the checks ahead has to fail before the user needs to use another type of authentication.
    • Failed Authentications examines if the account has failed authentication in the past. This will only work if Account Lockouts are enabled. Invert Result means apply the opposite for the rule, which would mean trigger this check if the user had not had a failed authentication.
    • IP Address Range checks to see if the request came from ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required