O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Adding adaptive risk to the authentication chain

Now we will add our Adaptive Risk module to the default Authentication Chain.

Adding adaptive risk to the authentication chain

On the Authentication tab, scroll down to Authentication Chaining and click on the link to your Authentication Chain. Mine is called ldapService.

Note

Do note that it is recommended to create a new authentication chain in production environments.

Adding adaptive risk to the authentication chain

In the preceding screenshot the first authentication method is the DataStore which will ask the user for a username and password. This is a required authentication method, which means ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required