Secondary Authentication Workflow
When Risk Authentication generates the INCREASEAUTH advice, it transfers the control back to your application temporarily for secondary authentication. In this case, your application must implement some mechanism for performing additional authentication. For example, your application can display industry-standard security (or challenge) questions to the user (such as mother’s maiden name and date of birth) or make them undergo out-of-band phone authentication.
aa91
When Risk Authentication generates the INCREASEAUTH advice, it transfers the control back to your application temporarily for secondary authentication. In this case, your application must implement some mechanism for performing additional authentication. For example, your application can display industry-standard security (or challenge) questions to the user (such as mother’s maiden name and date of birth) or make them undergo out-of-band phone authentication.
After you determine whether the user authenticated successfully or not, you must forward the result to Risk Authentication, which uses this feedback to generate the final advice, update device information, create association information, and to store the feedback to use for risk analysis of future transactions.
The risk evaluation workflow in case of secondary authentication is as follows:
- User logs into your online application.Your system validates if the user exists in your system. If the user is not valid, then your application must take appropriate action.
- Your application collects information required by Risk Authentication.At this stage, your application collects information from the user’s system that will be used by Risk Authentication for analyzing risk:
- User system informationthat includes operating system, platform, browser information (such as browser language, HTTP header information), locale, and screen settings. Your application uses Risk Authentication's Utility Script called Riskminder-client.js to collect this information.
- Device informationthat includes Device ID, which is stored on the end user's device.
- Location informationthat includes IP address and Internet Service Provider related information.
- (Optionally, if you are using additional information)Additional Inputsthat are specific to custom rules or the channel selected.
- Your application calls Risk Authentication’s evaluateRisk() function.At this stage, your application must call the evaluateRisk() function in riskfortAPI. In this call, you must pass all the user and device information that you collected in the preceding step to Risk Authentication.
- Risk Authentication performs risk analysis for the user.If Risk Authentication flags the transaction as suspicious, it generates the INCREASEAUTH advice. This implies that extra credentials are required to help further authenticate the user.
- Your application performs secondary authentication.Based on the secondary authentication mechanism that you are using, your application displays appropriate pages to the user. For example, you can prompt the user to:
- Answer the security questions that they selected while enrolling with your application.
- Perform One-Time Password (OTP) authentication.
- Perform phone authentication.
- Your application calls Risk Authentication’s postEvaluate() function and forwards the result of the secondary authentication to Risk Authentication.At this stage, irrespective of the fact whether the user failed or cleared the secondary authentication, your applicationmustpass the result back to Risk Authentication. This information helps Risk Authentication build an up-to-date and accurate user history.To do so, your application must call the postEvaluate() function in riskfortAPI. In this call, you must pass the risk score and advice from the evaluateRisk() call, the result of secondary authentication, and any association name, if the user specified one.
- Risk Authentication generates the final advice.By using your application’s feedback regarding the secondary authentication, Risk Authentication generates the final advice.
- Risk Authentication updates the device information and creates the association information.Based on the result of the postEvaluate() call, Risk Authentication also updates the device attributes and creates the association information in the Risk Authentication database.
- Your application takes the appropriate action.Based on the result of the postEvaluate() call, your application either allows the user to continue with the transaction or denies them access to the protected resource.The following figure illustrates the secondary authentication risk evaluation workflow.
