Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to [email protected]

Search Results:

×

Risk Based 
Authentication

Enhance the authentication process based on the Risk Profile of the user for better access management.

Book a Demo Pricing
Risk-Based Authentication





What is Risk-Based Authentication (RBA)?

Risk-based authentication is a security mechanism that uses contextual data to determine the level of risk associated with a particular authentication request. It is a form of adaptive authentication that enables organizations to assess the potential risk of a given authentication attempt based on factors such as the user's location, device, behavior, and past history.

The basic idea behind risk-based authentication is to dynamically adjust the level of security required for a particular authentication request based on the perceived level of risk associated with that request. For example, a high-risk authentication request, such as an attempted login from a device located in a foreign country or using an unknown browser, might require additional security measures such as multi-factor authentication, while a low-risk authentication request might only require a simple username and password.

By using risk-based authentication , organizations can reduce the risk of unauthorized access to their systems while minimizing the inconvenience to legitimate users. This approach can also help organizations meet regulatory requirements for stronger authentication measures without imposing unnecessary burdens on users.

RBA’s main metric is risk scores, which are used to calculate risk levels which are as follows:


High Risk


The user will either be refused access or will be asked to utilize extra authentication methods.

Medium Risk


Challenge user for extra authentication method to confirm their identity.

Low Risk


Allow access to the user with static username/password if their risk score is low.



RBA Solution
Pricing


Request a Quote

Adaptive MFA

List Price


$1*

per user per month

*Please contact us to get volume discounts for higher user tiers.

Risk-Based Authentication Factors



Risk-Based Authentication through configuring IP Restriction



IP Restriction


When using IP Restriction as risk-based authentication, IP addresses are configured and enlisted by the admin and access is either allowed or denied accordingly. When a user attempts to log into one of the risk-based authentication-enabled apps, his IP address is checked against the preset IP list, and appropriate action is taken (i.e. Allow, Deny or Challenge).




Risk-Based Authentication based on Geo location



Location Restriction


In Location-based Risk-Based Authentication restriction, the admin shortlists and configures a list of Geo-locations. Based on the location restrictions set by the admin, end-users are either allowed or denied the login. When a user tries to login with Risk-Based Authentication enabled, his location attributes such as are verified against the location list configured by the admin, and based on this user will be either allowed, challenged, or denied access to resources.




Risk-Based Authentication Device Restriction - limit device count



Device Restriction


Using Device-based Risk-Based Authentication, the admin allows end-users to add a set number of trusted devices (A device refers to a Browser Session). A registered device allows a person to log in without restriction once it has been registered. An administrator will challenge or deny a person's registration if their registered device exceeds their total limit.




Risk-Based Authentication considering Time Restriction



Time Restriction


Risk-Based Authentication also includes a time restriction, which starts with an admin setting up a time zone with a Start and End Time. Users are permitted, refused, or challenged based on the defined timezone and policies. As soon as an end-user attempts to log in with risk-based authentication enabled, his time zone parameters, such as time zone and system time, are compared to the list defined by the admin, and the user is either granted access, rejected access, or challenged access, depending on his configuration.




Benefits of using Risk-Based Authentication (RBA)

Increased Security

Risk-based authentication provides a more secure method of authentication by evaluating the level of risk associated with each login attempt and adjusting the level of authentication required accordingly. This helps to prevent unauthorized access to systems and sensitive data.

Flexible Setup

With a miniOrange Risk-Based Authentication dynamic setup, you can easily configure any of the restriction methods on any of your devices.

Reduce Friction

Traditional authentication methods can be inconvenient for users, particularly when they are required to perform multiple authentication steps. Risk-based authentication can minimize the required authentication steps, reducing user friction and improving the user experience.

Cost-Effective

Risk-based authentication can be more cost-effective than traditional authentication methods, particularly when used in conjunction with cloud-based authentication services. This can be particularly beneficial for smaller organizations that may not have the resources to implement more complex authentication measures.

Fraud Prevention

With notifications and several verification mechanisms, an RBA solution can help decrease online fraud and improper access.

Improved user Trust

By tailoring the authentication process to the level of risk associated with each login attempt, risk-based authentication can provide a more seamless and convenient user experience. This can help to increase user satisfaction and reduce the likelihood of users circumventing security measures.



miniOrange Risk-Based Authentication Applications




Google workspace IP restriction

G Suite

Office 365 IP Restriction

Office 365

Thinkific IP restriction

Thinkific

Zendesk IP restriction

Zendesk

Zoho IP restriction

Zoho


Slack IP restriction

Slack

Salesforce IP restriction

Salesforce

Freshdesk IP restriction

Freshdesk

Dropbox IP restriction

Dropbox

Atlassian Jira Cloud IP restriction

Atlassian Jira Cloud




Risk-Based Authentication designated features





Risk-based Authentication Features

Improved Security with MFA

Users are presented with appropriate Multi-Factor Authentication (MFA) challenges based on risk profile. This forces the user to authenticate using the configured MFA method with enhanced security.

Platform Independent

Any device that supports a Web browser can use Risk-Based Adaptive MFA. In addition, we also provide the same functionality via APIs.

Set granular access security policies

Admin can track all the user activities, manage access and add security policies for users on a granular level.

Real-Time User Access Restrictions

Eliminates the need for frequent authentication through a fixed approach. For the calculation of the threats and decisions, the session attributes of the user are fetched during runtime.

Dynamic Risk Assessments

User attributes like IP address, Device ID, location, and time of access are collected at runtime, and the precise decision result is calculated with the risk-based MFA prompt.

Group and Role-based Assignment

Users can be grouped together and given access to specific applications according to their role based on different access policies.



Future of workplace security by miniOrange

Two-factor Authentication

Two-factor authentication is a security measure that requires two forms of identification to access an account or system.

Multi-factor Authentication

An advanced level of authentication with two or more levels of security factors such as OTP over SMS, TOTP tokens, OTP over Email, hardware tokens etc.

Adaptive Authentication

It provides an additional layer of MFA security based on risk and access provided by the security admin to control user access.



Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products

   '

x

*
*


*

*






 Thank you for your response. We will get back to you soon.

Please enter you work email-id