5.5.8 Enabling Auditing for Risk-Based Authentication Events

For information about risk-based authentication events and how to enable these, see Section 20.2, Enabling Identity Server Audit Events.