This section includes the following topics:
Section 8.7.1, Configuring Risk-based Authentication
Section 8.7.2, Configuring User History
Section 8.7.3, Configuring Geolocation Profiling
Section 8.7.4, Configuring NAT Settings
Section 8.7.5, Configuring an Authorization Policy to Protect a Resource
Section 8.7.6, Risk-Based Authentication: Sample Configuration
For more information about risk-based authentication, see Risk-based Authentication.