5.5.7
Configuring Risk-based Authentication
For information about configuring risk-based authentication, see
Section 8.7, Risk-based Policies
.