5.5.7 Configuring Risk-based Authentication

For information about configuring risk-based authentication, see Section 8.7, Risk-based Policies.