Section 10.7.1, Configuring Risk-based Authentication
Section 10.7.2, Configuring User History
Section 10.7.3, Configuring Geolocation Profiling
Section 10.7.4, Configuring Behavioral Analytics
Section 10.7.5, Configuring NAT Settings
Section 10.7.6, Configuring an Authorization Policy to Protect a Resource
Section 10.7.7, Risk-Based Authentication: Sample Configuration
For more information about risk-based authentication, see Risk-based Authentication.