4.5.8 Enabling Auditing for Risk-Based Authentication Events

For information about risk-based authentication events and how to enable these, see Section 21.4, Enabling Identity Server Audit Events.