5.8.4 Configuring User History

User history details for a risk policy provides the flexibility to segregate the history details as per your requirement. Consider a situation where you have configured the following two risk policies:

  • A risk policy to assess authentication requests from internal users in an organization.

  • A risk policy to assess authentication requests from users external to the organization.

You can enable recording user history for the following risk rules:

  • Custom Rule

  • Device Fingerprint Rule

  • Geolocation Rule

  • IP Address Rule

  • User Time of Login Rule

Configuring user history involves the following steps:

  1. Configuring an external database. (Configuring an External Database to Store User History)

  2. Enabling user history. (Enabling User History)

  3. Enabling user history while configuring a rule. (Configuring Rules)

  4. Configuring user history for a risk policy. (Creating a Risk-based Authentication Class:)