Use Case:
Step-Up Authentication for a Privileged Access Management Application

Users needing access to Privileged Access Management application will be authenticated via Access Management and will be prompted with a step-up authentication challenge based on their risk score within the Fraud and Risk application.

Scenario

Privileged Access Management is configured as a protected application within the access management portal.

Actions

– Click for larger image –

Success Criteria

  1. End user is able to access Privileged Access Management application.
  2. End user is presented with an step-up authentication challenge if their risk scope exceeds corporate threshold parameters.

IDSA Security Controls

Risk-based Authentication

Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).

Risk-based Privileged Access Management

Step-up authentication based on risk posture.