RSA Adaptive Authentication (On-Premise) 7.3 Operations Guide
Total Page:16
File Type:pdf, Size:1020Kb
RSA® Adaptive Authentication (On-Premise) 7.3 Operations Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks RSA, the RSA Logo, eFraudNetwork and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright © 2016–2017 EMC Corporation. All Rights Reserved. Published in the USA. March 2016 Revised: August 2016, January 2017, August 2017 RSA Adaptive Authentication (On-Premise) 7.3 Operations Guide Contents Preface..................................................................................................................................11 About This Guide...............................................................................................................11 RSA Adaptive Authentication (On-Premise) Documentation...........................................11 Support and Service .......................................................................................................... 12 Before You Call Customer Support........................................................................... 12 Chapter 1: Administration Console................................................................... 13 Overview of the Administration Console ......................................................................... 13 Configuration Flow in the Administration Console .................................................. 15 Log On to the Administration Console...................................................................... 15 Organization-Sensitive Parameters............................................................................ 16 Import Configuration Parameters .............................................................................. 16 Export Configuration Parameters .............................................................................. 17 Publish the Configuration Changes ........................................................................... 18 Application Parameters..................................................................................................... 18 Authentication Methods Parameters ................................................................................. 20 Encryption Prerequisite for the Transaction Signing Authentication Method .......... 35 Best Practices for Challenge Questions ............................................................................ 35 Challenge Questions for Individual Online Users ............................................................ 35 Selecting Questions.................................................................................................... 36 Sample Questions ...................................................................................................... 38 Challenge Questions for Business Accounts .................................................................... 39 Selecting Questions for Business Accounts............................................................... 40 Sample Business Questions ....................................................................................... 40 Presentation of Questions.................................................................................................. 41 List of Questions........................................................................................................ 41 Number of Challenge Questions................................................................................ 41 Selecting Challenge Question.................................................................................... 42 Number of Retries Per Question................................................................................ 42 Adding or Retiring Questions.................................................................................... 42 Fuzzy Logic Comparators for Challenge Questions......................................................... 42 Comparators and When to Use Them........................................................................ 42 Back Office Applications Parameters............................................................................... 45 Billing Parameters.............................................................................................................48 Database Maintenance Tasks............................................................................................ 49 Device Management Parameters....................................................................................... 50 RSA eFraudNetwork Agent Parameters ........................................................................... 52 External Data Providers Parameters ................................................................................. 54 Monitoring and Alerts Parameters .................................................................................... 55 Risk Engine Parameters .................................................................................................... 56 Scheduled Tasks................................................................................................................64 Default Cron Expressions of Scheduled Tasks.......................................................... 67 Contents 3 RSA Adaptive Authentication (On-Premise) 7.3 Operations Guide Scheduler Parameter .................................................................................................. 68 Security Settings ............................................................................................................... 69 Localize the Administration Console................................................................................ 71 Administration Console Log Files .................................................................................... 71 Chapter 2: Scheduling RSA Adaptive Authentication Tasks............ 73 Overview of the Scheduler................................................................................................ 73 Scheduler Operation.......................................................................................................... 74 On-Demand Tasks in the Scheduler Console ............................................................ 74 Run a Task on Demand.............................................................................................. 75 Change the Timing of Scheduled Tasks .................................................................... 76 Activate and Deactivate Scheduled Tasks ................................................................. 77 Scheduler Logs.................................................................................................................. 77 Configure Billing Logs .............................................................................................. 78 Configure Authentication Plug-In Billing Logs ........................................................ 79 Database Maintenance Tasks............................................................................................ 79 Risk Engine Offline Tasks ................................................................................................ 81 Troubleshooting Offline Tasks .................................................................................. 82 Policy Refresh Process...................................................................................................... 82 Chapter 3: System Monitoring.............................................................................. 85 Monitoring and Alerts....................................................................................................... 85 Health Check Viewer.......................................................................................................