Designing and applying risk-based Access Control
In the first section of this chapter we will discuss both the design required information for applying risk based Access Control. The main actor in this story is your ADFS and WAP infrastructure, which will help you to integrate such a solution in your environment. Obviously, there are many other technologies in the field, but we want to focus on the native components that are already in place with the use of an identity bridge. This will give you the opportunity to provide an efficient and flexible solution for providing Risk-Based Access Control. We will divide this section into the following topics to provide a better understanding:
Managing device registration
Managing authentication and authorization
The magic of claims rules for application access
The main focus will be on how to support a risk matrix, like the following simple example:
Note
The terms of the matrix (HBI, MBI, and LBI) define the business impact:
HBI stands for High Business...