Access policies
Risk Tags are only "facts" and as such neither positive nor negative. Thus, whether a role can be acquired because of a certain Risk Tag, or acquiring a role is prohibited by a Risk Tag, has to be specified using Access Policies.
Access Policies extend the rules governing the role acquirement process by also taking of Risk Tags into consideration. That is, a role may be acquired not only by completing an authentication step, but also by having a suitable risk/role combination.
For instance, if a role "restricted-access" is required, there might be several ways to get there:
- Role "administrator" + Risk Tag "Access from internal network"
An administrator is logging in from an internal network, therefore no additional authentication step is required - Role "administrator" + Risk Tag "typical geolocation" +Risk Tag "typical User-Agent"
An administrator is logging in from a known location and with a known browser which he has both used multiple times before to perform the Step-Up, therefore no additional authentication step is required - Role "administrator"+Action "answer second factor"
An administrator is logging in and no relaxation based on reduced risk is applicable. The administrator must present a second factor. (Traditional Step-Up scenario)
Access Policies can either be specified system-wide or individually for specific target applications.