Step-up authentication configuration

To use  Step-Up authentication, the login application needs the following information (configuration):

  • Required Roles: roles required to access a target application.
  • Step-Up Rules: rules defining by what authentication means a user can acquire what role.