Add red flags to risk-based access weights in IBM Security Access Manager
Automatically flag a transaction as risky, regardless of other factors
From the developerWorks archives
Date archived: December 19, 2016 | First published: November 19, 2013
Learn how configure IBM Security Access Manager to combine the new risk-based access algorithm, which uses weights for different factors, with a "red flag" approach that specifies that particular values are suspicious regardless of what other fields show.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.