Skip to main content

KOBIL Device Risk Evaluator

KOBIL Device Risk Evaluator

The main execution of this authenticator is to verify the risk linked to the device and decides whether to grant or deny access.

Type

ProtocolOpenID Connect 1.0
HTTP methodGET
TypeBrowser Flow
EndpointAuthorization Endpoint
Flow SupportedAuthorization code flow
Implicit flow
Hybrid flow
ResponseID Token, Access Token
Response Modequery, form_post, fragment

How to configure

To configure the authenticator, follow these steps

  1. Select the Settings button
  2. Click Config.

Choose the actions you want to proceed with and enter the necessary configuration data. By following these steps, you will be able to successfully configure the authenticator.

KOBIL Device Risk Evaluator

Execution Flow

  1. The KOBIL Device Risk Evaluator can be executed after the 1FA authenticators to verify the risk of the device. For instance, KOBIL Username Password Form authenticator is used to identify the user.
  2. In the KOBIL Device Risk Evaluator, device details along with risk information are obtained via the AST client management service.
  3. The risk value of the device will be evaluated against the configured value in RealmSettings -> KOBIL -> Risk Bits.
  4. If the Operation specified for the risk is HIGH_RISK or MEDIUM, an error screen will be displayed.
  5. If the Operation specified for the risk is OK, the user will be authenticated on that device.
note
  • Our system supports only iOS and Android related risks. Please ensure you are using a compatible device for optimal performance.
KOBIL Risk and Policy Evaluator