Skip to main content

RISK BITS

Risk Bits plays a fundamental role in Device Security. These vital components are actively involved in assessing the risk level of the device in use, thereby serving as a defense mechanism to preserve data integrity and confidentiality.

Risk Bits is configured in Realm Tab for device security, APIs manage and access this risk data, and the authenticator uses this information to determine access for the user based on the assessed risk.

Components involved in Riskbits

  • Risk Bits configuration Tab
  • Risk Bits APIs
  • KOBIL Device Risk Evaluator Authenticator

RiskBits Configuration Tab

To access Risk Bits, follow these detailed steps to access and configure them within the KOBIL IAM system:

  • Navigate to Realm Settings
  • Select Kobil
  • Click on Risk Bits
  • Enable the option to execute Risk Bits in the flow.

Execute riskbits

Using Risk Bits APIs explained below, Risk Bits can be created, edited, updated and deleted within the tabular box displayed below.

Risk Bits tabular

ConfigurationDescription
Rating levelThis parameter assesses the overall risk level of the device.
ScoreA qualitative measure that quantifies the degree of risk, providing a numerical value indicating how risky a device is. It also determines whether to allow or deny access to the device.
RiskThis parameter rates the identified risks. It provides a general overview of how significant the risks are, helping to prioritize which devices need attention.
Risk Details AndroidThis field contains specific risk names and details for devices running the Android operating system.
Risk Details iOSThis field contains specific risk names and details for devices running the iOS operating system.
OperationDevice execution is determined by the risk operation. For instance, the device has a risk level corresponding to Jbreak [1] (400) and is an iOS device. Based on this condition, the device is granted permission to execute a particular flow or task.
note

Each device is assigned a risk score based on various factors, including its security settings, operating system, and detected vulnerabilities. The ability to adjust the acceptable level of risk associated with a particular device platform

Risk Bits API

  • Risk Bits APIs manage and evaluate device risk levels by providing functions to create, modify, and verify risk assessments.(For detailed explanations of the APIs, please refer to the Risk Bits documentation.)

  • An access token with the realm-admin role is required to access the API.

note
  • API requests must be made over HTTPS. Requests made over plain HTTP will not be successful.

KOBIL Device Risk Evaluator Authenticator

  • The authenticator evaluates the device's risk and decides whether to grant or deny access based on the predefined criteria and security measures setup in the Realm settings. For detailed explanation, please refer to the KOBIL Device Risk Evaluator.

Execution Flow

  1. The KOBIL Device Risk Evaluator can be executed after the One Factor Authentication (1FA) authenticators to verify the device's risk. For instance, KOBIL Username Password Form authenticator is used to identify the user.
  2. In the KOBIL Device Risk Evaluator, device details along with risk information are obtained via the AST client management service.
  3. The risk value of the device will be evaluated against the configured value in RealmSettings -> KOBIL -> Risk Bits.
  4. If the Operation specified for the risk is HIGH_RISK or MEDIUM, an error screen will be displayed.
  5. If the Operation specified for the risk is OK, the user will be authenticated on that device.
note
  • If the KOBIL AST Login is executed before the flow, it will provide the device details along with risk information, allowing you to skip the next authenticator.

Interdependencies between above components

KOBIL Risk and Policy Evaluator