Risk based authentication matches the authentication checks and requests with the level of perceived risk. If there is suspicious activity then the authentication requested increases.
Risk based authentication matches the authentication checks and requests with the level of perceived risk. If there is suspicious activity then the authentication requested increases.