View Risk-Based Authentication Settings for a User
You can view the risk-based authentication (RBA) settings for a user to do any of the following:
View whether the user is currently enabled for RBA.
View the number of devices in the user's device history.
Delete the user's device history.
View the identity confirmation methods that are allowed by the RBA policy, and determine whether the user has configured each method.
View silent collection details for the user, including whether silent collection is allowed by the RBA policy, whether the silent period has started, and how many days are remaining in the silent collection period.
Procedure
In the Security Console, click Identity > Users > Manage Existing.
Use the search field to find the user. Some fields are case sensitive.
Click the user that you want to view, and select Risk-Based Authentication.
Related Articles
Device Settings for Risk-Based Authentication 8Number of Views Methods for Enabling Users for Risk-Based Authentication 6Number of Views Search Users Based on Risk-Based Authentication Settings 2Number of Views Configure Device History Settings for a Risk-Based Authentication Policy 5Number of Views Risk-Based Authentication 24Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor…