Skip Headers
Oracle® Fusion Middleware Administrator's Guide for Oracle Adaptive Access Manager
Release 11g (11.1.1)

Part Number E14568-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  I  K  L  M  N  O  P  Q  R  S  T  U  V  W 

Numerics

11g architecture, 1.5
11g vs. 10g
feature comparison chart, Preface
key conceptual and terminology changes, Preface

A

abbreviation file, adding to, 6.10, F.8
access management integration, 1.4.3
Action and Alert Overrides, 12.2.4
Action and Score Overrides, 11.1.2
action instances
Action Priority, 15.9
creating, 15.9
edit, 15.18, 15.19
execution types, 15.8
search page, 15.7
Time to Live, 15.9
action override
adding or editing, 11.5
creating, 11.5
action templates, 15.1.2
creating, 15.6
deleting, 15.15
details, 15.5
editing, 15.11
exporting, 15.12
importing, 15.13
search page, 15.3
actions, 9.1.6
Actions group, 10.2, 10.14
activate
challenge questions, 6.5.10, 6.5.10
entities, 16.4.5, 16.9
patterns, 14.9.3.1
transaction definitions, 17.13
add
answer validation, 6.6.2
members to a new or an existing group, 10.9.2
OTP device, 8.4.1
AddItemToListAction, 15.20.2
Address entity, 16.1.1
Aggregate scoring engine, 12.1.8
alerts, 9.1.7
Alerts group, 10.2, 10.2
AlertsBreakdown report, C.6
Always On - User, B
anonymizer data, 23.4.4.1
anonymizer data, loading, 23.4.1.5
Answer Logic
configuring, 6.9
Answer Logic algorithms
common abbreviations, 6.9.2.1
common misspellings, 6.9.2.2
common nicknames, 6.9.2.1
common typos, 6.9.2.3
date format, 6.9.2.1
keyboard fat fingering, 6.9.2.3
phonetics, 6.9.2.2
answer logic algorithms
fat fingering algorithm, F.6
phonetics, F.5
Answer Logic level, 6.9.3
abbreviation, 6.9.3.1
fat fingering, 6.9.3.2
multiple word answers, 6.9.3.4
phonetics, 6.9.3.3
answer registration validations, 6.6
answer validation
adding, 6.6.2
Application ID, Preface, 24.2
archive and purge procedures, G
ASN, 10.2
ASN group, 10.2, 10.10
asynchronous actions, 15.8
attributes, 14.1.3
Audit Information
Customer Care Events, 21.2.1
Group/List Management Events, 21.2.4
KBA Questions Events, 21.2.3
Policy Management Events, 21.2.2
sent to Audit System, 21.2
Authentication Status group, 10.2, 10.14
authentication-related entities, importing, 2.9
autolearning, 14, Glossary
APIs for triggering pattern data processing, A.2
data/profiling data, 14.12
enabling, 2.11, 14.2
in native integration, 14.3.3
pattern creations, best practices, 14.9.1
pattern data processing (On-Line and Scheduled), A.1
Autonomous System Numbers, 10.2
Average scoring engine, 12.1.8
AveragesSummary report, C.7

B

basic environment setup
autolearning enabling, 2.11
CLI, 2.3
configurable actions
enabling, 2.11
encryption and database credentials, 2.4, 2.4.1.1
bharosa.trackeradmin.show.transaction.detail, 5.1
bharosa.uio.default.challenge.type.enum.ChallengeQuestion.available, 8.5
bharosa.uio.default.register.userinfo.enabled, 8.3.1
bharosa.uio.default.use.authentipad.checkpoint, 8.4.1
bharosa.uio.default.userinfo.inputs.enum, 8.3.2
bharosa.uio.default.userpreferences.userinfo.enabled, 8.3.1
BI Publisher reports, C
configuring, 19.1
bucket, 14.1.4
creation and population, 14.1.2
population, 14.1.6
business analysts, 3.1
security
analyst, 1.3
By Digest, 16.4.3
By Key, 16.4.3

C

Cache Policy, 10.6
case
actions, 4.5.1
activity log, 4.6
activity, viewing, 4.6
best practices and recommendations, 4.21
close multiple at once, 4.9
Closed status, 4.15
closing, 4.15.2
create like, 4.8.2
creating, 4.8
CSR, 4, 4.1.1.1
definition, 4.1
description keyword, searching by, 4.4.4
details, viewing, 4.5.2
escalated, 4.1.1.2
escalated case logs, 4.6.3
Escalated status, 4.15
escalating, 4.17
expiration date, 4.1.10
expiry behavior, 4.18
extending expiration, 4.16
history, viewing, 4.6.1
log, searching, 4.6.2
management, 1.2
New status, 4.15
notes, adding, 4.13
open and closed, searching, 4.4.3
Pending status, 4.15
reopening closed cases, 4.15.3
severity level, 4.1.9
severity level, changing, 4.14
status, 4.1.8
status, changing, 4.15
user details, viewing, 4.5.3
Case Details page, 4.5
CaseCreationAction, 15.20.1
Cases search page, 4.4
cases, bulk editing, 4.9
challenge questions
activating, 6.5.10, 6.5.10
Answer Logic, 6.1.8
categories, 6.1.5, 6.1.5
create like, 6.5.4
creating, 6.13.1
creating new, 6.5.3
deactivating, 6.5.11
deleting, 6.5.8
details and statistics, 6.5.2
disabling, 6.5.9
editing, 6.5.5
enabling, 7
exporting, 6.5.7
Global Registration Validation (Global), 6.1.9
Global-Local validation, 6.1.9
importing, 2.5, 6.5.6
increment to next question, 4.11.4
increment user to the next challenge question, 6.1.11.3
managing, 6.5
Question Registration Validation (Local), 6.1.9
question set, 6.1.6
registration, 6.1.4
registration logic, 6.1.7
resets, 4.11
resetting, 4.11.2, 6.1.11.1
searching for, 6.5.1
validate challenge question answers, 6.1.9
challenge questions, importing, 6.2.1
challenge response
configuration, 6.1.3
process, 6.1.2
challenge setup
answer logic, 6.2.3
registration logic, 6.2.3
ChallengeStatistics report, C.3
checkpoints, Preface, 9.1.4
example, 9.1.4
Cities group, 10.2, 10.11, 10.11.1
City Confidence Factor, 9.20.2
CLI
basic environment setup, 2.3
export options, 23.3.2.5
import of files, 23.3.2.4
import options, 23.3.2.6
importing multiple types of entities in one transaction, 23.3.2.7
obtaining usage information for import or export, 23.3.1
options, 23.3.2
parameters, 23.3.2.2
setting up the environment, 23.2
transaction handling, 23.3.2.9
verview, 23.1
com.bharosa.vcrypt.tracker.dynamicactions.intf.DynamicAction java interface, 15.10
Command-Line Interface (CLI), 23
conditions, 9.1.3
adding conditions to a rule, 9.25
deleting, 9.30
deleting from a rule, 9.31
details of a rule, 9.26
editing, 9.28
exporting, 9.27
importing, 9.24
order in a rule, 9.29
searching for, 9.23
conditions library, importing, 2.7
config_secret_key.file, 2.4.3
configurable action instances, 15.16
configurable actions, 1.2, 15.1.1
adding to runtime, 15.9, 15.17, 15.18
creating, 15.2
deploying, 15.1.3
enabling, 2.11
out-of-the-box, 15.20
standard, 15.20
templates, importing, 2.8
configurable actions, defining, 15.6
configurable actions, viewing, 15.9, 15.17, 15.18
configure
Answer Logic, 6.9
OTP challenge type, 8.3.3
OTP delivery, 8.3.4
OTP presentation, 8.4
registration logic, 6.8
connection speed
group, 10.2
Connection Speed group, 10.14
connection speed mapping, 23.4.3.3
Connection Type group, 10.14
connection types
roup, 10.2
connection types mapping, 23.4.3.2
copying
policy to another checkpoint, 9.15
rule to policy, 9.11.6, 9.14
Countries group, 10.2, 10.11
Country Confidence Factor, 9.20.2
Country group, 10.11.3
CountryAggregates report, C.4
create
action templates, 15.6
challenge questions, 6.13.1
entities, 16.4
patterns, 14.9.1
policies, 9.3, 9.8
transaction definitions, 17.7
create like
challenge questions, 6.5.4
create new
challenge questions, 6.5.3
Credential Store Framework, 2.4.1.1
credit card entity, 16.1.2
CSR and CSR Manager role permissions, 4.2
CSR Manager, 4.1.3
custom action instances
creating, 15.10
customer
logins, filter by authentication status or alert level, 4.7.4
logins, search by device or date range, 4.7.2, 4.7.3
logins, viewing, 4.7.1
profile, resetting, 4.10.8
resets, 4.1.11, 4.10
service representative (CSR), 4.1.2
service representatives (CSR), 1.3, 3.1
session history, viewing, 4.7.1
sessions, searching, 4.7.2
sessions, viewing, 4.7

D

dashboard, 1.2, 18
Performance panel, 18.3.1.1
Summary panel, 18.3.2
viewing performance, 18.3.1.1
dashboards, 18.3.3
viewing browser and OS data by device, 18.3.3.5
viewing data type by performance, 18.3.3.6
viewing list of rule or alerts by security, 18.3.3.4
viewing list of scoring breakdowns, 18.3.3.2
data elements, 16.1.2
Data Identification Scheme, 16.4.3
database credentials
setup, 2.4, 2.4.1.2
database credentials in the Credential Store Framework, 2.4.7
deactivate
challenge questions, 6.5.11
entities, 16.10
patterns, 14.9.3.2
transaction
definitions, 17.18
define
groups, 10.9.1
OTP email challenge, 8.3.3
delete
action templates, 15.15
challenge questions, 6.5.8
conditions, 9.30
entities, 16.11
groups, 10.19
patterns, 14.11
policies, 9.13
rules, 9.22
transaction definitions, 17.19
DESede_config_key_alias, 2.4.6
DESede_db_key_alias, 2.4.6
Device
Browser header substring, B, B.1.1.1
Device first-time for user, B, B.1.1.2
Device in list, B
Excessive Use, B.1.1.4
Excessive use, B
fingerprinting data archive and purge criteria, G.3.1.1
In Group, B.1.1.3
Is registered, B, B.1.1.5
Login Count, B
Timed not status, B, B.1.1.7
Used count for User, B.1.1.8
Used count for user, B
User count, B.1.1.6
User status count, B
Velocity from last login, B, B.1.1.9
Device ID
Cookie state, B
Cookies match, B
Header data match, B
Header data match percentage, B
Header data present, B
HTTP header data browser match, B
HTTP header data browser upgrade, B
HTTP header data operating system match, B
HTTP header data operating system upgrade, B
Is Cookie disabled, B
Is Cookie empty, B
Is Cookie from same device, B
Is Cookie Old, B
Is Cookie Valid, B
known header data match percentage, B
User ASN first time, B
User Carrier first time, B
User City first time, B
User Country first time, B
User IP first time, B
User ISP first time, B
User State first time, B
User used this finger print, B
Device Risk Gradient, 9.20.2
DeviceIdScoring report, C.2
Devices group, 10.2, 10.12
devices, unregistering, 4.10.4
disable
challenge questions, 6.5.9
logic for KBA, 6.1.12
discovery process, E
display elements, 16.1.3
Dynamic Monitoring System (DMS), 21.1
dynamicactions.enabled, 2.11

E

edit
action templates, 15.11
challenge questions, 6.5.5
conditions, 9.28
entities, 16.6
patterns, 14.9.1, 14.9.4
policies, 9.10
policy set, 11.6
transaction definitions, 17.14
employee entity, 17.1.2
enable
challenge questions, 7
OTP challenges, 8.5
encoded secret key, generating, 2.4.5
encodeKey command, 2.4.1.1
encryption
key, 2.4
setup, 2.4, 2.4
entities, 16, 17.1.2
activating, 16.4.5, 16.9
creating, 16.4, 16.4.1
creation, best practices, 16.13
data elements,adding, 16.4.2
deactivating, 16.10
deleting, 16.11
details, viewing, 16.5
display scheme, specifying data for, 16.4.4
editing, 16.6
exporting, 16.7
ID Scheme, selecting, 16.4.3
importing, 16.8
reordering the rows in the ID Scheme and Display tabs, 16.12
search page, 16.2
Entity
Entity is a member of the bucket N times in a given time period, B
Entity is member of bucket N times in a given time period, B.1.2.5
Entity is member of pattern bucket for first time in certain time period, B
Entity is Member of Pattern Bucket for the first time in Certain Time Period, B.1.2.1
Entity is member of pattern bucket less than some percent with all entities in picture, B, B.1.2.3
Entity is member of pattern less than some percent times, B, B.1.2.2
Entity is member of pattern N times, B, B.1.2.4
evaluation priority, 14.9.7
Excluded User Group, 9.20.2
expiration date for cases, 4.1.10
expiration, cases, 4.16
expiry behavior for cases
disabling, 4.18, D.1
setting, 4.18, D.1
export
action templates, 15.12
challenge questions, 6.5.7
conditions, 9.27
entities, 16.7
groups, 10.18.1
patterns, 14.10.2
policies, 9.16.1
transaction definitions, 17.15
Ext ID, 16.1.6

F

Fraud Investigation Manager, 4.1.5
Fraud Investigator, 4.1.4

G

genEncodedKey, 2.4.1.1
Generic Integers group, 10.10
Generic Longs group, 10.2, 10.10
Generic Strings group, 10.2, 10.10
Generics group, 10.2
globalization support, F, F.1
group linking, 9.1.8, 9.9
group types, 10.2
groups, 9.1.5, 10
Actions, 10.2, 10.14
add members from cities, states, and countries by filtering an existing list (no creation option), 10.9.2
adding alerts, 10.9.2
adding alerts to a group, 10.13
adding members, 10.9.2
Alerts, 10.2, 10.2
ASN, 10.2, 10.2, 10.10
Authentication Status, 10.2, 10.14
characteristics, 10.8
Cities, 10.2, 10.11, 10.11.1
Connection Speed, 10.2, 10.14
Connection Type, 10.2, 10.14
Countries, 10.2, 10.11, 10.11.3
create a new member to add to the group, 10.9.2
creating a new element/member to add to the group (no search and filter options), 10.10
defining, 10.9.1
deleting, 10.19
details page, 10.7
Devices, 10.2, 10.12
editing, 10.15
exporting, 10.18.1
exporting and importing, 10.18
filtering an existing list to select an element to add to the group (no creation of a new element), 10.11
Generic Integers, 10.10
Generic Longs, 10.2, 10.10
Generic Strings, 10.2, 10.10
Generics, 10.2
importing, 10.18.2
IP, 10.2, 10.12
IP Carriers, 10.2, 10.10
IP Range, 10.12
IP Ranges, 10.2
ISP, 10.2, 10.12
member, editing, 10.15
removing a user from a User Group, 10.17
removing members of, 10.16
Routing Type, 10.2, 10.14
search and add existing elements only (no creation), 10.9.2
search for existing elements or create new elements, 10.9.2
search page, 10.5
searching for, 10.6
searching for and adding existing elements, 10.14
searching for and adding existing elements or creating and adding a new element, 10.12
Second-Level Domains, 10.2, 10.10
States, 10.2, 10.11, 10.11.2
Top-Level Domains, 10.2, 10.10
transaction
status, 10.2, 10.14
updating directly, 10.20, 10.20
usage, 10.3
User ID, 10.2, 10.12
Username, 10.2, 10.12
viewing details about, 10.7

I

ID scheme, 16.1.4
image and phrase, resetting, 4.10.3
image, resetting, 4.10.1
import
action templates, 15.13
authentication-related entities, 2.9
challenge questions, 2.5, 6.2.1, 6.5.6
conditions, 9.24
conditions library, 2.7
configurable actions
templates, 2.8
entities, 16.8
groups, 10.18.2
IP
location data, 2.10
patterns, 14.10.1
policies, 2.6, 9.1.15, 9.16.2
transaction definitions, 17.16
increment step size, 14.1.4
incrementing to next challenge question, 4.11.4
in-session transaction data archive and purge criteria, G.3.1.2
integration
access management, 1.4.3
native, 1.4.1
Oracle Adaptive Access Manager, 1.4
reverse proxy, 1.4.2
SAML, 1.4.4
SOAP/Web services, 1.4.1
static linked (In Proc), 1.4.1
internal identifier, 16.1.5
IP
carriers group, 10.2, 10.10
group, 10.2, 10.12
Loader properties, 23.4.1.2
location data, importing, 2.10, 23.4
Location Loader Properties, 23.4.1.2
range group, 10.12
ranges group, 10.2
ISP group, 10.2, 10.12

K

KBA, 1.2, 6
disabling logic for, 6.1.12
failure counter
setting up, 6.12
failure counters, 6.1.10
Locked status, 6.1.13
phone challenge, 4.11.6, 6.1.11.5
resets
reset, 6.1.11
security solution guidelines, 6.14
unlock a user, 6.1.11.4
KBA vs. OTP, 8.1.5
KeyStore command, 2.4.3

L

loading MaxMind IP data, setting up for, 23.4.1.3
Location
ASN in group, B, B.1.3.1
City in group, B.1.3.10
Domain in group, B
In carrier group, B, B.1.3.7
In City group, B
In Country group, B, B.1.3.3
IP Conn Speed in group, B
IP Conn Type in group, B
IP connection type, B
IP Connection type in group, B.1.3.4
IP Excessive use, B
IP in group, B
IP in Range group, B.1.3.2
IP in range group, B
IP is AOL, B
IP line speed type, B, B.1.3.5
IP Max logins, B
IP Max Users, B
IP Maximum Users, B.1.3.8
IP Multiple Devices, B
IP routing type, B
IP Routing Type in group, B, B.1.3.6
IP type, B
Is IP from AOL, B.1.3.9
ISP in group, B
State in group, B
Timed not status, B
Top Level Domain in group, B
User status count, B
location
data, loading, 23.4.1.5
loading tables, 23.4.4.2
Locked status, 4.1.6
KBA, 6.1.13
OTP, 8.1.6
logging, I
output, H
LoginSummary report, C.7

M

Maximum scoring engine, 12.1.8
member types, 14.1.3
member types and attributes, 14.1.3
Microsoft SQL Server database, setting up, 23.4.1.1
Minumum scoring engine, 12.1.8
models
editing, 9.10
monitor and audit of events, 21
Monitoring Information
APIs Execution Information, 21.1.3
Login Information, 21.1.1
Rules Engine Execution Information, 21.1.2
multi-bucket patterns, 14.1.4, Glossary
MultipleDevices report, C.8
MultipleFailures report, C.2
MultipleUsers report, C.2, C.4
multitenancy, 24

N

native integration, 1.4.1
Navigation tree
menu and toolbar, 3.5.2
navigation tree, 3.5
nested policies, 9.1.11
new features, 11g, Preface
notes, adding to cases, 4.13

O

OAAM Admin, Preface, 3
access level, 3.1
console and controls, 3.3
details pages, 3.7.2
management areas, 3.7
search pages, 3.7.1
sign in, 3.2
OAAM Server, Preface
oaam_db_key, 2.4.7
Online Help, 3.10
Oracle Adaptive Access Manager Online Help, 3.10
Oracle Adaptive Access Manager URL, 3.2
Oracle Enterprise Manager Fusion Middleware Control, 25.18
Oracle Fusion Middleware Control, 20
Organization ID, Preface, 4.8.1, 24.2
OTP
case details, 8.7.3
case management, 8.7
challenge, 8.1.4
Challenge types, 8.3.1
challenge types, configuring, 8.3.3
challenges, enabling, 8.5
contact input elements, 8.3.2
delivery configuration, 8.3.4
device used for challenges, changing, 8.4.2
device, adding, 8.4.1
email challenge, defining, 8.3.3
email registration, 8.3.2
failure counter, setting up, 8.6
Failure Counters, 8.1.6
Locked status, 8.1.6
mobile device registration, 8.3.2
new registration, 8.2
performance data, viewing, 8.8
preference setting, 8.3.1
presentation, configuring, 8.4
profile registration, 8.3.1
profile, resetting, 8.1.7.1, 8.7.1
Registration page, 8.3.2
resetting, 8.1.7
setting up, 8.3
unlocking, 4.10.7
unlocking customer, 8.1.7.2
user login example, 8.2
user, unlocking, 8.7.2
OTP profile, resetting, 4.10.5

P

pattern attributes operators
Equals, 14.14.2
For Each, 14.14.1
Greater Than, 14.14.4
Greater Than Equal To, 14.14.6
In, 14.14.8
Less Than, 14.14.3
Less Than Equal To, 14.14.5
Like, 14.14.10
Not Equal, 14.14.7
Not In, 14.14.9
Not Like, 14.14.11
Range, 14.14.12
pattern rules evaluations, 14.1.5
patterns, 14.1.2
activating, 14.9.3.1
adding attributes, 14.9.2
adding or changing member type, 14.9.6
changing status of, 14.9.5
creating, 14.9.1
creation method, 14.6
data processing, A
deactivate, 14.9.3.2
deactivating and activating, 14.9.3.1
deleting, 14.11
details page, 14.7
editing, 14.9.1, 14.9.4
exporting, 14.10.2
importing, 14.10.1
multi-bucket, 14.1.4, 14.9.1
search page, 14.5
single-bucket, 14.1.4, 14.9.1
status, 14.6
transaction type, 14.6
performance and activity, monitoring, 25.18
performance monitoring, 20
phrase, resetting, 4.10.2
policies, 9.1.1
creating, 9.3, 9.8
deleting, 9.13
editing, 9.10
evaluating policy within a rule, 9.1.12
exporting, 9.16.1
importing, 2.6, 9.1.15, 9.16.2
linking to all users or a user ID group, 9.9
migrated from 10g to 11g, 9.16.2
nested, 12.2.2
planning, 9.2
search page, 9.4
searching for, 9.5
viewing, 9.5, 9.6
policy, Preface
management, 1.2
Policy Details page, 9.7
Policy Explorer, 5.4.6
policy set, 11
details page, 11.2
editing, 11.6
Policy tree, 3.6
policy type, 9.1.16
PostAuthScoring report, C.6
PreAuthScoring report, C.6
processPatternAnalysis, A.2.3, A.2.3
properties
creating, 22.5
deleting database type properties, 22.7
editing the values for Database and File type, 22.6
exporting database and file type properties, 22.8
importing database type properties, 22.9
Oracle Adaptive Access Manager, D
Properties Editor, using, 22
purging, setting up, G, G.4, G.5

Q

QA, 3.1
QuestionStatistics report, C.3
Quova file layout, 23.4.3

R

RecentLogins report, C.1
registration logic
configuring, 6.8
registration phrase, 6.1.4
registration questions, adding, F.7
Registration report, C.3
reporting, BI Publisher, 1.2
reset
challenge questions, 4.11, 4.11.2, 6.1.11.1
challenge questions and set of questions to choose from, 6.1.11.2
challenge questions and the question set, 4.11.3
customer, 4.1.11, 4.10
customer profile, 4.10.8
image, 4.10.1
image and phrase, 4.10.3
OTP, 8.1.7
profile, 8.7.1
OTP profile, 4.10.5, 8.1.7.1
phrase, 4.10.2
virtual authentication device, 4.10.6
reverse proxy integration, 1.4.2
role permissions, CSR and CSR Manager, 4.2
Routing Type group, 10.14
routing types
group, 10.2
mapping, 23.4.3.1
rule and fingerprint logging, I
rule conditions
reference, B
rules, 9.1.2
adding new, 9.11
creation process, 9.11.1
deleting, 9.22
details, 9.19
editing, 9.20
engine, 9.20.3, 12.2.1
preconditions, 9.20.2
results, 9.20.3
search page, 9.17
searching for, 9.18
RulesAPIPerformance report, C.5
RulesBreakdown report, C.6
RulesPerformance report, C.5
Run mode, 9.1.9

S

SAML integration, 1.4.4
scores, 12.1.1
and weight, 9.1.13
and weights, 9.21
calculations, 12.3
override
adding or deleting, 11.4
creating, 11.4
propagation, 12.2.1
scoring engine, 9.1.14, 12, Glossary
scoring override, 12.2.3
ScoringCombinations report, C.6
search for
challenge questions, 6.5.1
conditions, 9.23
groups, 10.6
policies, 9.5
Search Results table, 3.7.1.2
menu and toolbar, 3.7.1.3
searching for
rules, 9.18
secondary authentication, 6.1.1
Second-Level Domains group, 10.2, 10.10
secret key for encrypting database values, 2.4.4
secret keys, backup, 2.4.8
security
administrator, 1.3
administrators, 3.1
effectiveness, monitoring, 25.18
investigator, 1.3
investigators, 3.1
Session
Check Param Value, B.1.5.1
Check param value, B
Check param value for regex, B, B.1.5.2
Check param value in group, B, B.1.5.3
Check string param value, B
Check String Value, B.1.5.4
Check two string param value, B
Check value in comma-separated values, B
Compare two parameter values, B
Compare with current date time, B
Cookie mismatch, B
IP Changed, B
Mismatch in browser fingerprint, B
Time Unit, B
Time Unit Condition, B.1.5.5
Session Details, 5
Checkpoint panels, 5.4.4
Login Details panel, 5.4.3
panels, 5.4, 5.4.1
Transactions panel, 5.4.5
sessions search, 5.2
set up
KBA failure counter, 6.12
OTP, 8.3
OTP failure counter, 8.6
single-bucket patterns, 14.1.4, Glossary
snapshot
backup, 13.1.4, 13.5
best practices, 13.11
deleting, 13.7
details, 13.4
limitations, 13.8
metadata, 13.1.3
restore, 13.1.5, 13.6
search page, 13.2
storage, 13.1.2
SOAP/Web services integration, 1.4.1
State Confidence Factor, 9.20.2
StateAggregates report, C.4
States group, 10.2, 10.11, 10.11.2
static linked (In Proc) integration, 1.4.1
symmetric key to CSF, adding, 2.4.6
synchronous actions, 15.8
System - Check Boolean Property, B, B.1.6.1
System - Check Int Property, B, B.1.6.2
System - Check Model Maximum Score, B
System - Check Model Minimum Score, B
System - Check Request Date, B, B.1.6.4
System - Check String Property, B, B.1.6.3
System - Evaluate Policy, B
system administrator, 3.1

T

tables in location loading, 23.4.4.2
tables used by the ETL process, 23.4.4
temporary allow, 4.1.7, 4.12
time zone, setting, 2.12, D.3
Top-Level Domains group, 10.2, 10.10
TrackerAPIPerformance report, C.5
Transaction
Check Count of any entity or element of a Transaction using filter conditions, B, B.1.4.4
Check Current Transaction Using Filter Condition, B.1.4.1
Check current transaction using the filter conditions, B
Check if consecutive Transactions in given duration satisfy the filter conditions, B.1.4.5
Check if consecutive transactions in given duration satisfy the filter conditions, B
Check Transaction Aggregrate and Count Using Filter, B.1.4.3
Check transaction aggregrate and count using filter conditions, B
Check Transaction Count Using Filter Condition, B.1.4.2
Check transaction count using filter conditions, B
Check Unique Transaction Entity Count with the specified count, B
Compare Transaction Aggregrates (Sum/Avg/Min/Max) across two different durations, B.1.4.6
Compare transaction aggregrates (Sum/Avg/Min/Max) across two different durations, B
Compare Transaction counts across two different durations, B.1.4.7
Compare transaction counts across two different durations, B
Compare transaction entity or element counts across two different durations, B
Compare Transaction Entity/Element counts across two different durations, B.1.4.8
transaction, 16, 17.1.1
data, 17.1.3
definitiions
deactivating and activating, 17.17
definition
adding existing entity, 17.8
definitions, 17, 17.1.1, 17.2
activating, 17.13
create new entity to add, 17.9
creating, 17.7
defining source data, 17.11
defining transaction data, 17.10
deleting, 17.19
editing, 17.14
exporting, 17.15
importing, 17.16
mapping source data, 17.12
viewing, 17.5
handling, 17.1.4
prerequisites for usage, 17.6
search page, 17.3
status group, 10.14
status groups, 10.2
transaction definitions, 1.2
trigger combination, Preface
trigger combinations, 9.1.10, 9.12
trigger return combinations
specifying, 9.12.1, 9.32.15
troubleshooting, 25

U

Universal Risk Snapshot, 13
unlock
customer, 4.11.5, 8.1.7.2
OTP, 4.10.7
OTP user, 8.7.2
user, 6.1.11.4
unregistering devices, 4.10.4
updateAuthStatus, A.2.2, A.2.2
updateTransaction, A.2.1
User
Account Status, B
Action Count, B
Action Count Timed, B
Action Timed, B
ASN first time for user, B
Auth Image Assigned, B
Authentication Mode, B
Challenge Channel Failure, B
Challenge Failure, B
Challenge Maximum Failures, B
Challenge Questions Failure, B
Challenge timed, B
Check first login time, B
Check information, B
Check Last Session Action, B
Check login count, B
Check login time, B, B
Check OTP failures, B
Check User Data, B, B.1.7.1
City first time for user, B
Client and Status, B
Country failure count for user, B
Country first time for user, B
Country first time from list, B
Devices, B
Distance from last successful login, B
Distance from last successful login within limits, B
Image Status, B
In Group, B
IP carrier first time for user, B
Is last IP match with current ip, B
Is User Agent Match, B
Last login, B
Last login status, B
Location Used Timed, B
Login first time for user, B
Login In group, B
Login time between specified times, B
Max Cities, B
Max Countries, B
Max IPs Timed, B
Max Locations Timed, B
Max States, B
Multiple failures, B
Phrase Status, B
Preferences Configured, B
Question Status, B
Runtime score, B
Stale Session, B.1.7.2
Stale session, B
State first time for user, B
Status Count Timed, B
User Agent Percentage Match, B, B
User Group in Group, B
User is member of pattern N times, B
Velocity from last successful login, B
Velocity from last successful login within limits, B
User ID group, 10.2, 10.12
Username group, 10.2, 10.12

V

vcrypt.tracker.autolearning.enabled, 2.11, 14.3.2
vcrypt.tracker.autolearning.use.auth.status.for.analysis, 2.11, 14.3.2
vcrypt.tracker.autolearning.use.tran.status.for.analysis, 2.11, 14.3.2
vcrypt.tracker.rules.allowControlledActions, 11.1.3
view
OTP performance data, 8.8
virtual authentication device, resetting, 4.10.6

W

weight, 12.1.2
Weighted Maximum scoring engine, 12.1.8
Weighted Minimum scoring engine, 12.1.8
Weighted scoring engine, 12.1.8