For Checkpoint, select Post-Authentication.

10-46 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager To copy a rule: 1. Log in to OAAM Admin as an administrator.

2. In the Navigation tree, double-click Rules. The Rules Search page is displayed.

3. In Search filter, search for: ■ Rule Name: Blacklisted device rule ■ Checkpoint: Post-Authentication 4. Click Search. The System -Post Blocking policy contains the Blacklisted devices rule.

5. In the Search Results table, click Blacklisted devices in the Rule Name column.

6. In the Rules Details page for that rule, click the Copy Rule button. The Copy Rule

screen is displayed.

7. For Policy, select System - Pre Blocking as the pre-authentication policy you want

to copy the rule to.

8. For Rule Name, keep Blacklisted devices or enter a new name for the rule that

you are copying.

9. For Description, keep This rule triggers if the device used has been blacklisted

in the past or enter a new description.

10. Click OK to copy the rule to the pre-authentication policy, System - Pre Blocking.

A confirmation dialog appears with the message, Rule has been copied successfully.

11. Click OK to dismiss the dialog.

12. Navigate to the Rules Search page and check in the Search Results table to verify

that the Blacklisted device rule appears in the System - Pre Blocking policy. 13. Navigate to the Policies Search page and search for the System -Post Blocking policy.

14. Click System -Post Blocking in the Search Results table.

15. In the Policy Details page, click the Rules tab.

16. In the Rules tab, select Blacklisted devices and click Delete.

A screen appears asking, Are you sure you want to delete the selected rules? The Blacklisted devices rule is listed in the screen.

17. Click Yes.

Another confirmation appears with the message, Selected rules are deleted successfully.

18. Click OK to dismiss the dialog.

10.34.7 Use Case: Trigger Combination

To KBA challenge a user Oracle Adaptive Access Manager must check two things: ■ First, check to see whether the user has challenge questions registered. ■ Second, if the user has a questions set active challenge him if a challenge scenario has to be performed. Managing Policies, Rules, and Conditions 10-47 To configure this behavior you must nest your new security policy, which contains rules that can result in a KBA challenge, under the policy, which contains KBA business rules to check for registration status. Directions: Nest the KBA Challenge policy under the System - Questions check policy using policy trigger combinations. The KBA Challenge policy was created in Section 10.34.3, Use Case: Create a Policy. To create a trigger combination: 1. Log in to OAAM Admin as an administrator.

2. In the Navigation tree, double-click Policies. The Policies Search page is

displayed.

3. Search for the System - Questions check policy.

4. In the Search Results table, click System - Questions check. The Policy Details

page for the System - Questions check policy is displayed. 5. In the Policy Details page, click the Trigger Combinations tab. 6. In the Trigger Combinations tab, click Add. The column added to the table corresponds to a trigger combination. By default, trigger combinations are created with all the rules in the policy. The rules used in the policy are represented by a row name. For example, the rules to check for registration status would appear as rows: ■ Registered User with condition User: Account Status ■ Question Registered ■ Unregistered User

7. In the trigger combination, enter a description in the Description field.

8. For each rule specify the rule result based on which trigger combination must be executed performed ■ True : The rule is triggered ■ False : the rule is not triggered ■ Any : Ignore the rule whether or not it triggers By default, a trigger combination is executed for a rule result of Any. 9. For a trigger combination, specify that if the trigger combination triggers, the result returns a nested policy. Select Policy, and in the field directly below, specify KBA Challenge as the policy you want to run to further evaluate the risk. A nested policy is a secondary policy used to further quantify the risk score in instances where the original result output by the system is inconclusive. Nested policies can be assigned to ensure a higher degree of accuracy for the risk score.

10. Select the Action Group.

The action is an event generated when the combination is triggered.

11. Select the Alert Group.

The alert is a message generated when the combination is triggered.