Use Case: Export Search Sessions Results - Export Page to Excel
7.1 Introduction and Concepts
This section describes knowledge based authentication KBA key concepts.7.1.1 Knowledge Based Authentication
Oracle Adaptive Access Manager provides out-of-the-box secondary authentication in the form of knowledge based authentication KBA. KBA is a secondary authentication method, an extension to the existing authentication method. It is presented after successful primary authentication for example, a user entering a single factor credentials, such as a user name and password to improve authentication strength. KBA provides an infrastructure for ■ Users to select questions and provide answers which are used to challenge them later on 7-2 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager KBA is used to authenticate an individual based on the users answers substantiated by a real-time interactive question and answer process. ■ Levels of logic algorithm for registration Registration Logic manages the registration of challenge questions and answers. ■ Levels of logic algorithm for answers Answer Logic is made up of advanced matching algorithms fuzzy logic used by the system to intelligently detect the correct answers in the challenge response process. The algorithms and the level of Answer Logic are factors in evaluating answers. ■ Validations Validations are used to validate the answers given by a user at the time of registration. KBA is used during online authentication of the user, which is automated, or a CSR challenge where the CSR interacts with the user to authenticate him before providing CSR services.7.1.2 Challenge Response Process
The KBA solution consists of securing an application using a challengeresponse process where users are challenged with one or more questions to proceed with their requested sign-on, transaction, service, and so on.7.1.3 Challenge Response Configuration
The challengeresponse process is controlled by a combination of properties and rules. ■ Question presented at random or round robin Presentation logic random versus round robin is configurable through properties. If the deployment supports Oracle Identity Manager integration, the presentation is round robin. The user is expected to answer all the registered questions online. ■ The number of attempts a user is allowed for each question is set by a property. ■ The total number of KBA challenge failures a user is allowed before he is locked out by Oracle Adaptive Access Manager is configured in a rule condition.7.1.4 Registration
During registration, which could be enrollment, opening a new account, or another events such as a reset, the user is asked to select questions and provide answers. The order of questions that are presented to a user during the registration phase is random using configurable parameters. Later on, the challenge questions selected at registration or during a reset may be used for challenge during high risk log ins, to access transactions, or sensitive information, or both, and so on. Oracle Adaptive Access Managers Rules Engine and business rules are responsible for determining if it is appropriate to use challenge questions to authenticate the user. Managing Knowledge-Based Authentication 7-37.1.5 Challenge Questions
The customer can configure a set of questions that are used to authenticate users. The Questions are grouped into several categories and the user can select questions from these categories. The out-of-the-box categories that questions can be grouped into are listed. The customer can configure questions from these categories. ■ Childhood ■ Sports ■ Your Birth ■ Parents, Grandparents, Siblings ■ Automobile ■ Education ■ Children ■ Your Employment ■ Significant Other ■ Pets ■ Miscellaneous During registration, users are presented with several question menus. For example, he may be presented with three question menus. A user must select one question from each menu and enter answers for them during registration. Only one question from each question menu can be registered. These questions become the users registered questions. When rules in OAAM Admin trigger challenge questions, the application displays the challenge questions and accepts the answers in a secure way for users. The questions can be presented in the QuestionPad, TextPad, and other pads, where the challenge question is embedded into the image of the authenticator, or simple HTML. These are configured through properties.7.1.6 Question Set
KBA offers a large pool of questions, which is the framework for obtaining answers from the user during registration or reset. The Question Set is a fixed set of questions that is allotted to the user. This set is allotted at random and once for the user unless it is reset. It is generated based on the settings configured in the Registration Logic. This Question Set prevents any single user from having access to all the challenge questions. This is to prevent a fraudster from harvesting questions for use in a phishing exercise. A user can receive a new Question Set if a customer service representative resets it for the user.7.1.7 Registration Logic
Registration Logic manages the registration of challenge questions and answers. During KBA registration each user is presented with a Question Set, a subset of the challenge questions library. The Question Set is generally broken up into several drop-downs that have questions to select from. The drop-down with questions is called a menu. 7-4 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager Figure 7–1 Drop-Downs Menus The number of questions that appear on each menu, the number of categories per menu, and the number of questions that a user must register is configurable. Out-of-the-box, questions are grouped into categories. The challenge questions in the questions menus do not change unless the question set is changed. The user is required to select one question from each menu and enter answers for them. Only one question from each question menu can be registered. Validations are applied to the answers provided by the user during registration. For example, if the question, What year did you start junior high school, is assigned the Month-Day-Year MMDDYY validation, a user registering for this question is not allowed to provide April 1st 1920 for the answer. To configure the Registration Logic, you specify the settings for: ■ The question set generation – The number of questions to be registered – The number of questions per menu – The number of categories per menu The Question Set is generated based on the Registration Logic. ■ The validations that are applied to the answers For information on setting Registration Logic, see Section 7.8, Configuring the Registration Logic. How do the KBA Registration Logic Settings Affect a Customers Question Set? Example configurations are presented in the following table. Example 1, shown on line 1, results in registration menus containing 2 questions from category A and 2 questions from category B and 2 questions from category C and 1 Example QuestionMenu CategoriesMenu QuestionsCategory in a Menu 1 7 4 2+2+2+1 2 10 4 3+3+2+2 3 10 1 10Parts
» Oracle Fusion Middleware Online Documentation Library
» Benefits of Oracle Adaptive Access Manager
» Oracle Adaptive Access Manager Features
» Single Sign-On Integration Deployment Options
» Universal Installation Option Reverse Proxy Native Application Integration
» Web Services Application Integration
» Installation and Configuration 11g 11.1.1
» Setting Up the Oracle Adaptive Access Manager Base Environment
» 11g 11.1.1 Setting up Encryption
» Expand the WebLogic Domain icon in the Navigation tree in the left pane.
» Select OAAM domain and right-click and select the menu option Security, and
» Click oaam to select the map and then click Create Key.
» In the pop-up dialog make sure Select Map is oaam.
» Select the OAAM domain and right-click and select the menu option Security and
» Click OK to save the secret key to the Credential Store Framework.
» Expand the WebLogic Domain on the left pane, and select OAAM domain.
» From the OAAM Domain, select Security, and then Credentials.
» Expand oaam and select the symmetric key related entries associated with the
» Creating OAAM Users Configuring Database Credentials in the Credential Store Framework
» Open System Snapshot under Environment in the Navigation tree.
» Click the Load from File button.
» Deselect Back up current system now and click Continue.
» Browse for oaam_base_snapshot.zip and click the Load button to load the
» Enabling OTP Enabling Components and Features
» Values for the Common Timezones
» Signing In to Oracle Adaptive Access Manager 11g
» OAAM Admin Console and Controls
» Navigation Tree Structure Navigation Tree
» Navigation Tree Menu and Toolbar
» Navigation Panel Policy Tree
» Elements in the Search Form Search Results Table
» Search Results Menu and Toolbar Select All Create and Import
» Dashboard Online Help Close Multiple Tabs
» Export to Excel Close Multiple Tabs
» CSR Cases Oracle Fusion Middleware Online Documentation Library
» CSR and CSR Manager Role Permissions
» Getting Started Escalated Cases
» From the Cases Search page, specify criteria in the Search Filter.
» Viewing a List Cases You are Currently Working On
» From the Cases Search page, search by Case Status:
» From the Cases Search page, enter the description keyword to locate cases that
» Case Actions Case Details Page
» Viewing Case Details Viewing User Details
» Enter the search criteria and click Search.
» In the Cases Search page, search by the case status and by other filters to locate
» Enter search criteria and click Search.
» To search the sessions by Device ID, enter the ID of the device.
» Click Search. Searching for a Customers Sessions by Device ID or Date Range
» Click Search. Filtering the Session History by Authentication Status or Alert Level
» Click Search. Viewing Transactions in the Sessions History
» In the Cases Search page, click New Case. Select the Organization ID.
» From the Cases Search page, select a case by clicking in the checkbox next to case
» Enter a description in the Description field, or select a description from the
» From the Cases Search page, search for an existing case for resetting the image for
» In the User Item list, select Image. In the Notes list, select the note you want to add.
» Edit the note describing why you are taking the action, if necessary. Click Submit.
» From the Cases Search page, search for an existing case for resetting the virtual
» On the menu bar of the Case Details page, click Customer Resets.
» From the Cases Search page, search for an existing case for unlocking the OTP for
» On the menu bar of the Case Details page, click Customer Resets. Click Submit.
» From the Cases Search page, search for an existing case for resetting all
» On the menu bar of the Case Details page, select More Actions, and then click
» Open the Challenge Questions screen, as described in In the Item list, select Next Question.
» Open the Challenge Questions screen, as described in In the Item list, select Unlock Customer.
» Open the Challenge Questions screen, as described in In the Item list, select Ask Question.
» In the Notes list, select User Challenged. Click Submit. In the confirmation dialog, click OK.
» Enter the customers answer in the Answer field. Click Submit.
» Changing Case Status to Pending Closing a Case
» Access to Cases Multitenancy
» CSR Has Access to More Than One Organization ID Is Unable to Create Case
» CSR Has Access to More Than One Organization ID is able to Create Case Successfully
» CSR Who Cannot Access Any Organization Tries to Create Case
» CSR Searches Sessions Oracle Fusion Middleware Online Documentation Library
» Use Case: Customer Session Search and Case Creation
» In the Cases Search page, click the New Case button.
» For severity level, select Low from the Severity Level list
» Click OK to dismiss the confirmation message.
» To reset Henrys questions, in the Case Details page, select More Actions and
» In the Item list, select Reset Questions as the question-related action to
» In the Notes list, select Forgot QuestionAnswers.
» Click Submit to reset Henrys questions. Click OK to dismiss the dialog.
» Click Add Notes on the menu bar to add notes on the case. Click Submit. Click OK.
» In the Navigation tree, double-click Cases. The Cases Search page is displayed.
» Click Create. CSR Searches Cases
» Click OK in the Create Case confirmation dialog.
» In the menu bar of the Case Details page, select Customer Resets. The
» In the User Item list, select Image and Phrase.
» In the Notes list, select the type of note you want to add.
» In the Description field, modify the description to suit your needs.
» Click Submit. A confirmation dialog is displayed with the message that the
» In the confirmation dialog, click OK.
» In the menu bar, click More Actions, and then click Change Status.
» In the Expired field, select Show Only Expired.
» In the Case Type field, select CSR.
» Click Search Use Case: CSR Manager Bulk Case Edit
» Use Case: CSR - Ask Questions
» Best Practices and Recommendations
» Agent Cases Introduction and Concepts
» Fraud Investigation Role Permission
» Opening the Case Search Page Searching for Cases
» Linked Sessions Oracle Fusion Middleware Online Documentation Library
» Creating an Agent Case from an Escalation
» From the Cases Search page, select an Agent case by clicking in the checkbox next
» Click the Create Like button.
» Edit any of these fields if you want.
» Click Create. Creating a Case Like Another Agent Case
» In the Case Details page, click Add Notes. Click Submit.
» Click OK to dismiss the confirmation dialog.
» In the Case Details page, click More Actions and select Change Severity.
» Changing the Status of a Case Manually
» Configuring Auto Change for Case Status Closing a Case Manually
» On the Case Details page, click the Linked Sessions tab. Click the Link Sessions icon.
» From the results, select the sessions to link to this case and click Next.
» In the Case Details page, click the Linked Sessions tab.
» Select the linked sessions you want and click Export.
» Agent Case Feedback Closing Multiple Cases
» An Investigator, demoinvest1 logs in to the system.
» Investigation Workflow Scenario - Blocked Login Attempts
» Investigation Workflow for CSR Escalated Agent Cases
» Fraud Investigator opens the OAAM Admin Console and sees only the
» Fraud Investigator creates a case.
» Fraud Investigator links the session.
» Fraud Investigator repeats steps 2 and 3 as required
» Fraud Investigator changes the case status to attention required.
» Fraud Investigator adds notes.
» Investigation Workflow for Auto-Created Cases
» How Users Use Agent Cases for Investigation
» Associating Fraud Sessions with a Case for Investigation
» Listing the Cases that I Am Currently Working With Closing a Case
» Closing Multiple Cases Auto-Status Change Escalated Cases
» Configuring Agent Case Access Best Practices and Recommendations
» Details Pages Overview Details Page Structure
» View Transactions in Session Details
» Searching for Sessions Closing Multiple Cases
» Click the Add to Group button in the upper right corner.
» Export Sessions to Excel Session Details Page
» Policy Explorer Looking at Events from a Higher Level with Session Details
» Session Details Oracle Fusion Middleware Online Documentation Library
» Policies Oracle Fusion Middleware Online Documentation Library
» Investigation and the Importance of Details Pages
» User Details: Alerts Tab User Details: Fingerprint Data
» View statistics about the user
» Search and view the different user groups with which a user is associated
» Search and view all the alerts triggered and generated for the user
» View the rules run on the user
» Search and view the fingerprints created for the user
» Location Details: Summary Tab
» Location Details: Groups Tab
» Location Details: Devices Tab
» Location Details: Alerts Tab
» Location Details: Sessions Tab
» Location Details: Fingerprints Tab
» Location Country, State, City, or IP Details Tasks
» View general information about the location
» Search and view the different location groups to which a location is associated or belongs
» Add location to existing location group
» Create a location group and add location to it
» Device Details: Users Tab Device Details: Locations Tabs
» Device Details: Alerts Tab Device Details: Sessions Tab
» Device Details: Fingerprint Data Tab
» Device Details Tasks Device Details Page
» View flash and browser fingerprint information created for the device
» Search and view the different device groups to which a device is associated or belongs
» AddRemove Device from a Device Group Create a device group and add device to it
» Fingerprint Details: Devices Tab Fingerprint Details: Locations Tab
» Fingerprint Details: Sessions Tab
» Fingerprint Details: Alerts Tab
» Search and view the different devices for which the fingerprint was used
» Search and view the different locations for which the fingerprint was used
» Alert Details: Locations Tab
» Alerts Details: Fingerprint Data
» Alert Details Tasks Alert Details Page
» View general information about the alert
» View alert groups with which an alert is associated
» Create an alert group and add an alert to it
» Search and view the different users for which the alert was generated
» Search and view the different devices for which the alert was generated
» Search and view the different locations for which the alert was generated
» In the Navigation tree, double-click Sessions.
» For Authentication Status, select Blocked and Locked.
» For Login Time, select the date and time, 24 hours ago, and the current date
» For Alert Level, select High.
» In the Sessions Search page, view the Search Results table.
» In the Navigation tree, double-click Cases. The Cases Search page is
» Enter Phillips user name into User Name field.
» In Search Results table, look for Temporary Allow in the Last Action Type
» Click the Case ID for the case that has Temporary Allow in the Last Action
» Use Case: Checking for Fraudulent Devices and Adding Them to a Group
» From Actions menu, select Export to Excel.
» Click Save File or Open with and click OK.
» Tom opens the user details for jsmith by clicking the link in the Session page. He
» Tom finds only two devices used by jsmith in the last six months in device page
» Tom searches for all of jsmiths sessions in the last three months. He finds almost
» Tom navigates to fingerprint details and finds that jsmith has logged in from the
» Use Case: Device and Location Details
» Use Case: IP Details and Adding to Group
» Double-click Sessions in the Navigation tree.
» Enter the IP range in the IP range fields and click Search.
» Use Case: Export Search Sessions Results - Export Page to Excel
» Knowledge Based Authentication Introduction and Concepts
» Challenge Response Process Introduction and Concepts
» Challenge Response Configuration Introduction and Concepts
» Registration Introduction and Concepts
» Challenge Questions Introduction and Concepts
» Question Set Introduction and Concepts
» Registration Logic Introduction and Concepts
» Answer Logic Introduction and Concepts
» Validations Failure Counters Introduction and Concepts
» KBA Resets Introduction and Concepts
» Reset Challenge Questions Oracle Fusion Middleware Online Documentation Library
» Reset Challenge Questions and the Set of Questions to Choose From
» Increment User to the Next Question
» Unlock a User Oracle Fusion Middleware Online Documentation Library
» Loading Challenge Questions Setting Up KBA Overview
» Setting Up KBA Setting Up KBA Overview
» Setting Up Challenge Setting Up KBA Overview
» Ensure Policies are Available
» Ensuring that KBA PropertiesDefault Properties are Set
» Ensure Challenge Questions are Available
» Navigate to the Questions Search page, as described in
» Specify criteria in the Search Filter to locate the questions and click Search.
» From the Questions Search page, click the question of interest in the Search
» In the Navigation tree, double-click Questions under KBA. The Questions Search
» From the Questions Search page, click the New Questions button.
» Type the new question in the Question field.
» From the Category list, select the category of question you want.
» In the Locale list, select the language you want.
» Click the Create Like icon. Type the new question in the Question field.
» In the Questions Search page, search for the questions you are interested in.
» Select the Export icon or Export from the Actions menu.
» In the Export dialog, click the Export button.
» Select the rows corresponding to the questions of interest and click Delete or select
» In the Questions Search page, search for the question you want to disable.
» Press the Deactivate button or select Deactivate from the Actions menu.
» Press the Activate button or select Activate from the Actions menu.
» In the Name field, enter the name you want for this instance of the validation
» Click Add. Adding a New Validation
» Navigate to the Validations page, as described in
» From the Validations page, select the hyperlinked configured validation you want
» In the Validation Parameter Details section, make the necessary changes. See
» Click Save Editing an Existing Validation
» Importing Validations Setting Up Validations for Answer Registration
» In the Validations page, search for the validations you are interested in.
» Select Export Selected from the Actions menu.
» When the Export dialog appears, select Save File, and then Save.
» Navigate to the Categories Search page, as described in
» Click Apply to save the changes or Revert to discard them.
» In the Categories Search page, search for the categories you want to delete.
» Select the rows corresponding to the categories you want and click Delete.
» Click OK to dismiss the dialog.
» In the Categories Search page, search for the categories you want to activate.
» In the Categories Search page, search for the categories you are interested in.
» Press the Deactivate button.
» Accessing Configurations in KBA Administration Configuring the Registration Logic
» About Answer Logic Adjusting Answer Logic
» Abbreviations Oracle Fusion Middleware Online Documentation Library
» Phonetics Keyboard Fat Fingering
» Abbreviation Fat Fingering Oracle Fusion Middleware Online Documentation Library
» Phonetics Oracle Fusion Middleware Online Documentation Library
» Customizing English Abbreviations and Equivalences
» Customizing Abbreviations and Equivalences for Locales
» KBA Question Edits KBA Answer Logic Edits
» Best Practices for Managing Questions
» Guidelines for Designing Challenge Questions
» Other Recommended Requirements KBA Guidelines and Recommended Requirements
» What is KBA? Multiple Word Answers
» Enabling Policies Multiple Word Answers
» Configuring Rules for Policies
» Configuring the Challenge Question Answer Validation
» Configuring the Answer Logic
» About Out-of-Band OTP Delivery How Does OTP Work?
» Challenge Type Multiple Word Answers
» KBA vs. OTP Multiple Word Answers
» Quick Start Multiple Word Answers
» Setup Overview Setting Up OTP Anywhere
» Install SOA Suite Oracle Fusion Middleware Online Documentation Library
» Log in to OAAM Admin with environment administrator privileges.
» Use Case 8: Register High Risk Lockout Use Case 9: High Risk Exclusion
» Use Case 10: OTP Challenge with Multi-Bucket Patterns
» Policies Introduction to Policies, Rules, and Conditions
» Rules Introduction to Policies, Rules, and Conditions
» Conditions Introduction to Policies, Rules, and Conditions
» Checkpoints Introduction to Policies, Rules, and Conditions
» Alerts and Alert Groups User Group Linking
» Evaluating a Policy within a Rule Scores and Weight
» Scoring Engine Introduction to Policies, Rules, and Conditions
» Import Policies Introduction to Policies, Rules, and Conditions
» Policy Type Introduction to Policies, Rules, and Conditions
» Failure Counters Introduction to Policies, Rules, and Conditions
» Planning Policies Configure the UMS Driver
» Overview of Creating a Policy
» Navigating to the Policies Search Page
» Viewing a Policy or a List of Policies Viewing Policy Details
» Creating Policies Configure the UMS Driver
» Navigate to the Policy Details page.
» In the Navigation tree, select Policies. The Policies Search page is displayed.
» Click the policy name to open its Policy Details page.
» Editing a Policys General Information
» Specifying General Rule Information
» Specifying Preconditions Starting the Rule Creation Process
» ActivateDisable Policies Reorder conditions
» Configuring Preconditions Adding Conditions
» Specifying Results for the Rule
» Deleting Policies Configure the UMS Driver
» Copying a Policy to Another Checkpoint
» Navigating to the Rules Search Page Searching for Rules
» Viewing Rule Details Configure the UMS Driver
» Modifying the Rules General Information
» Working with Scores and Weights ActivateDisable Rule
» Deleting Rules Configure the UMS Driver
» Searching Conditions Configure the UMS Driver
» Importing Conditions Configure the UMS Driver
» In the Search Results table, click the name of the rule. The Rule Details page
» Viewing the Condition Details of a Rule
» In the Navigation tree, select Rules. The Rules Search page is displayed.
» Exporting a Condition Configure the UMS Driver
» Editing Conditions Configure the UMS Driver
» Changing the Order of Conditions in a Rule
» Deleting Conditions Configure the UMS Driver
» Deleting Conditions from a Rule
» Create a new user group named BLC: exception users.
» Select existing User IDs to add to the BLC: exception users group.
» Click Import Policy in the Policies Search page. The Import Policy screen is
» Click Browse and search for PreAuth_Block_policy.zip.
» Click OK to upload PreAuth_Block_policy.zip.
» In the Policy Search page, verify that the policy appears in the Search Results
» In the Navigation tree, double-click Policies.
» In the Policies Search page, click the New Policy button.
» For Policy Name, enter KBA Challenge.
» For Description, enter a description for the KBA Challenge policy.
» For Checkpoint, select Post-Authentication.
» Click Apply. Configure the UMS Driver
» Click the Group Linking tab.
» For Run Mode, select All Users.
» In the Navigation tree, double-click Policies. The Policies Search page is
» In the Rules tab, click Add to add a new rule. Enter User Velocity as the rule name.
» In the Navigation tree, double-click Rules. The Rules Search page is displayed.
» Search for the Blacklisted countries rule.
» In the Search Results table, click Blacklisted countries. The Rule Details page for
» In the Search Results table, click System - Questions check. The Policy Details
» In the trigger combination, enter a description in the Description field.
» Click Apply. A confirmation dialog is displayed, saying that the policy details
» In the Navigation tree, select Patterns. The Patterns Search page is displayed.
» Click the New Pattern button.
» In the Navigation tree, double-click Groups. The Groups Search page is
» Click Add. Navigate to the Policies Search page.
» In the Results table, click the Post-Authentication policy. Click OK.
» In the parameters area, for Country in country group, select the Blacklisted Click Apply.
» Select Maximum from the Scoring Engine list. Click Apply. Click OK.
» Look through the policy descriptions in the Search Results table for ones that do
» Open the Fraud Cant Challenge policy to view its rules.
» In the Policy Details page, click Copy Policy.
» In the Copy Policy dialog, select Pre-Authentication as the checkpoint.
» Select Active or Disabled as the policy status.
» Click Copy. Use Case: Copy Policy
» In the Navigation tree, double-click Groups.
» In the Groups Search page, click the New Group button.
» In the Monitor IPs group page, click the IP tab.
» In the IP tab, click the Add button.
» In the Add IPs screen, select the Search and select from the existing IPs
» Forgot Password Flow Reset Password KBA-Challenge Flow
» OAAM Pre-Authentication OAAM AuthenticationPad
» OAAM Post-Authentication Security Oracle Fusion Middleware Online Documentation Library
» OAAM Predictive Analysis Oracle Fusion Middleware Online Documentation Library
» Auto-learning Pattern-Based Policy: OAAM Does User Have Profile
» Auto-learning Pattern-Based Policy: OAAM Users vs. Themselves
» Autolearning Pattern-Based Policy: OAAM Users vs. All Users
» OAAM Registration Oracle Fusion Middleware Online Documentation Library
» OAAM Challenge Oracle Fusion Middleware Online Documentation Library
» The administrator sees that Rule: WEBZIP used was triggered.
» OTP is set up for SMS and Email.
» The auto-learning policy OAAM does user have profile is disabled.
» The user is registered as testuser.
» His IP is in the Risky IP group.
» testuser tries to log in to the application.
» testuser is challenged via SMS.
» testuser answers incorrectly 3 times.
» testuser is challenged via KBA.
» testuser answers challenge question incorrectly 3 times.
» CSR must create a case and then unlock challenge questions for the user.
» testuser is able to log in to the application successfully.
» Use Case: Anonymizer IP - From the Group
» Group Usage OAAM Customer Care Ask Question
» User Flows OAAM Customer Care Ask Question
» Navigating to the Groups Search Page
Show more