Skip Navigation

Using authenticator level ranking and authentication policies to manage security

You can use authenticator level ranking and 
BlackBerry Enterprise Identity
 authentication policies to specify the types of authentication that users must perform when the sign  in to a service. The authenticator rankings are security methods that define what type of user authentication is required on service log in. You use risk scenarios and risk factors in authentication policies to specify the settings that apply to users and groups when they access 
Enterprise Identity
 services.