Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

You can implement adaptive authentication by user, user group, IP address, Geo location etc.

Children Display

Generally speaking, adaptive authentication is controlled by logon policies.   For the general guide to creating a logon policy, expand the link below

...