Why am I asked to verify my identity? | All products

  • Updated

Product: All
Applies to: Everyone
 

The security verification is triggered based on the result of evaluating security behavior and risk-based authentication, referred to as adaptive authentication. Security behavior detection continually tracks specific user behavior and generates a challenge when any change in the tracked history of behavior for a given user is detected, such as a new device that has never been used or a new geographic location from which the user has never logged in to Intralinks.

Risk-based authentication is an additional layer of security that evaluates risk automatically using multiple features such as IP address, device, and behaviors for each user attempting to authenticate. Risk-based authentication is done with security behavior detection.

Additional information

Was this article helpful?