Citrix

Produktdokumentation



Ganzes Dokument herunterladen

Configuring device-based fraud control using ThreatMetrix

Dec. 22, 2015

To assess fraud risk associated with the user device, you have to integrate CloudPortal Business Manager with ThreatMetrix. When a user attempts to sign up, based on the risk rating, the account can either get created, get created but locked, or not get created.

  1. Log in to CloudPortal Business Manager UI as Root user.
  2. Click Home > All Services.
  3. Click B/OSS.
  4. Select ThreatMetrix and click Configure.
  5. Accept the Terms and Conditions to proceed.
  6. In the Configuration window, enter the following details:
    1. API key: Unique API key for ThreatMetrix
    2. APi Hostname: ThreatMetrix hostname
    3. Profiling Hostname: ThreatMetrix porfiling hostname
    4. Organization ID: Unique ID associated with your organization (provided by Threatmetrix)
    5. API TImeout: ThreatMetrix API request timeout
  7. Click Add.
  8. Enable the ThreatMetrix service by selecting the On toggle button
Back to Top