{"id":592,"date":"2020-10-01T16:07:17","date_gmt":"2020-10-01T19:07:17","guid":{"rendered":"http:\/\/www.modulocrm.com.br\/?p=592"},"modified":"2020-10-01T16:11:45","modified_gmt":"2020-10-01T19:11:45","slug":"sap-cdc-gigya-improving-customer-identity-security-using-rba-risk-based-authentication","status":"publish","type":"post","link":"http:\/\/www.modulocrm.com.br\/?p=592","title":{"rendered":"SAP CDC \/ Gigya  Improving Customer Identity Security using RBA (Risk-Based Authentication)"},"content":{"rendered":"\n<p><strong><span style=\"text-decoration: underline;\">Brief Description<\/span><\/strong><br> This document has the objective to exemplify how SAP CDC\/Gigya improve Customer Identity Security using RBA (Risk-Based Authentication). <br> The RBA is a layer of account security that can prevent malicious attacks and hacking attempts on your site.<\/p>\n\n\n\n<p>I hope you enjoy it!!<\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Content<\/span><\/strong><\/p>\n\n\n\n<ol><li><strong><span style=\"text-decoration: underline;\">Customization<\/span><\/strong><br> 1.1.    Description<br> 1.2.    Customizing<br> 1.3.    Checking the Identity Access<br> 1.4.    Registering a new User into your Web Site (Computer)<br> 1.5.    Checking the Account Activation (Email)<br> 1.6.    Accessing the Web Site from a different device (Mobile)<\/li><\/ol>\n\n\n\n<p>Article: <a href=\"http:\/\/www.modulocrm.com.br\/wp-content\/uploads\/2020\/10\/SAP-CDC-Gigya-Improving-the-Customer-Identity-Security-using-RBA.pdf\">SAP CDC  Gigya &#8211; Improving Customer Identity Security using RBA (Risk-Based Authentication)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brief Description This document has the objective to exemplify how SAP CDC\/Gigya improve Customer Identity Security using RBA (Risk-Based Authentication). The RBA is a layer of account security that can prevent malicious attacks and hacking attempts on your site. I hope you enjoy it!! Content Customization 1.1. Description 1.2. Customizing 1.3. Checking the Identity Access [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[107],"tags":[],"acf":[],"views":3857,"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/posts\/592"}],"collection":[{"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=592"}],"version-history":[{"count":4,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/posts\/592\/revisions"}],"predecessor-version":[{"id":597,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=\/wp\/v2\/posts\/592\/revisions\/597"}],"wp:attachment":[{"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=592"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.modulocrm.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}