SAP Knowledge Base Article - Preview

3269521 - What are some basic ways to mitigate malicious login attempts on my sites and/or applications that are utilizing SAP Customer Data Solutions' Identity solution?

Symptom

What are some basic ways to mitigate malicious login attempts on my sites and/or applications that are utilizing SAP Customer Data Solutions' Identity solution?


Read more...

Environment

  • SAP Customer Data Solutions
  • Customer Identity
  • Risk Based Authentication (RBA)

Keywords

Gigya, RBA, login, request, spam, credential stuffing, account takeover, replay, attack, prevent, mitigate , KBA , CEC-PRO , SAP Customer Data Cloud - Identity, - Consent, - Profile , How To

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.