Logo
 
 

Configuring device-based fraud control using ThreatMetrix

 
 
 

To assess fraud risk associated with the user device, you have to integrate CloudPortal Business Manager with ThreatMetrix. When a user attempts to sign up, based on the risk rating, the account can either get created, get created but locked, or not get created.

  1. Log in to CloudPortal Business Manager UI as Root user.
  2. Click Home > All Services.
  3. Click B/OSS.
  4. Select ThreatMetrix and click Configure.
  5. Accept the Terms and Conditions to proceed.
  6. In the Configuration window, enter the following details:
    1. API key: Unique API key for ThreatMetrix
    2. APi Hostname: ThreatMetrix hostname
    3. Profiling Hostname: ThreatMetrix porfiling hostname
    4. Organization ID: Unique ID associated with your organization (provided by Threatmetrix)
    5. API TImeout: ThreatMetrix API request timeout
  7. Click Add.
  8. Enable the ThreatMetrix service by selecting the On toggle button
 
Have more questions? Submit a request

Comments

 
Adding comment, please wait....

Provide Feedback on Article:

Subject:
Comments:*
Powered by Zendesk