FGRK LNRS IIDQA Nodes Getting Started Guide OpenAM
FGRK LNRS IIDQA Nodes Getting Started Guide OpenAM
Version 1.0
November 2023
Table of Contents
SCOPE ....................................................................................................................................................... 3
Document Organization ......................................................................................................................... 3
LEXISNEXIS INSTANTID QUESTION AND ANSWERS NODES ....................................................................... 4
LexisNexis InstantID Get Quiz ................................................................................................................ 4
LexisNexis InstantID Quiz Collector ....................................................................................................... 5
LexisNexis InstantID Quiz Decision ........................................................................................................ 6
NODES INSTALLATION ............................................................................................................................... 7
2
SCOPE
This document contains the detailed steps and supporting information required to install and configure the
ForgeRock Access Management (AM) Single Sign-On (SSO) server with LexisNexis InstantID Question and Answer
(IIDQA) Nodes. This guide is intended to install a simple configuration to support testing.
The following are architecture assumptions and limitations:
• ForgeRock Access Manager server has been previously installed
• Default configuration for ForgeRock SSO Server with a default configuration for OpenDJ as the Identity
Store
• An existing ForgeRock Authentication Tree is configured that can be modified to integrate the IIDQA
Nodes as an Inner Tree Evaluator Node
Document Organization
This document is divided into four sections as follows:
• Scope. Defines the purpose of this document.
• LexisNexis IIDQA Nodes. Provides on overview of the nodes available for ForgeRock authentication
tree integration.
• Nodes Installation. Provides information to install the LexisNexis IIDQA nodes upon an on-premise
ForgeRock Access Management (AM) server.
• LexisNexis Dynamic Decision Platform Portal. Provides detailed information regarding the
configuration of LexisNexis Dynamic Decision Platform (DDP) to include configuration of a simple
policy and how to access configuration parameters required for the ForgeRock authentication tree.
• ForgeRock Authentication Tree Configuration. Provides detailed steps to configure a ForgeRock
authentication tree with LexisNexis IIDQA Nodes to perform Multi-Factor Authentication (MFA) in
support of an existing ForgeRock journey tree.
3
LEXISNEXIS INSTANTID QUESTION AND ANSWERS NODES
The LexisNexis InstantID Question and Answer (IIDQA) Nodes are available in the Marketplace to be included
within any new or existing ForgeRock authentication tree configurations. To include a LexisNexis IIDQA node in a
journey, enter LexisNexis into the Filter nodes to get a listing of available capabilities. For IIDQA, the following
nodes are available:
• LexisNexis InstantID Get Quiz
• LexisNexis InstantID Quiz Collector
• LexisNexis InstantID Quiz Decision
4
• Attribute List - Defines a mapping of user parameters to InstantID Q&A API attributes. The user
parameters will be fetched based on the Attribute Source. The Key is the user parameter name from
the source and the value is the attribute name to send to InstantID Q&A. For example, Attribute
Source=Shared State, with attribute list key= givenName and value= account_first_name would
signal the LexisNexis IIDQA Get Quiz node to fetch the user parameter givenName from shared
state and then set the IIDQA attribute account_first_name to the value from shared state. The
attributes to send to IIDQA should include account_first_name, account_last_name ,
account_address_street1 , account_address_city, account_address_state and
account_address_zip as this will have a good probably to match a record in the LexisNexis
system resulting in a generated quiz.
The LexisNexis IIDQA Get Quiz Node has the following outcomes:
• Success - This outcome is triggered when the API Request results in a physical match to a person
based on the Attribute List and a quiz is generated. The quiz is placed into Shared State for the
IIDQA Quiz Collector Node, which will display the user interface for the quiz to collect the answers.
• API Error - This outcome is triggered when there is an issue with the API Request such as a network
timeout or the service is unavailable.
• Discovery Error - This outcome is triggered when a physical match to a person cannot be made
based on the attribute list provided in the IIDQA API Request. In this scenario, the journey/tree may
display a secondary interface to collect additional user parameters such as DOB or SSN enabling a
higher probability for an identity match.
• Velocity Error - This outcome is triggered based on the IIDQA policy configured within LexisNexis.
Typically, we configure the system to only allow 3 quiz requests over a 30 minutes period to prevent
guessing attacks.
• Error - This outcome is triggered when there is a fundamental integration error, or a new bug is
discovered. First attempt to fix the integration error by looking at debug log files for the node to
determine if the integration error is due to configuration. If the configuration looks accurate, then
open a support case with LexisNexis.
The LexisNexis IIDQA Quiz Collector Node has the following outcomes:
• Next - This outcome is triggered quiz answers are complete and the submit button is selected by
the user.
• Cancel - This outcome is triggered when the user selects the cancel button to abort the quiz.
5
• Error - This outcome is triggered when there is a fundamental integration error, or a new bug is
discovered. First attempt to fix the integration error by looking at debug log files for the node to
determine if the integration error is due to configuration. If the configuration looks accurate, then
open a support case with LexisNexis.
6
NODES INSTALLATION
This section describes how to deploy the LexisNexis IIDQA Nodes to the ForgeRock Access Manager hosted on
Apache Tomcat. The server will need to be stopped and restarted for the Nodes to be properly deployed. This
instruction assumes a tomcat application web server.
1. Stop the Tomcat server
2. Remove any previously installed versions of LexisNexis IIDQA Nodes from the server:
Directory: <fgrkinstall>/tomcat/webapps/openam/WEB-INF/lib
3. Copy the LexisNexis IIDQA Nodes media as follows:
Filename: lexisnexis-iidqa-1.0.0.jar
Directory: <fgrkinstall>/tomcat/webapps/openam/WEB-INF/lib
4. Restart Tomcat server from command line
7
DYNAMIC DECISION PLATFORM PORTAL CONFIGURATION
This section defines the high-level LexisNexis Dynamic Decision Platform (DDP) Portal configuration items that
will be needed for the overall configuration. There are two main categories of configuration, mainly,
• Organization ID and API Key for the REST API interfaces. This information is needed by the LexisNexis
IIDQA Nodes and will be entered as part of configuration.
• LexisNexis IIDQA Portal Policy. The configured policy within DDP provides the configuration for the
Authentication Hub to access IIDQA services. For the purposes of the getting started guide and to have a
simple test configuration for different outcomes, the “IIDQA” policy will be configured to directly
integrate the Authentication Hub without any further policy rules.
1. Access DDP Portal over the internet by logging into your administrative account with credentials
provided by LexisNexis.
2. From the DDP Portal home page, select the user information dropdown that will display username,
OrgName and OrgID. This will be the OrgID to enter into the configuration of the LexisNexis IIDQA Nodes.
3. Within the DDP Portal home page, select Admin followed by selecting the API Keys tile. Retrieve the
value for API Key. In the event no API Key is listed, select the Create New API Key button to generate a
new key. This will be the API Key to enter into the configuration of the LexisNexis IIDQA Nodes. The API
Key is to be protected. Do not email or keep this value in cleartext on any computer system.
8
Dynamic Decision Platform Portal Policy
For the purposes of the getting started guide and to have a simple test configuration for different outcomes, the
“IIDQA” policy will be configured to directly integrate the Authentication Hub without any further policy rules.
Perform the following steps.
1. Access DDP Portal over the internet by logging into your administrative account with credentials
provided by LexisNexis.
2. From the DDP Portal home page, select Policies from the menu bar. This will provide a listing of
available policies. The first step is to select the Create dropdown menu followed by New Policy
(Standard).
3. On the Policy Summary, the Properties interface tab will be displayed. Enter Policy Name = IIDQA, select
the Active button, and update the Status Thresholds for Reject = -20 and Review = 20.
9
4. To create the policy rules, select the Rules interface tab. The IIDQA policy will be a single Authentication
rule to integrate the Authentication Hub as follows.
5. The Authentication Rule Editor can follow the template shown here. Within this interface, the Product
Configuration is the Authentication Hub configuration that is established via LexisNexis ThreatMetrix
Professional Services. The services configure the LexisNexis IIDQA service as an interface associated to
the customer account.
10
FORGEROCK-LEXISNEXIS AUTHENTICATION TREE
Authentication Tree: LNRS-StepUp-IIDQA
This section provides the steps to configure a ForgeRock Authentication Tree with LexisNexis IIDQA nodes from
the marketplace. The workflow in this section is focused on the general flow of IIDQA nodes, which can be called
as a ForgeRock Inner Tree from higher level journey/tree.
The workflow starts with the LexisNexis IIDQA Get Quiz node. This node has been designed to support use cases
for MFA of an existing managed user, as well as first time Identity Proofing for a new account origination The key
is how the LexisNexis IIDQA Get Quiz node gathers parameters from the ForgeRock environment, mainly from a
user credential store to support MFA workflows, or from a user interface and shared state to support new account
origination workflows.
To configure the Authentication Tree, perform the following to configure the server:
1. From a workstation, launch a browser and enter the following URL:
https://<SSO-SVR-NAME>:<SSO-SVR-HTTPS-PORT>/openam
Example: https://sso.threatmetrix.com:8443/openam
11
2. Login with amadmin and credentials
3. Upon login, select the Realms dropdown menu and click Top Level Realm.
6. On the New Tree display, enter “LNRS-IIDQA” followed by the Create button.
12
7. The result is the Authentication Trees > LNRS-IIDQA display. This is the interface to build up the
authentication policy as a tree depiction showing the nodes in the policy. At this point, the tree will be
built by drag-n-drop of Components on the left side of the screen. Each node in the policy will then be
configured.
8. Build the IIDQA GET QUIZ Screen, do the following:
• On the Components Filter on the left side of the interface, enter lexisnexis. When the LexisNexis
InstantID Get Quiz is displayed as a component, drag and drop it into the authentication tree.
• Select the LexisNexis InstantID Get Quiz Node component to display the configuration properties
on the right side of the interface. Enter the following property values.
Org ID <ENTER ORG ID FROM DDP PORTAL>
API Key <ENTER API KEY FROM DDP PORTAL>
API URL https://h-api.online-metrix.net/authentication/v1/iidqa/
Policy <ENTER THE POLICY NAME AS CONFIGURED IN DDP PORTAL>
Attribute Source Select either “User Directory” or “Shared State”
Attribute List Defines the user parameter mapping from the Attribute Source
to IIDQA attributes. For example
Key=givenName, Value=account_first_name
Key=sn, Value=account_last_name
Key=postalCode, Value=account_address_zip
Note: In the DDP Portal when the policy is established, the reason code that is configured is
dynamic, thus the rationale for the configuration parameter. In the example screen snapshots in
section entitled “Dynamic Decision Platform Portal Policy”, the name of the policy is “IIDQA” and
the reason code is “IIDQA”.
Note: The toggle for Attribute Source allows flexibility in the journey/tree. This determines where
the IIDQA GET QUIZ node will inspect and gather user parameters to be mapped into the
attributes of the IIDQA API Request to get a quiz. This can be configured for User Directory or
from Shared State. User Directory is typically configured in an orchestration where IIDQA is used
for Multi-Factor Authentication (MFA) since the information for the user should be in the directory.
The Shared State specification is typically configured in an orchestration where IIDQA is used for
identity proofing for use cases such as new account origination since the user account does not
exist.
Note: The Attribute List defines a mapping of user parameters to InstantID Q&A API attributes.
The user parameters will be fetched based on the Attribute Source. The Key is the user parameter
name from the source and the value is the attribute name to send to InstantID Q&A.
InstantID Q&A must have a physical data record match in order to generate a quiz. The minimum
parameters to send are first/last name and zip code. Based on the workflow, additional parameters
may be needed such as address, data of birth or social security number. When designing the
workflow, be sure to take into account the information needed and whether or not the Discovery
Error outcome can be used to fetch additional information.
13
9. Build the IIDQA QUIZ COLLECTOR, do the following:
• The LexisNexis InstantID Quiz Collector Node may optionally be placed into a Page Node container
for additional heading and messaging, or as a standalone node. This decision is up to the
administrator. For the purposes of simplicity, this instruction will document the standalone
configuration.
• On the Components Filter on the left side of the interface, enter lexisnexis. When the LexisNexis
InstantID Quiz Collector is displayed as a component, drag and drop it into the authentication tree.
• Select the LexisNexis InstantID Quiz Collector Node component to display the configuration
properties on the right side of the interface. This node does not have any configuration parameters.
10. Build the IIDQA QUIZ DECISION, do the following:
• On the Components Filter on the left side of the interface, enter lexisnexis. When the LexisNexis
InstantID Quiz Decision is displayed as a component, drag and drop it into the authentication tree.
• Select the LexisNexis InstantID Quiz Decision Node component to display the configuration
properties on the right side of the interface. Enter the following property values.
Org ID <ENTER ORG ID FROM DDP PORTAL>
API Key <ENTER API KEY FROM DDP PORTAL>
API URL https://h-api.online-metrix.net/authentication/v1/iidqa/
Policy <ENTER THE POLICY NAME AS CONFIGURED IN DDP PORTAL>
Note: The Policy configured in the LexisNexis InstantID Quiz Decision node shall be the same as
the LexisNexis InstantID Get Quiz. This is because DDP maintains state between isuuance of the
quiz and the submittal of quiz answers.
11. Build Message Nodes for IIDQA Pass, IIDQA Fail, and Integration Error to support testing. This can be
accomplished with Message Nodes or Page Nodes with an OK Button Node. The nodes are meant to
display outcomes to the user.
12. Link together the nodes of the authentication tree
• To connect the nodes of the authentication tree, click on the output dot of one node and then drag it
to the input dot of another node. The following connections should be made.
Start IIDQA GET QUIZ
IIDQA GET QUIZ (Success) QUIZ COLLECTOR
IIDQA GET QUIZ (API Error) IIDQA FAIL
IIDQA GET QUIZ (Discovery Error) IIDQA FAIL
IIDQA GET QUIZ (Velocity Error) IIDQA FAIL
IIDQA GET QUIZ (Error) INTEGRATION ERROR
QUIZ COLLECTOR (Next) QUIZ DECISION
QUIZ COLLECTOR (Cancel) IIDQA FAIL
QUIZ COLLECTOR (Error) INTEGRATION ERROR
QUIZ DECISION (Pass) IIDQA PASS
QUIZ DECISION (Fail) IIDQA FAIL
QUIZ DECISION (API Error) IIDQA FAIL
QUIZ DECISION (Error) INTEGRATION ERROR
IIDQA PASS (Next) Success
IIDQA PASS (Error) Failure
14
IIDQA FAIL (Next) Failure
IIDQA FAIL (Error) Failure
INTEGRATION ERROR (Next) Failure
INTEGRATION ERROR (Error) Failure
15
For the purposes of brevity, the entire login workflow authentication tree will not be documented here, rather a
simple documentation of the inner tree evaluator to integrate the LNRS-IIDQA tree from the previous section.
1. From a workstation, launch a browser and navigate to the Access Manager Admin Console.
2. Login with amadmin and credentials
3. Upon login, select the Realms dropdown menu and click Top Level Realm.
4. On the Realm Overview display, click the Authentication Trees tile.
5. On the Authentication Trees display, select the existing authentication tree to modify.
6. To leverage the IIDQA authentication tree, add an Inner Tree Evaluator node.
• On the Components Filter on the left side of the interface, enter inner. When the Inner Tree
Evaluator node is displayed as a component, drag and drop an instance into the authentication tree.
This node will be used to invoke the LNRS IIDQA authentication tree. Enter the following property
values.
Node name Inner Tree - MFA
Tree Name LNRS-IIDQA
• Connect the nodes of the authentication tree and save the authentication tree.
16
For the purposes of brevity, the entire NAO workflow will not be documented here, rather a simple modification
to the out-of-the-box Platform Registration workflow will be performed to insert a inner tree evaluator for the
LNRS-IIDQA tree.
1. From a workstation, launch a browser and navigate to the Access Manager Admin Console.
2. Login with amadmin and credentials
3. Upon login, select the Realms dropdown menu and click Top Level Realm.
4. On the Realm Overview display, click the Authentication Trees tile.
5. On the Authentication Trees display, select the existing authentication tree to modify.
6. To leverage the IIDQA authentication tree, add an Inner Tree Evaluator node before the user account
object is created.
• On the Components Filter on the left side of the interface, enter inner. When the Inner Tree
Evaluator node is displayed as a component, drag and drop an instance into the authentication tree.
This node will be used to invoke the LNRS IIDQA authentication tree. Enter the following property
values.
Node name Inner Tree - MFA
Tree Name LNRS-IIDQA
• Connect the nodes of the authentication tree and save the authentication tree.
17