We believe the fashionable trend for “Adaptive Authentication” where Identity is determined by a software only technique based on the User’s “Use Profile” is flawed both in design principle and operation.
The Whitepaper details the weaknesses in this approach and shows how a different “Fortress Construction” design is superior.