The Symantec Identity Security Platform (IDSP) Risk Evaluator uses a series of tags within its logs to identify, track, and evaluate the risk of devices used during authentication. This article defines the common device recognition tags found in /auth/v1/authenticate and iarisk/v1/UserRiskScoreEvaluator calls and explains why different users on the same device may generate distinct tag values.
Symantec Identity Security Platform (IDSP)
1. Multiple Users on a Single PC (Shared Device) When different users log in from the same browser on the same PC, IDSP evaluates the "User-Device" relationship rather than just the hardware.
Possibly shared remembered device.deviceTag or flag the mismatch to prevent account takeover (ATO) attempts.2. Remembered Device Expired If a log shows Registered device not detected: Remembered device expired, it indicates that the cryptographic binding or the "trust" duration for that device has surpassed the configured TTL (Time to Live) in the IDSP policy.
To ensure consistent device recognition and trust, the following steps are required:
PostUserRiskScoreEvaluator) after a successful authentication.deviceTag received from the initial Risk Evaluation call into the feedback payload with the rememberDevice flag set to true. Failure to do so will result in the device remaining "unrecognized" in subsequent attempts VIP AuthHub Not registering Device during IA RISK call in Postman.