RiskOS™ Dashboard Setup

Learn how to set up Sigma Identity Fraud in the RiskOS™ Dashboard to detect and prevent third-party fraud.

Set up Sigma Identity Fraud in the RiskOS™ Dashboard

Before you start

Make sure you have the following:

Access to the RiskOS™ Dashboard with the Sigma Identity Fraud enrichment enabled.
  • Your account owner or administrator can enable this for you. If you're unsure who to contact, reach out to support for assistance.

A basic understanding of RiskOS™ workflows and components.
  • If this is your first time working with workflows, review the Workflow overview to understand inputs, enrichments, routing logic, and decisions.


How it works

Sigma Identity Fraud is a fraud detection enrichment available in RiskOS™. It evaluates identity attributes against consortium data to identify signals associated with identity-based fraud.

Sigma Identity Fraud returns:

  • Model scores: Normalized fraud risk scores generated by one or more models.

  • Reason codes: Indicators that explain the contributing risk factors behind fraud signals.

These outputs can be used to inform routing, review, or escalation decisions in your workflows.


How Sigma Identity Fraud fits into a workflow

In RiskOS™, workflows are built by connecting reusable components. Sigma Identity Fraud is added as an Enrichment step.

Once the enrichment runs, its outputs are available to downstream workflow components, including:

  • Conditions
  • Decision rules
  • Rule score cards
  • Manual review steps
  • Final decisions

For more detail on these components, see Workflow Steps.


Execution flow in RiskOS™

Sigma Identity Fraud runs synchronously as part of a RiskOS™ workflow. There is no user handoff or pause in execution.

flowchart LR
    A[Input]
    B[Sigma Identity Fraud]
    C[Routing logic]
    D[Decision]

    A --> B --> C --> D

At a high level, the execution flow looks like this:

  1. Input
    You call the Evaluation API with identity attributes.

  2. Sigma Identity Fraud enrichment
    RiskOS™ evaluates the provided attributes and returns model scores and reason codes.

  3. Routing logic
    The workflow evaluates fraud scores and reason codes.

  4. Decision
    The workflow returns a final outcome (for example, Accept, Review, or Reject).


Workflow components used by Sigma Identity Fraud

Sigma Identity Fraud uses a subset of standard RiskOS™ workflow components.

ComponentPurposeTypical inputOutput / What to use next
InputStart an evaluationIdentity attributesWorkflow execution begins
EnrichmentDetect identity fraudModel scores, reason codes
ConditionBranch based on risk signalsFraud risk outputsRoute to appropriate path
Decision Rule / Score CardApply policy or scoring logicFraud risk outputsPass/fail or cumulative risk classification
DecisionEmit final outcomeRouted valueAccept / Review / Reject

Configure Sigma Identity Fraud

Add Sigma Identity Fraud to a workflow

  1. In the RiskOS™ Dashboard, go to Workflows and create a new workflow or open an existing one.
  2. On the workflow canvas, select the plus (+) icon.
  3. Add an Enrichment step and select Sigma Identity Fraud.

After the enrichment is added, its outputs can be referenced by downstream workflow logic.


Configure routing using model scores

Sigma Identity Fraud returns one or more model scores under:

socure_sigmaidentityfraud_response.fraud.scores

This field contains an array of objects representing the models enabled for your integration. Each object includes:

  • score (float): The output score of the model, ranging from 0.001 to 0.999.
  • name (string): The name of the model, commonly "sigma"
  • version (string): The version of the model, e.g. "4.0"

Using a single model score

If your integration is configured to return a single model score, you can reference it directly when defining Conditions in your workflow, for example:

socure_sigmaidentityfraud_response.fraud.scores.0.score

Customers typically define thresholds based on their own risk tolerance and business policies.


Using multiple scores

If multiple model scores are returned, do not rely on the position of a score within the array. Instead, Conditions should be written to evaluate both the score value and the associated model version.

For example, to evaluate whether a specific model version meets a given threshold, you can construct Conditions that:

  • Check the score value, and
  • Confirm the corresponding version field matches the intended model

This may require evaluating more than one element in the scores array, depending on how many scores are returned for your configuration.


Configure routing using reason codes

Reason codes are returned under:

socure_sigmaidentityfraud_response.fraud.reasonCodes

This field contains an array of strings (for example, "R610") that explain contributing risk signals.

You can route based on reason codes by:

  1. Adding a Condition step
  2. Selecting the variable socure_sigmaidentityfraud_response.fraud.reasonCodes
  3. Choosing array contains or array does not contain
  4. Providing the reason code value in quotes

See the RiskOS™ Dashboard for a list of reason codes available for Sigma Identity Fraud.


Save and publish

Once your workflow is configured, publish it to go live.



Workflow testing checklist

Use this checklist to confirm accuracy, resilience, and completeness before going live.

Input validation:

Email inputs are collected and passed consistently
Supporting identity attributes are provided where available
Routing and decisioning:

Workflow routing reflects your intended risk strategy
Review or fallback paths are clearly defined
Operational readiness:

Email Risk scores and reason codes are accessible to relevant teams