Click Below to Get the Code

Browse, clone, and build from real-world templates powered by Harper.
Solution
GitHub Logo

Risk Query

On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.
Solution

Risk Query

By
Akamai
May 12, 2025
By
Akamai
May 12, 2025
By
Akamai
May 12, 2025
May 12, 2025
On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.
Akamai

On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.

Challenges

Header Restrictions

Azure AD B2C permits only a fixed set of headers in its Identity Experience Framework (IEF), blocking APR’s score. 

Looming DFP Retirement

With DFP feature development ending and end-of-life announced, brands need a replacement that works within B2C architectures.


Risk Query Solution

Risk Query provides an integration path between APR and B2C, bypassing header restrictions. Akamai injects fraud scores into a secure high-speed Harper key-value store. B2C reads them using native HTTP policy calls.

Outcomes

Zero Disruption – keep fraud controls after DFP retirement.

Sub-100 ms User Experience – no noticeable latency added to login flow.

Days-not-months Migration – drop-in REST calls; no schema work.

Edge Powered – distributed deployments provide global performance.

On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.

Challenges

Header Restrictions

Azure AD B2C permits only a fixed set of headers in its Identity Experience Framework (IEF), blocking APR’s score. 

Looming DFP Retirement

With DFP feature development ending and end-of-life announced, brands need a replacement that works within B2C architectures.


Risk Query Solution

Risk Query provides an integration path between APR and B2C, bypassing header restrictions. Akamai injects fraud scores into a secure high-speed Harper key-value store. B2C reads them using native HTTP policy calls.

Outcomes

Zero Disruption – keep fraud controls after DFP retirement.

Sub-100 ms User Experience – no noticeable latency added to login flow.

Days-not-months Migration – drop-in REST calls; no schema work.

Edge Powered – distributed deployments provide global performance.

On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.

Download

White arrow pointing right
On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.

Download

White arrow pointing right
On February 3, 2026, Microsoft will sunset support for Dynamics 365 Fraud Protection (DFP), prompting enterprises to evaluate new fraud prevention strategies. Akamai Account Protector (APR) continues to offer trusted device fingerprints and risk scores, but Azure Active Directory B2C (B2C) does not propagate APR’s risk score header downstream. Risk Query bridges this gap with a lightweight, distributed key-value service that enables APR to write and B2C to read, restoring fraud protection logic.

Download

White arrow pointing right

Explore Recent Resources

Repo
GitHub Logo

Edge AI Ops

This repository demonstrates edge AI implementation using Harper as your data layer and compute platform. Instead of sending user data to distant AI services, we run TensorFlow.js models directly within Harper, achieving sub-50ms AI inference while keeping user data local.
JavaScript
Repo
This repository demonstrates edge AI implementation using Harper as your data layer and compute platform. Instead of sending user data to distant AI services, we run TensorFlow.js models directly within Harper, achieving sub-50ms AI inference while keeping user data local.
A man with short dark hair, glasses, and a goatee smiles slightly, wearing a black shirt in front of a nature background.
Ivan R. Judson, Ph.D.
Distinguished Solution Architect
Repo

Edge AI Ops

This repository demonstrates edge AI implementation using Harper as your data layer and compute platform. Instead of sending user data to distant AI services, we run TensorFlow.js models directly within Harper, achieving sub-50ms AI inference while keeping user data local.
Ivan R. Judson, Ph.D.
Jan 2026
Repo

Edge AI Ops

This repository demonstrates edge AI implementation using Harper as your data layer and compute platform. Instead of sending user data to distant AI services, we run TensorFlow.js models directly within Harper, achieving sub-50ms AI inference while keeping user data local.
Ivan R. Judson, Ph.D.
Repo

Edge AI Ops

This repository demonstrates edge AI implementation using Harper as your data layer and compute platform. Instead of sending user data to distant AI services, we run TensorFlow.js models directly within Harper, achieving sub-50ms AI inference while keeping user data local.
Ivan R. Judson, Ph.D.
Blog
GitHub Logo

Why a Multi-Tier Cache Delivers Better ROI Than a CDN Alone

Learn why a multi-tier caching strategy combining a CDN and mid-tier cache delivers better ROI. Discover how deterministic caching, improved origin offload, lower tail latency, and predictable costs outperform a CDN-only architecture for modern applications.
Cache
Blog
Learn why a multi-tier caching strategy combining a CDN and mid-tier cache delivers better ROI. Discover how deterministic caching, improved origin offload, lower tail latency, and predictable costs outperform a CDN-only architecture for modern applications.
Person with short dark hair and moustache, wearing a colorful plaid shirt, smiling outdoors in a forested mountain landscape.
Aleks Haugom
Senior Manager of GTM & Marketing
Blog

Why a Multi-Tier Cache Delivers Better ROI Than a CDN Alone

Learn why a multi-tier caching strategy combining a CDN and mid-tier cache delivers better ROI. Discover how deterministic caching, improved origin offload, lower tail latency, and predictable costs outperform a CDN-only architecture for modern applications.
Aleks Haugom
Jan 2026
Blog

Why a Multi-Tier Cache Delivers Better ROI Than a CDN Alone

Learn why a multi-tier caching strategy combining a CDN and mid-tier cache delivers better ROI. Discover how deterministic caching, improved origin offload, lower tail latency, and predictable costs outperform a CDN-only architecture for modern applications.
Aleks Haugom
Blog

Why a Multi-Tier Cache Delivers Better ROI Than a CDN Alone

Learn why a multi-tier caching strategy combining a CDN and mid-tier cache delivers better ROI. Discover how deterministic caching, improved origin offload, lower tail latency, and predictable costs outperform a CDN-only architecture for modern applications.
Aleks Haugom
Tutorial
GitHub Logo

Real-Time Pub/Sub Without the "Stack"

Explore a real-time pub/sub architecture where MQTT, WebSockets, Server-Sent Events, and REST work together with persistent data storage in one end-to-end system, enabling real-time interoperability, stateful messaging, and simplified service-to-device and browser communication.
Harper Learn
Tutorial
Explore a real-time pub/sub architecture where MQTT, WebSockets, Server-Sent Events, and REST work together with persistent data storage in one end-to-end system, enabling real-time interoperability, stateful messaging, and simplified service-to-device and browser communication.
A man with short dark hair, glasses, and a goatee smiles slightly, wearing a black shirt in front of a nature background.
Ivan R. Judson, Ph.D.
Distinguished Solution Architect
Tutorial

Real-Time Pub/Sub Without the "Stack"

Explore a real-time pub/sub architecture where MQTT, WebSockets, Server-Sent Events, and REST work together with persistent data storage in one end-to-end system, enabling real-time interoperability, stateful messaging, and simplified service-to-device and browser communication.
Ivan R. Judson, Ph.D.
Jan 2026
Tutorial

Real-Time Pub/Sub Without the "Stack"

Explore a real-time pub/sub architecture where MQTT, WebSockets, Server-Sent Events, and REST work together with persistent data storage in one end-to-end system, enabling real-time interoperability, stateful messaging, and simplified service-to-device and browser communication.
Ivan R. Judson, Ph.D.
Tutorial

Real-Time Pub/Sub Without the "Stack"

Explore a real-time pub/sub architecture where MQTT, WebSockets, Server-Sent Events, and REST work together with persistent data storage in one end-to-end system, enabling real-time interoperability, stateful messaging, and simplified service-to-device and browser communication.
Ivan R. Judson, Ph.D.