Previous Topic: How CA Auth ID Authenticates UsersNext Topic: How to Deploy CA Strong Authentication


How to Plan the Deployment

Use the information in this chapter to select a deployment model and to determine which CA Strong Authentication components and prerequisite software must be installed on each system. Architecture diagrams for each deployment model are also provided to assist you with planning.

Note: In this guide, system refers to a physical device and server refers to the software that is run on the system.

The chapter covers the following topics: