Previous Topic: How to Deploy CA Strong Authentication on Distributed SystemsNext Topic: Post-Installation Tasks on the First System


Install the First System

Perform the following steps to install CA Strong Authentication and related components.

Follow these steps:

  1. Log in and navigate to the directory where you untarred the installer.
  2. Ensure that you have the permission to run the installer. If you do not have the required permission, run the following command:
    chmod a=rx CA-StrongAuthentication-8.0-Linux-Installer.bin
    
  3. Run the installer as follows:
    sh CA Strong Authentication-<version_number>-<platform_name>-Installer.bin
    

    If you are running the installer with root login, then a warning message appears. Enter Y to continue, or N to quit the installation. If you exit the installer, then run the installer again.

    The Welcome message appears.

  4. Press Enter to continue with the installation.

    The License Agreement appears.

  5. Accept the License Agreement.
    1. Enter y to accept the acceptance of License Agreement and to continue with the installation.

    The Choose Installation Location options appear.

  6. Perform one of the following steps:

    The installation types (Complete and Custom) screen appear.

  7. Select the required option and press Enter to continue with the installation.
  8. Type 2 and press Enter to accept the Custom installation option and to continue with the installation.

    The Choose Product Features options appear.

  9. Specify a comma-separated list (without any space between the comma and the number) of numbers representing the CA Strong Authentication components you want to install.

    On the first system, you install the following components:

    1. CA Strong Authentication Authentication Server
    2. Administration Console
    3. User Data Service

    The following table describes all components that are installed by the installer and the numbers that you must enter to install them.

Option

Component

Description

1

CA Strong Authentication Authentication Server

This option installs the core Processing engine (CA Strong Authentication Server) that serves the following requests from SDKs, Administration Console, and Web Services:

  • Credential Issuance Configurations
  • Credential Authentication Configurations
  • Server Configurations

In addition, this component also enables you to access the following Web Services:

  • Authentication and Authorization Web service - Provides the programming interface for authenticating and authorizing users.
  • Issuance SDK and Web Services - Provides the programming interface for creating, reading, and updating user credential information in the CA Strong Authentication database.
  • Authentication Web Service - Provides the programming interface for authenticating users.
  • Credential Management Web Service - Provides the programming interface for creation and management of user credentials.
  • Administration Web Service - Provides the programming interface used by the CA Strong Authentication Administration Console.
  • Bulk Operations Web Service: Provides the programming interface for uploading and fetching OATH tokens.

2

Java SDK and WS

This option provides programming interfaces (in form of APIs and Web Services) that can be invoked by your application to forward authentication and user credential issuance requests to the CA Strong Authentication Server. This package comprises the following sub-components:

  • Authentication Java SDK and Web Services- Provides the programming interface for authentication with CA Strong Authentication Server.
  • Credential Management Java SDK and Web Services - Provides the programming interface for creation and management of user credentials.
  • Administration Web Service - Provides the programming interface for creating configurations.
  • Bulk Operations Web Service: Provides the programming interface for uploading and fetching OATH tokens.

See chapter, "Configuring CA Strong Authentication Java SDKs and Web Services" for more information about configuring these components.

3

CA Strong Authentication Sample Application

This option provides Web-based interface for demonstrating the use of Java APIs and verify if CA Strong Authentication was installed successfully, and if it is able to perform credential management and authentication requests.

4

Administration Console

This option provides the Web-based interface for managing CA Strong Authentication Server and authentication-related configurations.

5

User Data Service

This option installs UDS that acts as an abstraction layer for accessing different types of user repositories, such as relational databases (RDBMSs) and directory servers (LDAPs.)

  1. Press Enter to continue.

    The database types screen appear.

  2. Specify the number corresponding to the database, and press Enter to continue:

    The Primary Database Access Configuration options appear.

    Note: CA Strong Authentication Oracle Real Application Clusters (Oracle RAC). To use Oracle RAC with your CA Strong Authentication Installation, select Oracle Database in this step, perform the next step (Step 12), and then perform the steps in Configuring CA Strong Authentication for Oracle RAC.

  3. Depending on the database that you are using:

Parameter

Description

Primary ODBC DSN

The installer creates an ODBC connection that CA Strong Authentication uses to connect to the database.

The recommended value to enter is arcotdsn.

User Name

The database user name for CA Strong Authentication to access the database. This name is specified by the database administrator. (MS SQL Server, typically, refers to this as login.)

Note: The User Name for the Primary and Backup DSNs must be different.

Password

The password associated with the User Name you specified in the previous field and which is used by CA Strong Authentication to access the database. This password is specified by the database administrator.

Server Name

The host name or IP address of the datastore.

  • Default Instance

Syntax: <server_name>

Example: demodatabase

  • Named Instance

Syntax: <server_name>\<instance_name>

Example: demodatabase\instance1

Port Number

The port on which the database server listens to the incoming requests.

Note: Press Enter, if you want to accept the default port.

Database

The name of the MS SQL database instance.

Parameter

Description

Primary ODBC DSN

The installer creates an ODBC connection that CA Strong Authentication uses to connect to the database.

The recommended value to enter is arcotdsn.

User Name

The database user name for CA Strong Authentication to access the database. This name is specified by the database administrator.

Note: The User Name for the Primary and Backup DSNs must be different.

Password

The password associated with the User Name you specified in the previous field and which is used by CA Strong Authentication to access the database. This password is specified by the database administrator.

Host Name

The host name or IP address of the datastore.

  • Default Instance

Syntax: <server_name>

Example: demodatabase

  • Named Instance

Syntax: <server_name>\<instance_name>

Example: demodatabase\instance1

Port Number

The port at which the Database listens to the incoming requests.

Note: Press Enter, if you want to accept the default port.

Database

The name of the database that CA Strong Authentication will access.

Parameter

Description

Primary ODBC DSN

The installer creates an ODBC connection that CA Strong Authentication uses to connect to the database.

The recommended value to enter is arcotdsn.

User Name

The database user name for CA Strong Authenticationto access the database. This name is specified by the database administrator.

Note: The User Name for the Primary and Backup DSNs must be different.

Password

The password associated with the User Name you specified in the previous field and which is used by CA Strong Authentication to access the database. This password is specified by the database administrator.

Service ID

The Oracle System Identifier (SID) that refers to the instance of the Oracle database running on the server.

Port Number

The port at which the Database listens to the incoming requests.

Note: Press Enter, if you want to accept the default port.

Host Name

The host name or IP address of the datastore.

Syntax: <server_name>

Example: demodatabase

Parameter

Description

Primary ODBC DSN

The installer creates an ODBC connection that CA Strong Authentication uses to connect to the database.

The recommended value to enter is arcotdsn.

User Name

The database user name for CA Strong Authentication to access the database. This name is specified by the database administrator. (Microsoft SQL Server, typically, refers to this as login.)

Note: The User Name for the Primary and Backup DSNs must be different.

Password

The password associated with the User Name you specified in the previous field and which is used by CA Strong Authentication to access the database. This password is specified by the database administrator.

Server Name

The host name or IP address of the datastore.

  • Default Instance

Syntax: <server_name>

Example: demodatabase

  • Named Instance

Syntax: <server_name>\<instance_name>

Example: demodatabase\instance1

Port Number

The port on which the database server listens to the incoming requests.

Note: Press Enter, if you want to accept the default port.

Database

The name of the Microsoft SQL Server database instance.

The Backup Database Access Configuration options appear.

  1. Perform one of the following steps:

    The Encryption Configuration options appear.

  2. Specify the following information:
    1. Enter 1 if you want to use Luna HSM or 2 if you want to use nCipher netHSM.
    2. HSM PIN: Enter the password that is used to connect to the HSM.
  3. Press Enter to continue.

    The Pre-Installation Summary appears.

  4. Review the product details displayed carefully and press Enter to proceed.

    After the preceding tasks are completed successfully, the Installation Complete message appears.

  5. Press Enter to exit the installer.

    You may have to wait for a few minutes (for the installer to clean up temporary files) until the prompt reappears.

  6. Verify that UTF-8 support is enabled:
    1. Navigate to the <install_location>/arcot/odbc32v70wf/odbc.ini file.
    2. Locate the [ODBC] section.
    3. Ensure that the IANAAppCodePage=106 entry is present in the section.
    4. If you do not find this entry, then add it.
    5. Save and close the file.