

CA Risk Authentication Administration Guide › Managing Global Configurations › Managing Global Rule Configurations › Uploading Rule List Data › Configuring Trusted IP Addresses
Configuring Trusted IP Addresses
In CA Risk Authentication, transactions that either originate from or are routed through IP addresses and ranges that belong to the Trusted IP address list are considered low risk. As a result, CA Risk Authentication bypasses these transactions from risk evaluations and assigns them a low Score and the ALLOW Advice.
Use the Manage List Data and Category Mappings page to perform the following tasks related to trusted IP addresses and ranges:
- Adding a Trusted IP Address Range
- Updating a Trusted IP Address Range
- Deleting a Trusted IP Address Range
Adding a Trusted IP Address Range
To add a trusted IP address or range, perform the following tasks:
- Ensure that you are logged in as a GA.
- Activate the Organizations tab.
- Under Manage Organizations, click the Search Organization link.
- Click the Search button on the Search Organization page to display the list of organizations.
- Under Select Organizations to Modify, click the link with the organization’s name to which you want to apply the rule.
- Click the CA Risk Authentication Configuration tab.
- Under the Rules Management section on the side-bar menu, click the Manage List Data and Category Mappings link.
The Manage List Data and Category Mappings page is displayed.
- From the Select Existing Ruleset list, select the ruleset that for which this configuration is applicable.
The ruleset configuration information is displayed.
- Select the Manage List Data option.
- From the Select List Type list, select Trusted IP Lists.
- From the Select List drop-down list, select the list identifier that you specified while creating the corresponding list.
- Specify the required IP Address that will be added to the Trusted IP List.
- Specify one of the following:
- Subnet Mask: If you want to specify a range of IP addresses based on the subnet mask to be added to the Trusted IP List.
- End IP Address: If you want to specify a simple range of IP addresses to be added to the Trusted IP List.
- Click Add Range to add the IP addresses or ranges to the Trusted IP List.
The Trusted IP List table with the range that you just added appears at the end of the page.
- Click Update to save the changes.
The changes are not yet active and are not available to your end users.
- To make the changes active, you must migrate them to production.
See "Migrating to Production" for instructions to do so.
Updating a Trusted IP Address Range
To update a trusted IP address or range:
- Perform the tasks listed from Step 1 through Step 11 in "Adding a Trusted IP Address Range" to display the Trusted IP List table.
- Make the required changes in the Trusted IP List table.
- Select all the affected IP address range(s) in the Trusted IP List table.
- Click Update to update the changes that you made.
The changes are not yet active and are not available to your end users.
- To make the changes active, you must migrate them to production.
See "Migrating to Production" for instructions to do so.
Deleting a Trusted IP Address Range
To delete a trusted IP address or range, perform the following tasks:
- Perform the tasks listed from Step 1 through Step 11in "Adding a Trusted IP Address Range" to display the Trusted IP List table.
- In the Trusted IP List table, select the required IP address range(s) that you want to delete.
- Click Delete to delete the ranges that you selected.
- To make the changes active, you must migrate them to production.
See "Migrating to Production" for instructions to do so.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|