Previous Topic: CA Risk Authentication UNIX Installation GuideNext Topic: System Architecture


Introduction

CA Risk Authentication is an adaptive authentication solution that evaluates each online transaction by examining a wide range of collected data against the out-of-the-box rules. CA Risk Authentication then assigns each transaction a risk score and advice; the higher the risk score, the greater the possibility of a fraud. This risk score can be used to approve or decline the transaction, or ask for extra authentication, or alert a customer service representative.

CA Risk Authentication is configurable, and offers the flexibility to modify the configuration parameters of any of the risk evaluation rules, keeping with the business policies and risk-mitigation requirements. It gives the flexibility to modify the default risk score, scoring configuration, and scoring priorities of individual rules and selectively enable or disable the execution of one or more rules.

Besides the pre-configured out-of-the-box rules, the Rule Builder capability enables to create new rules on the fly.

This guide provides information for planning the deployment of CA Risk Authentication based on different solution requirements. Each scenario consists of multiple components that interact with each other and other systems in an enterprise or multiple-network systems.

Important! This guide contains the terms Arcot, WebFort , RiskFort, WebFort, RiskMinder and AuthMinder in some of its code objects and other artifacts. The term ArcotID is now called as AuthID. In addition, some of the topics in this guide do not follow the standard formatting guidelines.