Previous Topic: Communication between CA Risk Authentication ComponentsNext Topic: Select a Deployment Model


How to perform a Fresh Installation

This scenario guides you on selecting a deployment model, and determine which CA Risk Authentication components and prerequisite software to install on each system. The following illustration defines the tasks should be performed to install CA Risk Authentication:

Note: In this guide, System refers to a physical device and Server refers to software that is run on the system.

How to Perform a New Installation

Perform the following steps:

  1. Select a Deployment Model
  2. Configure Database Server.
  3. Set up Database Store and Database Information.
  4. Perform a Single System Deployment. For more information, refer to Perform a Single System Deployment.
  5. Perform a Distributed Systems Deployment. For more information, refer to Perform to Distributed System Deployment.
  6. Configure CA Risk Authentication SDKs and Web Services.