Previous Topic: Requirements for Java-Dependent ComponentsNext Topic: Perform a Complete Installation


How to Deploy CA Risk Authentication on a Single System

To install the CA Risk Authentication components, use the CA Risk Authentication 8.0 InstallAnywhere Wizard. This wizard supports Complete and Custom installation types.

Note: To install and configure CA Risk Authentication on a single computer, use the Complete option when you run the installer.

The following illustration shows the tasks to perform for installing CA Risk Authentication 8.0:

RA_Single_Installation

Perform the following tasks:

  1. Perform a Complete Installation
  2. Verify the Database Setup
  3. Run the Database Scripts
  4. Prepare an Application Server
  5. Deploy the Administration Console
  6. Log in to Administration Console
  7. Perform the Bootstrapping Tasks for the System
  8. Start the CA Risk Authentication Server Service
  9. Start CA Risk Authentication Case Management Service
  10. Deploy UDS
  11. Deploy User Behavior Profiling Application
  12. Deploy the Sample Application
  13. (Optional) Deploy User Behavior Profiling Application
  14. Verify the Installation
  15. How to Use Sample Application for Risk Evaluation
  16. Apply Post-Installation Checklist

Important!

Consider the following points while installing CA Risk Authentication on a single system:

This section contains the following topics:

Perform a Complete Installation

How to Prepare an Application Server

Deploy the Administration Console

Perform the Bootstrapping Task for the System

Deploy User Data Service (UDS)

Deploy User Behavior Profiling Application

Deploy the Sample Application

How to Use the Sample Application for Risk Evaluation

Apply the Post-Installation Checklist