Previous Topic: Requirements for Java-Dependent ComponentsNext Topic: Run the Database Scripts


How to Deploy CA Risk Authentication on a Single System

To install the CA Risk Authentication components, use the CA Risk Authentication 8.0 InstallAnywhere Wizard. This wizard supports Complete and Custom installation types.

Note: To install and configure CA Risk Authentication on a single computer, use the Complete option when you run the installer.

The following illustration shows the tasks to perform for installing CA Risk Authentication 8.0:

RA_Single_Installation

Perform the following tasks:

  1. Perform a Complete Installation
  2. Verify the Database Setup
  3. Run the Database Scripts
  4. Prepare an Application Server
  5. Deploy the Administration Console
  6. Log in to Administration Console
  7. Perform the Bootstrapping Tasks for the System
  8. Start the CA Risk Authentication Server Service
  9. Start CA Risk Authentication Case Management Service
  10. Deploy UDS
  11. Deploy User Behavior Profiling Application
  12. Deploy the Sample Application
  13. (Optional) Deploy User Behavior Profiling Application
  14. Verify the Installation
  15. How to Use Sample Application for Risk Evaluation
  16. Apply Post-Installation Checklist

Important!

Consider the following points while installing CA Risk Authentication on a single system:

This section contains the following topics:

Perform a Complete Installation

How to Prepare an Application Server

Deploy Administration Console

Perform the Bootstrapping Task for the System

Start the CA Risk Authentication Server Service

Start the CA Risk Authentication Case Management Service

Deploy User Data Service [USD]

Deploy User Behavior Profiling Application

Deploy the Sample Application

Verify the Installation

How to Use the Sample Application for Risk Evaluation

Apply the Post-Installation Checklist

Perform a Complete Installation

To install CA Risk Authentication use a single user account for installation from the Administrators group. Otherwise, the critical steps in the installation, do not complete successfully, though the installation may complete without any errors.

Perform a Complete installation to install all of the components of the CA Risk Authentication package. These components include CA Risk Authentication Server and the scripts that are required for setting up the database.

Follow these steps:

  1. Log in and navigate to the directory where you untarred the installer.
  2. Verify that you have the permission to run the installer. If not, run the following command:
  3. Run the installer by enter the following command and then pressing Enter:
  4. Click Next.
  5. Carefully read the License Agreement and press Enter to go to the next screen of the license text. You may have to press Enter multiple times.

    Enter y to accept the acceptance of License Agreement and to continue with the installation.

    Note: If you press n, then a warning message is displayed and the installation is stopped.

    The installer now checks if other CA products exist on the system.

    If the installer detects an existing CA product installation (an existing ARCOT_HOME), then:

  6. Click Next.
  7. Perform one of the following steps for choosing the installation location:
  8. (Applicable only if you are installing on a system that already has an existing Advanced Authentication product installed) Select one of the following options, and press Enter:
  9. Enter 1 to select the default (Complete) installation that installs all components, and press Enter.
  10. Enter the number corresponding to your choice of database (1. MS SQL Server 2. Oracle Database 3. MySQL), and press Enter.

    Based on your database choice the following screens get displayed:

  11. Complete the following information, and press Enter:
  12. For backup database access configuration , perform one of the following steps:
  13. Select the encryption mode and enter the information that is used for encryption.
    Master Key

    Specifies the password for the Master Key which is used to encrypt the data stored in the database.

    Default Value: MasterKey

    Note: If you want to change the value of Master Key after the installation, then regenerate securestore.enc with a new Master Key value. See Changing Hardware Security Module Information After the Installation for more information.

    Configure HSM

    (Optional) Specifies if you will use a Hardware Security Module (HSM) to encrypt the sensitive data. If you do not select this option, then, by default, the data is encrypted by using the Software Mode.

    PIN

    Identifies the password to connect to the HSM.

    Choose Hardware Module

    Specifies one of the following HSMs:

    • 1. Luna HSM
    • 2. nCipher netHSM
    HSM Parameters

    Set the following HSM information:

    Shared Library: The absolute path to the PKCS#11 shared library corresponding to the HSM.

    For Luna (cryptoki.dll) and for nCipher netHSM (cknfast.dll), specify the absolute path and name of the file.

    Storage Slot Number: The HSM slot where the 3DES keys used for encrypting the data are available.

    • For Luna, the default value is 0.
    • For nCipher netHSM, the default value is 1.

    Note: The HSM parameter values are recorded in arcotcommon.ini, which is available in <install_location>\Arcot Systems\conf\. To change these values after installation, edit this file, as discussed in Configuration Files and Options.

    Click Next.

  14. Review the information in the Pre-Installation Summary screen, and press Enter.
  15. Press Enter to begin Installation. If you would like to change a configuration on any of the previous screens, click Back until you reach the screen. Make the required changes, and press Enter to proceed to continue.
  16. Press Enter. This may take several minutes, because the installer now does the following tasks:

    After the preceding tasks are completed successfully, the Installation is complete.

  17. Press Enter to exit the installer.

    You may have to wait for a few minutes (for the installer to clean up temporary files) until the prompt reappears.

  18. Verify that UTF-8 support is enabled. To do so perform the following steps:
    1. Navigate to the <install_location>/arcot/odbc32v70wf/odbc.ini file.
    2. Locate the [ODBC] section.
    3. Ensure that the IANAAppCodePage=106 entry is present in the section.
    4. If you do not find this entry, then add it.
    5. Save and close the file.

Note: After the installation is completed, perform the post-installation tasks that are discussed in Performing Post-Installation Tasks.

Installation Logs

After installation, you can access the installation log file (Arcot_RiskFort_Install_<timestamp>.log) in the <install_location> directory. For example, if you had specified the /opt directory as the installation directory, then the installation log file is created in the /opt directory.

If the installation fails for some reason, then error messages are recorded in this log file.