Previous Topic: How to Deploy CA Risk Authentication on a Single SystemNext Topic: Run the Database Scripts


Perform a Complete Installation

To install and configure CA Risk Authentication use a single user account for installation from the Administrators group. Otherwise, the critical steps in the installation, do not complete successfully, though the installation may complete without any errors.

Perform a Complete installation to install all of the components of the CA Risk Authentication package. These components include CA Risk Authentication Server and the scripts that are required for setting up the database.

Follow these steps:

  1. Navigate to the directory where the CA Risk Authentication-8.0-Windows-Installer.exe file is located and double-click the file.
  2. Click Next.
  3. Read the license agreement, select the I accept the terms of the License Agreement option, and click Next.

    The installer now checks if other CA products exist on the system.

    If the installer detects an existing CA product installation (an existing ARCOT_HOME), then:

  4. Click Next.
  5. Select Complete to Install and click Next.
  6. Depending on the type of database you have, select one of the following, and click Next:

    Based on your database choice the following screens get displayed:

  7. Complete the following information:
  8. After you specify the database details, test if you can successfully connect to the database by clicking the Test Data Source button and verify the result of the same in the field below the button.
  9. Click Next.
  10. Select the encryption mode and enter the information that is used for encryption.
    Master Key

    Specifies the password for the Master Key which is used to encrypt the data stored in the database.

    Default Value: MasterKey

    Note: If you want to change the value of Master Key after the installation, then regenerate securestore.enc with a new Master Key value. See Changing Hardware Security Module Information After the Installation for more information.

    Configure HSM

    (Optional) Specifies if you will use a Hardware Security Module (HSM) to encrypt the sensitive data. If you do not select this option, then, by default, the data is encrypted by using the Software Mode.

    PIN

    Identifies the password to connect to the HSM.

    Choose Hardware Module

    Specifies one of the following HSMs:

    • Luna HSM
    • nCipher netHSM
    HSM Parameters

    Set the following HSM information:

    Shared Library: The absolute path to the PKCS#11 shared library corresponding to the HSM.

    For Luna (cryptoki.dll) and for nCipher netHSM (cknfast.dll), specify the absolute path and name of the file.

    Storage Slot Number: The HSM slot where the 3DES keys used for encrypting the data are available.

    • For Luna, the default value is 0.
    • For nCipher netHSM, the default value is 1.

    Note: The HSM parameter values are recorded in arcotcommon.ini, which is available in <install_location>\Arcot Systems\conf\. To change these values after installation, edit this file, as discussed in Configuration Files and Options.

    Click Next.

  11. Review the information in the Pre-Installation Summary screen, and click Next.
  12. Click Install to begin the installation process.

    The Microsoft Visual C++ 2010 x86 Redistributable Setup screen appears. This screen appears only if the current system where you are installing CA Risk Authentication does not have Microsoft Visual C++ 2010 x86.

  13. On the Microsoft Visual C++ 2010 x86 Redistributable Setup screen, perform the following steps:
    1. Select I have read and accept the license terms, and click Install.

      The Installation Progress screen appears. This may take a few seconds. After some time the Installation Is Complete screen appears.

    2. Click Finish to close the Microsoft Visual C++ 2010 x86 Redistributable Setup dialog box and continue with the installation.

    The Installing CA Risk Authentication screen appears.

    After some time the Installation Complete screen appears.

  14. Click Done to complete the CA Risk Authentication installation.

Note: After the installation is completed, perform the post-installation tasks that are discussed in Performing Post-Installation Tasks.

Installation Logs

After installation, you can access the installation log file (CA_CA Risk Authentication_Install_<timestamp>.log) in the <install_location> directory. For example, if you had specified the C:\Program Files directory as the installation directory, then the installation log file is created in the C:\Program Files directory.

If the installation fails for some reason, then error messages are recorded in this log file.