Previous Topic: How to Use the Sample Application for Risk EvaluationNext Topic: Install on the First System


How to Deploy CA Risk Authentication on Distributed System

Use the CA Risk Authentication 8.0 InstallAnywhere Wizard to install the CA Risk Authentication components. This Wizard supports Complete and Custom installation types. To install and configure CA Risk Authentication in a distributed environment, use the Custom option when you run the installer.

The following illustration shows the tasks to perform for installing CA Risk Authentication 8.0:

RA_Distributed_Installation

Perform the following tasks:

  1. Install on the First System
  2. Run the Database Scripts
  3. How to Prepare the Application Server
  4. Deploy the Administration Console
  5. Log in to Administration Console
  6. Perform the Bootstrapping Tasks
  7. Start CA Risk Authentication Server Service
  8. Start CA Risk Authentication Case Management Service
  9. Verify CA Risk Authentication Server Installation
  10. Deploy User Data Service
  11. Deploy User Behavior Profiling Application
  12. Install CA Risk Authentication on the Second System
  13. Deploy the Sample Application on the Second System
  14. Configure Sample Application to Communicate with CA Risk Authentication Server
  15. Use Sample Application for Risk Evaluation Operations
  16. Apply Post-Installation Checklist

Important!

Keep the following points in mind while installing CA Risk Authentication on a single system or in a distributed environment:

This section contains the following topics:

Install on the First System

Run the Database Scripts

How to Prepare the Application Server