

CA Risk Authentication UNIX Installation Guide › Verify the Installation › Use the Sample Application for Risk Evaluation Operations › Perform Risk Evaluation and Post Evaluation for a Known User
Perform Risk Evaluation and Post Evaluation for a Known User
To perform Risk Evaluation and post Evaluation for a known user, perform the following steps:
- On the Main Page of Sample Application, click Evaluate Risk.
- Enter the following details:
- User Name
-
Specifies the name of the user that you created for Creating Users.
- User Organization
-
Specifies the organization to which the user belongs to.
- Channel
-
Specifies the Channel from which the transaction originated. This is an optional field.
- Click Evaluate Risk.
The Risk Advice typically is INCREASEAUTH.
- Click Store DeviceID to store the specified type of Device ID information on the end user's device.
- Click Next Step to perform Post Evaluation:
- Select the Result of Secondary Authentication from the list.
- Edit the Association Name, if necessary.
- Click Post Evaluate to display the final advice.
Note: If you repeat Step 1 through Step 5, the Risk Advice changes to ALLOW on the Risk Evaluation Results page.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|