You can uninstall CA Risk Authentication from the Windows Control Panel or run the uninstaller file (Uninstall CA Risk Authentication.exe) to remove CA Risk Authentication from your system.
After you complete the uninstallation process, perform the post-uninstallation tasks to clean up the residual WAR files and entries.
Important! Before you uninstall CA Risk Authentication, first remove its the schema first and then proceed with the uninstallation process.
If you installed both CA Strong Authentication with CA Risk Authentication and you are uninstalling only CA Risk Authentication, follow the guidelines given in the following sections. These guidelines ensure that you do not remove or modify the common components that are also used by CA Strong Authentication.
This section guides you through the steps for uninstalling CA Risk Authentication and its components.
If you plan to uninstall only CA Risk Authentication then, do one of the following steps:
Note: If you plan to uninstall both products, then you can drop both schemas in any order.
Follow these steps::
<install_location>\Arcot Systems\dbscripts\
<install_location>\Arcot Systems\dbscripts\oracle\
<install_location>\Arcot Systems\dbscripts\mssql\
<install_location>\Arcot Systems\dbscripts\mysql\
Note: The drop-arcot-common-8.0.sql script is used to remove the schema for common components. This schema is used by both CA Strong Authentication and CA Risk Authentication. If you have already (successfully) installed CA Strong Authentication, you must not drop this schema because CA Strong Authentication can continue to use it.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|