

CA Risk Authentication UNIX Installation Guide › How to Deploy CA Risk Authentication on a Single System › Verify the Installation
Verify the Installation
Follow these steps:
- Navigate to the following location:
install_location/arcot/logs/
- Open the arcotriskfortstartup.log file in any editor and locate the following command:
- For Solaris: STARTING CA Risk Authentication 8.0
- For RHEL: STARTING CA Risk Authentication 8.0
CA Risk Authentication Service READY
- Open the arcotriskfortcasemgmtserverstartup.log file in any editor and locate the following lines:
- For Solaris: STARTING CA Risk Authentication Case Management 8.0
- For RHEL: STARTING CA Risk Authentication Case Management 8.0
CA Risk Authentication Case Management Service READY
Note: Also ensure that the log files do not contain any FATAL and WARNING messages.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|