Previous Topic: Deploy User Behavior Profiling ApplicationNext Topic: Deploy the Sample Application on the Second System


Verify the Installation

Follow these steps:

  1. Navigate to the following location:
    install_location/arcot/logs/
    
  2. Open the arcotriskfortstartup.log file in any editor and locate the following command:

    CA Risk Authentication Service READY

  3. Open the arcotriskfortcasemgmtserverstartup.log file in any editor and locate the following lines:

    CA Risk Authentication Case Management Service READY

Note: Also ensure that the log files do not contain any FATAL and WARNING messages.

Install CA Risk Authentication on the Second System

After installing CA Risk Authentication Server and Administration Console, install the other remaining components on the second system. The specific components to install are determined when you performed your planning explained in Chapter Plan for Deployment.

Follow these steps::

  1. Copy the installer file on the target (second) system:

    For Solaris:

    CA Risk Authentication-8.0-Solaris-Installer.bin

    For Linux:

    CA Risk Authentication8.0--Linux-Installer.bin

  2. Verify that you have the permissions required to run the installer. If not, run the following command:

    For Solaris:

    chmod a=rx Arcot-RiskFort-8.0-Solaris-Installer.bin

    For Linux:

    chmod a=rx Arcot-RiskFort-8.0-Linux-Installer.bin

  3. Run the installer as follows:

    For Solaris:

    prompt> sh Arcot-RiskFort-8.0-Solaris-Installer.bin

    For Linux:

    prompt> sh Arcot-RiskFort-8.0-Linux-Installer.bin

  4. Follow the installer instructions from Step 2 in Installing on the First System until you reach the Choose Install Set screen.
  5. Select the components.

    Note: Typically, install the Java SDKs for Risk Evaluation and Sample Application.

  6. Follow the steps from Step 7 to Step 13 in Install on the First System to complete the installation.