In a distributed system installation you install the CA Risk Authentication Server on the first system.
We recommend Custom Installation for advanced users as it allows selected components installation.
For successful installation, the user account that you plan to use for the installation must belong to the Administrators group.
Note: Verify that all prerequisite software components are installed and the database is set up, as described in Prepare for Installation.
Follow these steps:
prompt> sh Arcot-RiskFort-8.0-Linux-Installer.bin
Note: If you are running the installer with root login, then a warning message appears. Enter Y to continue, or enter N to quit the installation. If you exit the installer screen, then run the installer again.
Note: If you press n, then a warning message is displayed and the installation is aborted.
Note: The installation directory name that you specify must not contain any spaces. Otherwise, some CA Risk Authentication scripts and tools may not function as intended.
The installer displays the installation options that are supported by CA Risk Authentication.
Note: If you selected option 1 or 2, then a new directory named arcot is created in the specified location.
The following table gives the information on the components:
|
Component |
Description |
|---|---|
|
Risk Evaluation Server |
It installs the core Processing engine (CA Risk Authentication Server) that serves the following requests from Administration Console:
In addition, this component also installs the following Web services that have been built into the server:
|
|
CA Risk Authentication Case Management Server |
It installs the core Queuing engine (CA Risk Authentication Case Management Server) that allocates cases to the Customer Support Representatives (CSRs) who work on these cases. Note: At any given point in time, all instances of Administration Console can only connect to this single instance of CA Risk Authentication Case Management Server. |
|
CA Risk Authentication SDKs and Sample Application |
It provides programming interfaces (in form of APIs and Web services) that can be invoked by your application to forward risk evaluation requests to CA Risk Authentication Server. This package comprises the following sub-components:
Refer to Configuring CA Risk Authentication SDKs and Web Services for more information. |
|
Administration Console |
This provides the Web-based interface for managing CA Risk Authentication Server and risk evaluation-related configurations. |
|
User Data Service |
It installs UDS that acts as an abstraction layer for accessing different types of user repositories, such as relational databases (RDBMSs) and directory servers (LDAPs.) |
|
User Behavior Profiling |
It measures the similarity or dissimilarity of the current transaction to prior access by the same user, or that of their peer group in cases of insufficient data. |
Example: To install CA Risk Authentication Server, CA Risk Authentication Case Management Server, and Administration Console (without the SDKs and Sample Application) on the current system, you specify:
1,2,4,5
Note: If the Server component was not selected for installation on this screen, then the screens in Step 11 through Step 16 are not shown.
If you are installing in a location where an Advanced Authentication product is already installed, then the installer uses the same database configuration as the installed product. As a result, the screens in Step 11 through Step 15 are not shown.
Note: CA Risk Authentication is now certified to work with Oracle Real Application Clusters (Oracle RAC). To use Oracle RAC with your CA Risk Authentication Installation, select Oracle Database in this step, perform the next step (Step 12), and then perform the steps in Configuring CA Risk Authentication for Oracle RAC.
|
Parameter |
Description |
|---|---|
|
ODBC DSN |
The installer creates the DSN by using this value. CA Risk Authentication Server then uses this DSN to connect to the database. The recommended value to enter is arcotdsn. Note: Database Source Name (DSN) specifies the information that is required to connect to a database by using an ODBC driver. This information includes database name, directory, database driver, User ID, and password. |
|
Server |
The host name or IP address of the CA Risk Authentication datastore. Default Instance
Named Instance
|
|
User Name |
The database user name for CA Risk Authentication to access the database. This name is specified by the database administrator. (MS SQL Server, typically, refers to this as login.) This user must have the create session and DBA rights. Note: The User Name for the Primary and Backup DSNs must be different. |
|
Password |
The password associated with the User Name you specified in the previous field and which is used by CA Risk Authentication to access the database. This password is specified by the database administrator. |
|
Database |
The name of the MS SQL database instance. |
|
Port Number |
The port at which the database listens to the incoming requests. The default port is 1433. However, if you would like to specify another port, enter the port value in this field. |
|
Parameter |
Description |
|---|---|
|
ODBC DSN |
The installer creates the DSN by using this value. CA Risk Authentication Server then uses this DSN to connect to the CA Risk Authentication database. The recommended value to enter is arcotdsn. Note: Database Source Name (DSN) specifies the information that is required to connect to a database by using an ODBC driver. This information includes database name, directory, database driver, User ID, and password. |
|
User Name |
The database user name for CA Risk Authentication to access the database. This name is specified by the database administrator. (MS SQL Server, typically, refers to this as login.) This user must have the create session and DBA rights. Note: The User Name for the Primary and Backup DSNs must be different. |
|
Password |
The password associated with the User Name you specified in the previous field and which is used by CA Risk Authentication to access the database. This password is specified by the database administrator. |
|
Service ID |
The Oracle System Identifier (SID) that refers to the instance of the Oracle database running on the server. |
|
Port Number |
The port at which the database listens to the incoming requests. The default port at which an Oracle database listens is 1521. However, if you would like to specify another port, enter the port value in this field. |
|
Host Name |
The host name or IP address of the CA Risk Authentication datastore.
|
|
Parameter |
Description |
|
ODBC DSN |
The installer creates the DSN by using this value. CA Risk Authentication Server then uses this DSN to connect to the CA Risk Authentication database. The recommended value to enter is arcotdsn. Note: Database Source Name (DSN) specifies the information that is required to connect to a database by using an ODBC driver. This information includes database name, directory, database driver, User ID, and password. |
|
Server |
The host name or IP address of the CA Risk Authentication datastore. Default Instance
Named Instance
|
|
User Name |
The database user name for CA Risk Authentication to access the database. This name is specified by the database administrator. This user must have the create session and DBA rights. Note: The User Name for the Primary and Backup DSNs must be different. |
|
Password |
The password associated with the User Name you specified in the previous field and which is used by CA Risk Authentication to access the database. This password is specified by the database administrator. |
|
Database |
The name of the MySQL database instance. |
|
Port Number |
The port at which the database listens to the incoming requests. The default port at which an MySQL database listens is 3306. However, if you would like to specify another port, enter the port value in this field. |
See the tables in the previous step for database-specific information about the tasks to be performed.
Specifies the password for the Master Key, which is stored at <install_location>\Arcot Systems\conf\securestore.enc and is used to encrypt the data stored in the database. By default, this value is set to MasterKey.
Note: If you want to change the value of Master Key after the installation, then you must regenerate securestore.enc with a new Master Key value. See Changing Hardware Security Module Information After the Installation for more information.
Identifies if you use a Hardware Security Module (HSM) to encrypt the sensitive data.
If you do not select this option, then by default, the data is encrypted by using the Software Mode.
Specifies the password to connect to the HSM.
Specifies HSMs that you plan to use between two options, Luna HSM and nCipher netHSM.
Specifies the following HSM information:
For Luna (cryptoki.dll) and for nCipher netHSM (cknfast.dll), specify the absolute path and name of the file.
For Luna, the default value is 0.
For nCipher netHSM, the default value is 1.
The installation may take several minutes, because the installer does the following tasks in the back-end:
After the preceding tasks are completed successfully, the Installation Complete screen appears.
After you complete the installation, you can access the installation log file (Arcot_RiskFort_Install_<timestamp>.log) in the <install_location> directory.
Example: If you had specified the C:\Program Files directory as the installation directory, then the installation log file is created in the C:\Program Files directory.
If the installation fails for some reason, then error messages are recorded in this log file.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|