You can uninstall CA Risk Authentication from the Windows Control Panel or run the uninstaller file to remove CA Risk Authentication from your system.
After you complete the uninstallation process, perform the post-uninstallation tasks to clean up the residual WAR files and entries.
Important! Before you uninstall CA Risk Authentication, first remove its the schema first and then proceed with the uninstallation process.
If you installed both CA Strong Authentication with CA Risk Authentication and you are uninstalling only CA Risk Authentication, follow the guidelines given in the following sections. These guidelines ensure that you do not remove or modify the common components that are also used by CA Strong Authentication.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|