Previous Topic: Restarting a Server InstanceNext Topic: CA Risk Authentication Components and Their Communication Modes


Configure SSL

By default, CA Risk Authentication components use Transmission Control Protocol (TCP) to communicate with each other. To ensure secure communication between CA Advanced Authentication and CA Risk Authentication Server and between SDKs and CA Risk Authentication Server, you can configure CA Risk Authentication Native and Server Management protocols to support SSL (Secure Socket Layer), which ensures secure communication between applications across insecure media.

The steps to set up SSL between different components of CA Risk Authentication include:

Note: You must follow this order to set up SSL successfully. After completing every step, test whether connection has been set successfully.

  1. Prepare for SSL Communication
  2. Enable SSL Between CA Risk Authentication Server and User Data Service
  3. Enable SSL Between Case Management Queuing Server and User Data Service
  4. Enable SSL Between CA Advanced Authentication and CA Risk Authentication Server
  5. Enable SSL Between CA Advanced Authentication and Case Management Queuing Server
  6. Enable SSL Between Java SDK and CA Risk Authentication Server
  7. Enable SSL Communication Between Risk Evaluation Web Service and CA Risk Authentication Server
  8. Enable SSL Communication Between Administration Web Service and CA Risk Authentication Server
  9. Enable One-Way SSL Between CA Risk Authentication Components and Database