

CA Risk Authentication Administration Guide › Managing Organization Specific CA Risk Authentication Configurations › Configuring CA Risk Authentication for an Organization
Configuring CA Risk Authentication for an Organization
In addition to creating and assigning rulesets, as an Organization Administrator (OA), you can perform most of the tasks mentioned in "Managing Global Configurations". These include:
- Configuring the out-of-the-box rules for the organizations in your scope.
See "Configuring Out-of-the-Box Rules" for detailed steps.
- Deploying new rules for the organizations in your scope.
See "Adding New Rules" for detailed steps.
- Configuring Callouts for the organizations in your scope.
See "Configuring Callouts" for detailed steps.
- Migrating configurations to production for the organizations in your scope.
See "Migrating to Production" for detailed steps.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|