Previous Topic: Examples of Using the ToolNext Topic: About the Log Files


CA Risk Authentication Logging

To effectively manage the communication between CA Risk Authentication Server and your application, it is necessary to get information about the activity and performance of the Server and other components, as well as any problems that might have occurred.

This appendix describes the log files supported by CA Risk Authentication, the severity levels that you will see in these files, and the formats of these log files. It covers the following topics: