Previous Topic: One-Way SSLNext Topic: One-Way SSL


Two-Way SSL

To set up two-way SSL between the Risk Evaluation SDK and Risk minder Server, you must first upload the root certificates for the CAs trusted by Risk Authentication, then configure the Risk Authentication Native (SSL) protocol by using Administration Console, and finally configure the riskfort.risk-evaluation.properties file.

To configure two-way SSL between Java SDK and CA Risk Authentication Server:

  1. Enable the application server where Java SDKs are deployed for SSL communication.

    Refer to your application server vendor documentation for detailed information.

  2. Log in to CA Advanced Authentication using a Master Administrator account.
  3. Activate the Services and Server Configurations tab in the main menu.
  4. Ensure that the Risk Authentication tab is active.
  5. Under the Instance Configuration section, click the Protocol Configuration link to display the Protocol Configuration page.
  6. Under System Configuration, click the Trusted Certificate Authorities link to display the CA Risk Authentication Server Trusted Certificate Authorities page.
  7. Set the following information on the page:
  8. Under the Instance Configuration section, click the Protocol Configuration link to display the Protocol Configuration page.
  9. Select the Server Instance for which you want to configure the SSL.
  10. In the List of Protocols section, click the Native (SSL) protocol link to display the page for configuring the protocol.
  11. Configure the following fields:
    1. Ensure that the Protocol Status is Enabled.
    2. If not, then select the Change Protocol Status option and then from the Action list, select Enable.
    3. Ensure that the Port is set to the correct SSL port value.
    4. Select SSL from the Transport list.
    5. If you want to store the SSL key on an HSM, then select the Key in HSM option.
    6. Click the Browse button adjacent to the Server Certificate Chain field to select the CA Risk AuthenticationServer root certificate.
    7. (Only if you did not select the Key in HSM option) Click the Browse button adjacent to the Server Private Key field to select the CA Risk Authentication Server private key.
  12. Select the Client Store that you created in Step 7.
  13. Click the Save button.
  14. Restart CA Risk Authentication Server:

    On Windows: Click the Start button, navigate to Settings, Control Panel, Administrative Tools, and Services. Double-click Risk Authentication Service from the listed services.

    On UNIX Platforms: Navigate to <install_location>/arcot/bin/ and specify the ./riskfortserver start command in the console window.

  15. Navigate to the following location:

    Windows:

    <install_location>\Arcot Systems\sdk\java\properties\

    Unix-Based Platforms:

    <install_location>/arcot/sdk/java/properties/

  16. Open the Risk Authentication.risk-evaluation.properties file in an editor window of your choice.

    Note: Refer to appendix, "Configuration Files and Options" in CA Risk Authentication Installation and Deployment Guide for more information on the riskfort.risk-evaluation.properties file.

  17. Set the following parameters:
  18. Save the changes and close the file.
  19. Restart the application server where your Java SDK is deployed.
  20. Verify that CA Risk Authentication Server is enabled for SSL communication by performing the following steps:
  21. Navigate to the following location:
    1. Open the arcotriskfortstartup.log file in a text editor.
    2. Check for the following line:

      Started listener for [Risk Authentication Native (SSL)] [7681] [SSL] [Risk Authentication]

    3. If you located this line, then two-way SSL was set successfully.
    4. Close the file.

New Topic (255)

To enable CA Risk Authentication Web services for SSL communication, you must first configure your client that accesses the Web service for SSL communication, then configure the Transaction Web Service protocol by using CA Advanced Authentication.