In larger enterprises, where the deployments are complex and high availability is a must, RiskMinder can be implemented to provide adaptive authentication for the large user base, as well as for the administrators who manage the system. In these deployments, RiskMinder components are installed on different servers. This is done for security, performance, high availability, and to enable multiple applications to use the adaptive-authentication capability.
Note: See "Planning the Deployment" in the CA RiskMinder Installation and Deployment Guide for more information on this type of deployments.
The following table summarizes the typical characteristics of this deployment type.
|
Characteristic |
Details |
|---|---|
|
Deployment Type |
|
|
Geographic Expanse |
Distributed across the globe |
|
Deployment Requirements |
|
The quick overview of the steps to set up and start managing strong authentication for your users is:
Note: See "Deploying RiskMinder on a Distributed System" in the CA RiskMinder Installation and Deployment Guide for more information on installing RiskMinder, deploying the WAR files, and performing other post-installation tasks in a distributed environment.
Note: See "Bootstrapping the System" in the CA RiskMinder Installation and Deployment Guide for more information.
See "Configuring Administration Console Settings" for more information.
See "Managing RiskMinder Server Instances" for more information.
See "Configuring Communication Protocols" for more information.
See "Creating and Activating Organizations" for more information.
See "Managing Global Configurations" for more information.
See "Creating Users" for more information.
See "Creating Trust Stores" for more information.
See "Configuring Callouts" for more information.
With this, your system is set for risk evaluation. You can now manage the system ("Managing RiskMinder Server Instances"), administrators ("Managing Administrators"), and users ("Managing Users").
|
Copyright © 2013 CA.
All rights reserved.
|
|