

CA RiskMinder UNIX Installation Guide › Deploying RiskMinder On a Single System › Performing Post-Installation Tasks › Using Sample Application › Performing Risk Evaluation and Post Evaluation for a Known User
Performing Risk Evaluation and Post Evaluation for a Known User
To perform risk evaluation and post evaluation for a known user:
- On the Main Page of Sample Application, click Evaluate Risk to open the Risk Evaluation page.
- In the User Name field, specify the name of the user that you created in the section, "Creating Users".
- Specify the user’s organization in the User Organization field.
- (Optional) Specify the Channel from which the transaction originated.
- Click Evaluate Risk to open the Risk Evaluation Results page.
The Risk Advice typically is INCREASEAUTH.
- Click Store DeviceID to store the specified type of Device ID information about the end user's device.
- Click Next Step to perform Post Evaluation:
- Select the Result of Secondary Authentication from the list.
- (Optional) Edit the Association Name.
- Click Post Evaluate to display the final advice.
If you repeat Step 1 through Step 5, the Risk Advice will change to ALLOW on the Risk Evaluation Results page.
Copyright © 2013 CA.
All rights reserved.
 
|
|