Starting with this release, all Risk Evaluation Web services calls are protected from rogue requests through authentication and authorization. As a result, all requests to the Risk Evaluation Web services are authenticated for valid credentials after which all requests are then validated for appropriate privileges to access the Web services.
|
Copyright © 2013 CA.
All rights reserved.
|
|