Where are the results of a RiskFort/Risk Authentication Risk Evaluation Report?
search cancel

Where are the results of a RiskFort/Risk Authentication Risk Evaluation Report?

book

Article ID: 113054

calendar_today

Updated On:

Products

CA Advanced Authentication CA Advanced Authentication - Risk Authentication (RiskMinder / RiskFort) CA Risk Authentication

Issue/Introduction

Riskfort allows configuration of Riskfort rules and provides Reports (such as RIsk Evaluation Detail Activity Report) related to Risk Evaluation with respect to rules configured. At times customers may want to examine the CA Strong Authentication back end data after a Risk Evaluation. CA may change its internal table structures as and when needed. This document is a guide to where most of the Risk Evaluation data may exist.

Customers may query that data but be aware that any back end tabular data internal to CA Risk Authentication or any CA product cannot be binding and may change. CA Risk Authentication products may use multiple tables to generate Admin reports. 

Which RiskFort table contains the results of Risk Evaluation that are portrayed in Risk Evaluation Report ? 

Environment

Environment: 9.xx.xx (Applicable to all the supported releases)
Component: CA Risk Authentication Server 

Resolution

The CA Risk Authentication back-end database table that contains such information is ARSYSAUDITLOG table.

The column named MATCHEDRULE captures the results as a string that can be parsed.

Columns that should be examined are prefixed with the string "RESULT". 

Additional Information

None.