Verify if Risk Authentication is installed and used in the environment
search cancel

Verify if Risk Authentication is installed and used in the environment

book

Article ID: 402658

calendar_today

Updated On:

Products

CA Risk Authentication

Issue/Introduction

This KB article provides insights if Risk Authentication Solution part of the Advanced Authentication product suites is installed in the environment and used.

Environment

Risk Authentication

Release: 9.1.5.x

Resolution

There are few ways you can verify if the Risk Authentication solution is used in the environment.

Check the Install Location:

  • Verify at the Install location if Risk binaries are present.

Run the Report from Admin console:

  • Other way to find out Risk solution is utilized by running the report from Admin console, Analyze transactions report is captured for every transaction and if that has data for users, it indicates that the Risk is being utilized.

Verify the Logs:

  • You can also look at the arcotriskfort.log present under ARCOT_HOME/logs directory and check if there are transactions happening.