Editing the Gathered User Information

Sample Application also allows you to edit the collected Device ID information of an existing user. This enables you to simulate real-life situations a user might run in to. For example, if you change the IP address of an enrolled user, then you can simulate that the user is logging in from a different location.
aatest
2327748
Sample Application also allows you to edit the collected Device ID information of an existing user. This enables you to simulate real-life situations a user might run in to. For example, if you change the IP address of an enrolled user, then you can simulate that the user is logging in from a different location.
For demonstration purposes, the data that you can edit by using Sample Application is:
  • IP Address
  • Device ID
After a user’s information is updated, they must undergo the risk-evaluation procedure. In such cases, CA Risk Authentication typically generates the INCREASEAUTH advice.
To edit a user’s information by using Sample Application, perform the following tasks:
  1. On the CA Risk Authentication Sample Application page, Click
    Risk Evaluation
    to open the Risk Evaluation input page.
  2. Specify the
    User Name
    , and if required the
    User organization
    .
  3. Click
    Edit Inputs
    to open the Edit Risk-Evaluation Inputs page.
  4. Change the IP address in the
    IP Address of My Machine
    field or the Device ID in the
    Device ID of My Machine
    field, or both.
  5. Click
    Evaluate Risk
    to generate the Risk Score and Risk Advice for the specified user.
    The Risk Evaluation Results page should appear with an ALERT advice.
  6. Click
    Store DeviceID
    to store the specified type of Device ID information on the end user's device.
  7. Click
    Next Step
    to perform post evaluation for the specified user.
    The Post Evaluation page appears.
  8. Specify the result of secondary authentication (to simulate the scenario where CA Risk Authentication receives the result of this additional authentication) in the
    Result of Secondary Authentication
    field.
  9. Click
    Post Evaluate
    to generate and display the final Risk Advice for your application.
    The final result is displayed in the Post Evaluation Results frame of the page.