Explicit Enrollment
In case of explicit enrollment, explicitly call CA Risk Authentication createUserRequest message in the ArcotUserRegistrySvc Web service from your application code to create a user in CA Risk Authentication database. You can call this function either before (Scenario 1) or after (Scenario 2) you perform risk evaluation (by using the evaluateRisk() call.).
aatest
In case of
explicit enrollment
, explicitly call CA Risk Authentication createUserRequest message in the ArcotUserRegistrySvc Web service from your application code to create a user in CA Risk Authentication database. You can call this function either before
(Scenario 1) or after
(Scenario 2) you perform risk evaluation (by using the evaluateRisk() call.).Scenario 1
The steps for the explicit enrollment workflow, if you call the createUserRequest message in the ArcotUserRegistrySvc Web service
before
evaluateRisk() function are:- User logs in to your online application.Your system validates if the user exists in your system. If the user name is not valid, then your application must take appropriate action.
- Your application calls CA Risk Authentication createUserRequest message.At this stage, your application must make an explicit call to the createUserRequest message in the ArcotUserRegistrySvc Web service. In this call, you must pass all pertinent user details, such as username, last name, organization, email, and personal assurance message (PAM) to CA Risk Authentication.Book:See "Managing Users and Accounts" in theCA Risk Authentication Web Services Developer sectionfor detailed information about the createUserRequest message.
- CA Risk Authentication creates the user in the database.If the createUserRequest call was successful, CA Risk Authentication creates the user record in the CA Risk Authentication database. User is enrolled with CA Risk Authentication.
- Your application collects information required by CA Risk Authentication.At this stage, your application collects information from the user system that is used by CA Risk Authentication for analyzing risk:
- User system informationthat includes operating system, platform, browser information (such as browser language, HTTP header information), locale, and screen settings. Your application uses CA Risk Authentication Utility Script called Riskminder-client.js to collect this information.
- Device informationthat includes Device ID, which is stored on the end user device.
- Transaction informationthat includes the name of the channel being used by the user, a numeric identifier for the transaction, and some other information about the transaction.
- Location informationthat includes IP address and Internet Service Provider related information.
- (Optionally, if you are using additional information)Additional Inputsthat are specific to custom rules or the channel selected.
- Your application calls CA Risk Authentication’s evaluateRisk() for risk analysis.In this case, because you enrolled the userbeforeperforming risk analysis, the CA Risk Authentication system "knows" the user and does not generate the ALERT advice. Refer to "Risk Evaluation Workflows" for more information.
- CA Risk Authentication performs risk analysis.CA Risk Authentication generates a risk score and an advice.
- Your application stores the Device ID on the end user’s device.Your application must store the Device ID returned by evaluateRisk() as a cookie on the device that the end user is using for the current transaction.The following figure illustrates the explicit enrollment workflow when you make the createUserRequest message call before the evaluateRisk() call.
Scenario 2
The steps for the explicit enrollment workflow, if you call the CreateUserRequest message
after
evaluateRisk() function, are:- User logs into your online application.Your system validates if the user exists in your system. If the user name is not valid, then your application must take appropriate action.
- Your application collects information required by CA Risk Authentication.At this stage, your application collects information from the user’s system that is used by CA Risk Authentication for analyzing risk:
- User system informationthat includes operating system, platform, browser information (such as browser language, HTTP header information), locale, and screen settings. Your application uses CA Risk Authentication Utility Script called Riskminder-client.js to collect this information.
- Device informationthat includes Device ID, which is stored on the end user device.
- Location informationthat includes IP address and Internet Service Provider related information.
- (Optionally, if you are using additional information)Additional Inputsthat are specific to custom rules or the channel selected.
- Your application calls the CA Risk Authentication evaluateRisk() function.At this stage, your application must call the evaluateRisk() function in riskfortAPI. In this call, you must pass all the user and device information that you collected in the preceding step to CA Risk Authentication.
- CA Risk Authentication performs risk analysis.CA Risk Authentication performs risk analysis for the user and generates an advice. In this case, because the user is not yet "known" to the CA Risk Authentication system, the ALERT advice is generated.
- Your application calls the CA Risk Authentication’s createUserRequest message.At this stage, your application must make an explicit call to the createUserRequest message in the ArcotUserRegistrySvc Web service. In this call, you must pass all pertinent user details, such as user’s name, last name, organization, e-mail, and their personal assurance message (PAM) to CA Risk Authentication.Book:See "Managing Users and Accounts" in theCA Risk Authentication Web Services Developer sectionfor detailed information about the createUserRequest message.

- CA Risk Authentication creates the user in the database.If the createUserRequest call was successful, then CA Risk Authentication creates the user record in the CA Risk Authentication database. With this, user is enrolled with CA Risk Authentication.
- Your application calls the CA Risk Authentication evaluateRisk() function again.At this stage, your application must again call the evaluateRisk() function in riskfortAPI. In this call, you must ensure that you pass all the user and device information that you collected in Step 2 to CA Risk Authentication.
- CA Risk Authentication performs risk analysis for the user.In this case, CA Risk Authentication executes the rules and generates the risk score and the advice.
- Your application stores the Device ID on the end-user system.Your application must store the Device ID returned by evaluateRisk() as a cookie on the device that the end user is using for the current transaction.The following figure illustrates the explicit enrollment workflow when you call the CreateUserRequest message before the evaluateRisk() call.
