Release Notes
Release Notes
View AllGetting Started
provides a secure, user-convenient, and cost-effective way to protect mobile and web applications. The solution allows your organizations to silently and transparently collect data and assess risk based on device identification, geolocation and user behavior, among other factors. also provides a wide variety of software-based, two-factor authentication credentials to make logins more secure. Combining risk assessment and multi-factor credentials enable an intelligent, layered security approach to prevent inappropriate access and online identity fraud with the best-in-class user experience.
View AllInstalling
Includes steps to acquire, install, deploy and configure your product.
View AllUpgrading
Upgrade product to the current version.
View AllBuilding
This section provides various information on various developer tools, SDKs, APIs, and more to help you build your custom applications.
View AllClient Guides
View AllPerformance Tuning
This document outlines the CA Advanced Authentication performance tuning steps and requirements.
View AllProactive Notification Advisory
The purpose of this Advisory is to inform you of a potential problem that has been identified with Sequence ID's for CA Advanced Authentication.
View AllTroubleshooting
Contains troubleshooting information
View AllClient Release Notes
To secure online transactions from Man-in-the-Middle (MITM) and other attacks, Strong Authentication provides client applications that are based on AuthID and Mobile OTP credentials. These software credentials provide two-factor authentication and are based on the patented Cryptographic Camouflage technique for securely storing keys. You can develop your own client application by using the Software Development Kit (SDK) related documentation for the specific SDK.
View AllClients Reference Material
Information related to the following credentials is covered in this section:
View AllAdditional Resources
Includes educational resources, product references and support information.
View AllThird-Party Software Acknowledgments
All third-party software has been used in accordance with the terms and conditions for use, reproduction, and distribution as defined by the applicable license agreements.
View AllEnd User License Agreement (EULA)
End User License Agreement (EULA)
View AllDocumentation Legal Notice
Provides the documentation legal notice
View All