Riskfort allows configuration of Riskfort rules and provides Reports (such as RIsk Evaluation Detail Activity Report) related to Risk Evaluation with respect to rules configured. At times customers may want to examine the CA Strong Authentication back end data after a Risk Evaluation. CA may change its internal table structures as and when needed. This document is guide to where most of the Risk Evaluation data may exist. Customers may query that data but be aware that any back end tabular data internal to CA Risk Authentication or any CA product cannot be binding and may change. CA Risk Authentication product may use multiple tables to generate Admin reports.
Which RiskFort table contains the results of Risk Evaluation that are portrayed in Risk Evaluation Report ?
CA Risk Authentication Server
The CA Risk Authentication back-end database table that contains such information is ARSYSAUDITLOG table. The column named MATCHEDRULE captures the results as a string that can be parsed. Columns that should be examined are prefixed with the string "RESULT".