Using TLS with UCS Clients
Purpose: Set up clients of UCS to use TLS.
Contents
Overview
Procedures differ according to whether the client is integrated into the Genesys system.
Integrated Applications
To connect the client in a secured mode, execute the "Configuring a secure client connection" procedure in the "Genesys TLS Configuration" chapter of the Genesys Security Deployment Guide.
Non-Integrated Applications
Applications that are not integrated into the Genesys system must verify the public key. One way to do this is to import the public key using keytool, as in the following example for a Java client:
- Export the certificate. The following is an example command line:
keytool -export -v -alias hostname.example.com -file certificate.cer -keystore certificate.jks -storepass theKeystorePassword
- Import the certificate on all clients of UCS. The following is an example command line:
keytool -import -alias hostname.example.com -file certificate.cer -keystore .keystore -storepass anotherPassword
- Copy this certificate (public key) to a location on the client host.
- Configure the client to point to this imported certificate. The way to do this depends on the client. As one example, with a Java application, you can start the application with a command line like the following:
java -Djavax.net.ssl.trustStore="<CERTIFICATE_DIRECTORY>\<CERTIFICATE_FILE>" <application_name>
This page was last edited on July 17, 2020, at 15:52.
Comments or questions about this documentation? Contact us for support!