This page was last edited on July 17, 2020, at 15:52.
Comments or questions about this documentation? Contact us for support!
Purpose: Gathers together topics relating to security, encryption, authentication, and the like.
For database encryption, Genesys recommends using Transparent Data Encryption (TDE):
Do not use column-level encryption.
You can use configuration options in the log-filter and log-filter-data sections to control how or whether user data keys appear in the logs.
UCS/CS supports Transport Layer Security (TLS) in various ways:
When clients connect to UCS, there are two possible modes of authentication, specified by configuration options in the authentication section.
These and all other UCS/CS options are described on the Configuration Options page.
Role-based access control is available in UCS/CS starting in release 8.1.0. See