|Maintenance Notice - PDF Generation|
|Dynamic PDF generation for web-based content is temporarily unavailable. This maintenance affects dynamic PDF files that are generated from either the HTML-based page or manual that you are viewing. Links that normally allow this functionality have been hidden, and will reappear as soon as the feature is restored.
Using TLS with UCS Clients
Purpose: Set up clients of UCS to use TLS.
Procedures differ according to whether the client is integrated into the Genesys system.
To connect the client in a secured mode, execute the "Configuring a secure client connection" procedure in the "Genesys TLS Configuration" chapter of the Genesys Security Deployment Guide.
Applications that are not integrated into the Genesys system must verify the public key. One way to do this is to import the public key using keytool, as in the following example for a Java client:
- Export the certificate. The following is an example command line:
keytool -export -v -alias hostname.example.com -file certificate.cer -keystore certificate.jks -storepass theKeystorePassword
- Import the certificate on all clients of UCS. The following is an example command line:
keytool -import -alias hostname.example.com -file certificate.cer -keystore .keystore -storepass anotherPassword
- Copy this certificate (public key) to a location on the client host.
- Configure the client to point to this imported certificate. The way to do this depends on the client. As one example, with a Java application, you can start the application with a command line like the following:
java -Djavax.net.ssl.trustStore="<CERTIFICATE_DIRECTORY>\<CERTIFICATE_FILE>" <application_name>