As of Friday October 16th, access to restricted content on this site now requires you to log in with your Genesys account. If you don't have an account, you can request one at these locations: Request MyPartner Portal Account or Request My Support Account.
Jump to: navigation, search

Using TLS with UCS Clients

Purpose: Set up clients of UCS to use TLS.


Procedures differ according to whether the client is integrated into the Genesys system.

Integrated Applications

To connect the client in a secured mode, execute the "Configuring a secure client connection" procedure in the "Genesys TLS Configuration" chapter of the Genesys Security Deployment Guide.

Non-Integrated Applications

Applications that are not integrated into the Genesys system must verify the public key. One way to do this is to import the public key using keytool, as in the following example for a Java client:

  1. Export the certificate. The following is an example command line:
    keytool -export -v -alias -file certificate.cer 
    -keystore certificate.jks -storepass theKeystorePassword 
  2. Import the certificate on all clients of UCS. The following is an example command line:
    keytool -import -alias -file certificate.cer 
    -keystore .keystore -storepass anotherPassword
  3. Copy this certificate (public key) to a location on the client host.
  4. Configure the client to point to this imported certificate. The way to do this depends on the client. As one example, with a Java application, you can start the application with a command line like the following:
     java"<CERTIFICATE_DIRECTORY>\<CERTIFICATE_FILE>" <application_name>
This page was last edited on July 17, 2020, at 15:52.


Comment on this article:

blog comments powered by Disqus