This page was last edited on April 10, 2015, at 20:03.
Comments or questions about this documentation? Contact us for support!
Genesys software allows you to integrate it with a third-party authentication system. That is, you can deploy a third-party authentication system to control user access to Genesys applications. This way, you can benefit from your established security system, which can be fairly sophisticated and can provide functions that Genesys does not provide. Using an existing authentication system saves you from creating an additional security schema in your Genesys configuration environment.
Genesys supports the following types of external authentication:
To verify the identity of a user who logs in to a Genesys application, Configuration Server can:
Starting in release 8.1, only users with a valid External ID are considered for external authentication, unless the option enforce-external-auth is set to true. Genesys recommends that the default user not be configured with an External ID, to allow for system access if all external authentication servers are down.
When an external system handles the authentication process, Configuration Server communicates with the external authentication server by means of a pluggable module that Genesys has developed for a particular third-party server.