The following table lists additional security configurations that can be used with your GMS installation.
|Security and Access Control||An outline of key security concerns and information about providing access control.|
|Cassandra Security||Describes security configurations for Cassandra.|
|Restricting Ports||Provides instructions to configure and enable port control.|
|Basic Authentication||Describes configuration for basic authentication.|
|Transport Layer Security||Describes Transport Layer Security (TLS), which enables cryptographic and trusted communications between Genesys clients and servers.|
|Single Sign-On||Provides the settings needed to configure GMS to use your existing SSO infrastructure.|
This page was last edited on November 24, 2017, at 09:50.