The following table lists additional security configurations that can be used with your GMS installation.
|Security and Access Control||An outline of key security concerns and information about providing access control.|
|Cassandra Security||Describes security configurations for Cassandra.|
|Restricting Ports||Provides instructions to configure and enable port control.|
|Basic Authentication||Describes configuration for basic authentication.|
|Transport Layer Security||Describes Transport Layer Security (TLS), which enables cryptographic and trusted communications between Genesys clients and servers.|
|Single Sign-On||Provides the settings needed to configure GMS to use your existing SSO infrastructure.|
|Hiding Selected Data in Logs||Describes configuration options to hide some data in GMS logs.|
This page was last modified on April 13, 2017, at 09:15.