Jump to: navigation, search

Security

The following table lists additional security configurations that can be used with your GMS installation.

Page Summary
Security and Access Control An outline of key security concerns and information about providing access control.
Cassandra Security Describes security configurations for Cassandra.
Restricting Ports Provides instructions to configure and enable port control.
Basic Authentication Describes configuration for basic authentication.
Transport Layer Security Describes Transport Layer Security (TLS), which enables cryptographic and trusted communications between Genesys clients and servers.
Single Sign-On Provides the settings needed to configure GMS to use your existing SSO infrastructure.
Hiding Selected Data in Logs Describes configuration options to hide some data in GMS logs.

Feedback

Comment on this article:

blog comments powered by Disqus
This page was last modified on April 11, 2018, at 11:03.