Security
The following table lists additional security configurations that can be used with your GMS installation.
| Page | Summary |
|---|---|
| Security and Access Control | An outline of key security concerns and information about providing access control. |
| Cassandra Security | Describes security configurations for Cassandra. |
| Restricting Ports | Provides instructions to configure and enable port control. |
| Basic Authentication | Describes configuration for basic authentication. |
| Transport Layer Security | Describes Transport Layer Security (TLS), which enables cryptographic and trusted communications between Genesys clients and servers. |
| Single Sign-On | Provides the settings needed to configure GMS to use your existing SSO infrastructure. |
| Hiding Selected Data in Logs | Describes configuration options to hide some data in GMS logs. |
This page was last edited on May 31, 2024, at 08:42.
Comments or questions about this documentation? Contact us for support!
