This page was last edited on March 29, 2024, at 11:44.
Comments or questions about this documentation? Contact us for support!
Web Services can use a secured Transport Layer Security (TLS) connection mechanism to connect to Configuration Server. When configured, Web Services connects to a secure port on Configuration Server, verifies the server's authority, and encrypts/decrypts network traffic. You can configure secured connections to Configuration Server in the following ways:
Before configuring Web Services, make sure the Configuration Server secure port is configured as described in Introduction to Genesys Transport Layer Security in the Genesys Security Deployment Guide and that all certificates for server host and the certificate authority are configured and available.
Web Services does not check the server's certificate against the Certificate Authority, but all traffic is encrypted. To configure Web Services with minimal configuration, all you need to do is configure a connection to a secured port on Configuration Server. You can do this using either of the following methods:
In order to support the client-side certificate check, Web Services needs the public key for the Certificate Authority (CA). Web Services supports the PEM and JKS key storage formats, but recommends using JKS.
Complete the steps below to validate the certificate against the CA.
Start
keytool -importcert -file ca_cert.pem -keystore ca_cert.jks
caCertificate: /opt/ca_cert.pem
caCertificate: /opt/ca_cert.jks
jksPassword: pa$$word
End
For TLS for all other servers, it uses the configuration data from Configuration Server.