As of Friday October 16th, access to restricted content on this site now requires you to log in with your Genesys account. If you don't have an account, you can request one at these locations: Request MyPartner Portal Account or Request My Support Account.
Jump to: navigation, search

Configuring security

Web Services adheres to the standards described in the Open Web Application Security Project (OWASP) Top 10 — see the OWASP website for details about the Top 10 — and has adopted several methods of ensuring security, for example:

  • Errors are logged locally to prevent information leakage through API requests.
  • User sessions have a timeout option.
  • Cross Site Request Forgery Protection

Web Services includes additional security configurations that you can use with your installation:

For details about how Web Services handles authentication, see Web Services authentication flow.

Next step

This page was last edited on March 25, 2016, at 18:22.

Feedback

Comment on this article:

blog comments powered by Disqus