Jump to: navigation, search

Workbench Client

The following directories in the Workbench installation package contain the Workbench Client templates:

  • For Linux: /templates
  • For Windows: \templates

Note: These instructions assume you are using Genesys Administrator Extension 8.5.x. If you are using older Genesys configuration software, such as Genesys Administrator or Configuration Manager, the configuration steps and the locations of configuration options will differ in some places.

Provisioning the Workbench Client in Genesys Administrator Extension 8.5

  1. Log into GAX, and navigate to Configuration Manager.
  2. In the Environment section, select Application Templates.
  3. In the Application Templates section, select New.
  4. In the New Properties pane, select Import Application Template.
  5. In the Import Application Template dialog, click the Choose File button and navigate to the WorkbenchClient.apd template. Select the template, and click OK.
  6. In the New Properties pane, click Save to save the new application template.
  7. Once the application template has been imported, navigate to Configuration Manager.
  8. In the Environment section, select Applications.
  9. In the Applications section, select New.
  10. In the New Properties pane, complete the following:
    1. In the General tab, enter a name for the Workbench Client application in the Name field.
    2. Click on the Template field and navigate to the application template created in the previous steps.
  11. Click Save to save the new application.

Configuring HTTPS for the Workbench Client

Note: This configuration section is optional. It’s only needed if you want secure TLS communications between the Workbench Client display in a web browser and the Workbench Server. The Workbench Client, which is accessed through a browser, can support an HTTPS secure connection. To configure this, you must create a valid certificate stored on a Keystore file that can be accessed by Workbench. For detailed documentation on how to generate and manage this type of certificate, see http://www.eclipse.org/jetty/documentation/current/configuring-ssl.html

The following steps can be performed after Workbench has been installed, at any time when Workbench is not running.

  1. Go to the Karaf etc folder located on <installation directory>/karaf/etc.
  2. Open the file org.ops4j.pax.web.cfg.
  3. Edit the following properties according to your desired configuration:
    1. org.osgi.service.http.port - The HTTP port used to listen for requests. Default is 8181.
    2. org.osgi.service.http.enabled - If Workbench should listen on the HTTP port. Possible values are true and false. Default is true.
    3. org.osgi.service.http.port.secure - The HTTPS port used to listen for requests. Default is 8443.
    4. org.osgi.service.http.secure.enabled - If Workbench should listen on the HTTPS port. Possible values are true and false. Default is false. If set to"true", you must configure the next three properties.
    5. org.ops4j.pax.web.ssl.keystore - Full path to the keystore (JKS) to be used. Default value is {user.home}/.keystore.
    6. org.ops4j.pax.web.ssl.password - Password for your keystore (JKS) file, where your source keystore (such as PKCS12) was imported.
    7. org.ops4j.pax.web.ssl.keypassword - Password for the Source keystore (such as PKCS12) where your Workbench server certificate, intermediate certificates and private key are bundled together.
  1. Save your changes to this configuration file and restart Workbench.

Comment on this article:

blog comments powered by Disqus
This page was last modified on 26 June 2017, at 11:13.