Jump to: navigation, search

Authentication and Authorization

Unauthorized data access and the abuse of user privileges are common concerns for multi-user environments. Ensuring data correctness and its instant availability over the course of its lifecycle is critical for the business. Data, software, or the configuration must not be corrupted or modified by an unauthorized party.

Genesys provides the following security features to address data confidentiality:

Tip
Genesys strongly recommends careful consideration of network, file system, database, and operating system permissions to complete the protection afforded by these features.
This page was last edited on December 22, 2016, at 21:38.
Comments or questions about this documentation? Contact us for support!