Jump to: navigation, search

Authentication and Authorization

Unauthorized data access and the abuse of user privileges are common concerns for multi-user environments. Ensuring data correctness and its instant availability over the course of its lifecycle is critical for the business. Data, software, or the configuration must not be corrupted or modified by an unauthorized party.

Genesys provides the following security features to address data confidentiality:

Tip
Genesys strongly recommends careful consideration of network, file system, database, and operating system permissions to complete the protection afforded by these features.

Feedback

Comment on this article:

blog comments powered by Disqus
This page was last modified on December 22, 2016, at 13:38.