Security
The following table lists additional security configurations that can be used with your GMS installation.
Page | Summary |
---|---|
Security and Access Control | An outline of key security concerns and information about providing access control. |
Cassandra Security | Describes security configurations for Cassandra. |
Restricting Ports | Provides instructions to configure and enable port control. |
Basic Authentication | Describes configuration for basic authentication. |
Transport Layer Security | Describes Transport Layer Security (TLS), which enables cryptographic and trusted communications between Genesys clients and servers. |
Single Sign-On | Provides the settings needed to configure GMS to use your existing SSO infrastructure. |
Hiding Selected Data in Logs | Describes configuration options to hide some data in GMS logs. |
This page was last edited on April 13, 2017, at 16:15.
Comments or questions about this documentation? Contact us for support!