Contents
Overview
A third-party External Authentication system can be used to control user access to Genesys applications. This manual contains the following information:
- How to implement in the Configuration Layer an integration with third-party authentication systems.
- How to enable external authentication in Configuration Server.
- How to configure the Genesys authentication client for Remote Authentication Dial In User Service (RADIUS).
- How to deploy, configure, and use the Lightweight Directory Access Protocol (LDAP) authentication system.
- How to configure Kerberos external authentication.
Intended Audience
This document is intended primarily for system administrators. It has been written with the assumption that you have a basic understanding of:
- Computer-telephony integration (CTI) concepts, processes, terminology, and applications
- Network design and operation
- Your own network configurations
You should also be familiar with your authentication system, Genesys Framework architecture and functions, and Genesys configuration data structure.
Making Comments on This Document
If you especially like or dislike anything about this document, feel free to e-mail your comments to Techpubs.webadmin@genesys.com .
You can comment on what you regard as specific errors or omissions, and on the accuracy, organization, subject matter, or completeness of this document. Please limit your comments to the scope of this document only and to the way in which the information is presented. Contact your Genesys Account Representative or Genesys Customer Care if you have suggestions about the product itself.
When you send us comments, you grant Genesys a nonexclusive right to use or distribute your comments in any way it believes appropriate, without incurring any obligation to you.
Contacting Genesys Customer Care
If you have purchased support directly from Genesys, please contact Genesys Customer Care .
Before contacting Customer Care, please refer to the Genesys Care Program Guide for complete contact information and procedures.
Changes in this Document
This is the first release of the Framework 8.5 External Authentication Reference Manual. In the future, this section will list topics that are new or have changed significantly since the first release of this document.
