Revision as of 07:02, January 19, 2021 by Karl abraham.abel@genesys.com (talk | contribs) (Added options per input in MFWK-22955)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

[security] Section

This section contains configuration options that relate to security features. This section must be called security, and is configured in the options of the Configuration Server Application object.

no-default-access

Default Value: 0
Valid Values: One of the following:

0 No default access privileges.
1 Default access privileges.

Changes Take Effect: Immediately

Specifies whether new users created under this application have default privileges assigned to them. If this option is not present, the default value is assumed.

With redundant Configuration Servers, this option must be configured identically on both the primary and backup servers.

Refer to the chapter No Default Access for New Users in the Genesys Security Deployment Guide for complete information about this option.

failure-alarm-period

Default value: 0
Valid values:

0 Disables the failure tracking.
positive integer Specifies the time interval in minutes.

Changes take effect: immediately

Enables alarm for repeated auth failures and specifies time interval, used for detection criteria.

failure-alarm-count

Default value: 0
Valid values:

0 Disables count criterion.
positive integer Specifies the threshold count.

Changes take effect: immediately

For repeated authentication failures, alarm specifies the threshold count of failures. If the number of failures during last failure-alarm-period exceeds this value, the alarm log message is logged. The corresponding alarm, if configured, is triggered.

failure-alarm-percent

Default value: 0
Valid values:

0 Disables count criterion.
1-100 Specifies the percentage in %.

Changes take effect: immediately

For repeated authentication failures, alarm specifies the threshold percentage of failures. If the percentage of failures (the ratio of the number of failures to the number of attempts) exceeds this value, the alarm log message is logged. The corresponding alarm, if configured, is triggered. This option is effective only if the total number of attempts during last failure-alarm-period exceeds failure-alarm-percent-threshold.

failure-alarm-percent-threshold

Default value: 10
Valid values:
non-negative integer - specifies the threshold count
Changes take effect: immediately

For repeated authentication failures, alarm specifies the total number of authentication attempts during last failure-alarm-period at which failure-alarm-percent starts to take effect.

objbrief-api-permission-check

Default Value: false
Valid Values: true, false
Changes Take Effect: Immediately

When set to true, the results returned by brief API calls are based on the permissions of the client account that submitted the request.

This page was last edited on January 19, 2021, at 07:02.
Comments or questions about this documentation? Contact us for support!