Secure Transport Configuration
This section describes how to configure Transport Layer Security (TLS) for the Genesys Interaction Recording solution.
Server-Side Configuration
The following components must configure secure transports for HTTP.
Configuring TLS for Interaction Recording Web Services (Web Services)
Configuring TLS for Recording Processor Script
- Configure HTTPS on the primary recording server. For more information, see the "Configure SSL" section of Configuring Recording Processor Script.
- For Windows, make sure the pyOpenSSL is installed. pyOpenSSL is already be installed on RHEL6.
- Create a self-signed certificate and private key for the Recording Processor host. For example, on ubuntu run: openssl req -new -x509 -days 1024 -nodes -out cert228.pem -keyout cert228key.pem
- In the rp_server section of the Recording Processor's configuration file, set the following parameters:
- ssl_certificate—Point to the certificate PEM file. For example, ssl_certificate=cert228.pem.
- ssl_private_key—To point to the private key file. For example, cert228.pem.
- Send the self-signed certificate PEM file to any MCP client that needs to validate the certificate during the SSL handshake. See the "Enable Secure Communication" section of the GVP 8.5 User's Guide.
- Restart Recording Processor.
- Configure HTTPS on the backup recording server by following the same instructions as above using a new certificate and private key.
Configuring TLS for Recording Crypto Server
Configuring TLS for the WebDAV Server
Configuring TLS for the Interaction Receiver and SpeechMiner UI Server
Configuring TLS for the HTTP Load Balancer
See Configuring TLS for the HTTP Load Balancer in a single-tenant environment.
See Configuring TLS for the HTTP Load Balancer in a multi-tenant environment.
Client-Side Configuration
Configuring TLS for the Media Control Platform (MCP)
To add a Certificate Authority (CA):
- Place the CA file on the MCP.
- Using Genesys Administrator or Genesys Administrator Extension, in the fm section set the ssl_ca_info option to the location of the CA file.
- Restart MCP.
To add client-side authentication:
- Place the certificate file (PEM format) on the MCP.
- Using Genesys Administrator or Genesys Administrator Extension, in the fm section set the ssl_cert optiont to the location of the certification file.
- Restart MCP.
For more information about the MCP options, see the Voice Platform Media Control Platform Configuration Options.
Configuring TLS for the IVR Profile
Using Genesys Administrator Extension, navigate to the Recording tab of the IVR Profile. Update the following addresses with the HTTPS locations:
- Storage Destination
- Recording Processor URI
- SpeechMiner Interaction Receiver
- PpeechMiner Destination for Analytics only
Configuring TLS for the Recording Processor Script
The Recording Processor Script creates three client connections, to:
- Interaction Recording Web Services (Web Services)
- SpeechMiner Interaction Receiver
- Backup Recording Processor Script
For details on configuring each connection, refer to the appropriate section at the Configure SSL link on the page Deploying Recording Processor Script.
Adding the Server Certificate to Interaction Recording Web Services (Web Services) KeyStore
Interaction Recording Web Services (RWS) creates client connections to the following:
- Configuration Server
- SIP Server
- Interaction Server
- WebDAV
- Recording Crypto Server
- SpeechMiner Interaction Receiver
- Cassandra
For details on configuring each connection using TLS, refer to the appropriate section in Configuring Security.
