1.6 Secure Platform

Provides comprehensive security through a token-based authentication system, supported by enhanced authentication methods. These measures work in synergy to ensure robust security protocols, safeguarding user access and data integrity while streamlining the authentication process for a seamless user experience.

The UMC environment utilizes public-key cryptography. If your company’s security policy requires you to regenerate the security keys, there is no need to reconfigure UMC. The UMC server publishes the public key to all clients through an API with a static URL stored in the umcConfig object.