Platform Security

You can manage security in your NiCE CXone platform using the following options and tools: 

  • Authentication and authorization: Configure options for authentication and authorization of users accessing the platform.
  • Login authenticators: Define how users log in to the platform, including password complexity and character requirements. Every employee profile must have a login authenticator. The one exception is profiles used for services or applications, such as virtual agents.

  • Multi-factor authentication: Enable multi-factor authentication for individual employee profiles.

  • Roles and permissions: Grant permission to individual employee profiles to access data, applications, and to perform specific actions in the platform. Roles are groups of permissions that different types of users require.

  • Data access controls: Define who can see and interact with data in the platform.

  • Access keys: Use access keys to control access to specific services in the platform. Access keys can also be used for authentication and other security-related purposes within the platform.

Authentication and Authorization

NiCE CXone uses a two‑step process of authentication and authorization to verify user identity and control access to system resources. The platform supports authentication with a built‑in identity provider (IdP) or an external IdP using SAML 2.0.

Built‑in authentication supports username‑and‑password login, optional MFA, and configurable password policies. Application users (such as bots) are also authenticated through the built‑in IdP, but they use access keys instead of passwords.

If your organization uses federation or if you prefer an alternative to the built-in IdP, you can use a third-party identity provider with NiCE CXone. If you're using this option, you can learn more about authentication and authorization.

NiCE CXone supports the following third-party IdPs:

Technical Security Architecture

The NiCE CXone online help provides a detailed section outlining the platform's technical security architecture. This section can answer questions you may have about the underlying security of the platform.