Configure Bright Pattern to Use SSO
The following guide assumes you have configured the ADFS console, and have access to the associated Single Sign-On URL and Certificate generated while installing ADFS.
The steps below describe how to configure the single sign-on integration in Bright Pattern’s Administrator application.
Bright Pattern Applications
The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the Contact Center Administrator Guide.
The Agent Desktop application (i.e., “https://<tenant>.brightpattern.com/agentdesktop”) is where contact center agents and supervisors interact with customers and other users. For more information, see the Agent Guide.
Procedure
Step 1: Ask your Service Provider to enable the SSO integration for your Contact Center
Ensure your service provider has enabled SSO for your contact center before continuing.
Step 2: Create SSO integration account in Contact Center Administrator
For SSO to work, you must also enable it for your contact center in SSO integration account properties.
- In the Contact Center Administrator application, go to Call Center Configuration > Integration Account.
- Click the Add account button (+) to create a new integration account.
- Select account type Single Sign-On.
- Name the account (e.g., “ADFS”).
- Select the checkbox for Enable Single Sign-On.
- Optionally, select the checkbox Use SSO for administrator portal login.
- When selected, SSO will be used to authenticate users of both the Agent Desktop and the Administrator Portal.
- When not selected, SSO will only be used to authenticate Agent Desktop users, while Administrator Portal users will login with their BPCC credentials.
- Enter the Identity Provider Single Sign-On URL, which should be taken from federationmetadata.xml, the file you saved while Installing ADFS:
https://<adfs_hostname>/adfs/ls/idpinitiatedsignon
- Enter the Identity Provider Single Sign-On Logout URL, typically:
https://<adfs_hostname>/adfs/ls/?wa=wsignout1.0&wreply=<redirect_url_after_logout>
- You may wish to specify the agent desktop URL, or another BPCC application URL, for
<redirect_url_after_logout>
.
- You may wish to specify the agent desktop URL, or another BPCC application URL, for
- Then, beside Identity Provider Certificate, hover your cursor over “empty” and click EDIT.
- In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from federationmetadata.xml, the file you saved while Installing ADFS.
- Click Apply to save your changes.
Step 3: Create a user
Before you can test that SSO works, you will need to create a dummy user.
- In the Contact Center Administrator application, go to Users & Teams > Users.
- Click the Add user button to create a new user.
- Set the username as “user1” and specify the desired password.
- Click Apply to save your changes.
Step 4: Test SSO in Agent Desktop
You can try logging in to Agent Desktop with the username and password you just created.
- Go to the Agent Desktop application (e.g., http://<bpsp_hostname>/agentdesktop).
- The login page should redirect you to the ADFS login page.
- Enter the credentials for “user1” that you just created.
- The system will then redirect you to Agent Desktop as the logged-in user.
< Previous | Next >