(Updated via BpDeleteTranslateTags script) |
Wyler.metge (talk | contribs) (Updated via BpClonePage extension. Source page: draft:Saml2-single-sign-on-integration-guide/ConfiguringBrightPatterntoUseSSO) |
||
Line 1: | Line 1: | ||
= Configure Bright Pattern to Use SSO= | = Configure Bright Pattern to Use SSO= | ||
− | Single sign-on integration | + | The following guide assumes you have [[Saml2-single-sign-on-integration-guide/ADFSConsoleSetup|configured the ADFS console]], and have access to the associated ''Single Sign-On URL'' and ''Certificate'' [[Saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|generated while installing ADFS]]. |
+ | |||
+ | The steps below describe how to configure the single sign-on integration in Bright Pattern’s Administrator application. | ||
== Bright Pattern Applications == | == Bright Pattern Applications == | ||
− | |||
− | |||
The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the [[contact-center-administrator-guide/LoginProcedure|Contact Center Administrator Guide]]. | The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the [[contact-center-administrator-guide/LoginProcedure|Contact Center Administrator Guide]]. | ||
Line 12: | Line 12: | ||
== Procedure == | == Procedure == | ||
− | === Step 1: | + | === Step 1: Ask your Service Provider to enable the SSO integration for your Contact Center === |
− | + | Ensure your service provider has enabled SSO for your contact center before continuing. | |
− | |||
− | |||
− | |||
− | |||
− | |||
=== Step 2: Create SSO integration account in Contact Center Administrator === | === Step 2: Create SSO integration account in Contact Center Administrator === | ||
Line 26: | Line 21: | ||
# Select account type '''Single Sign-On'''.<br /><br /> | # Select account type '''Single Sign-On'''.<br /><br /> | ||
# Name the account (e.g., “ADFS”).<br /><br /> | # Name the account (e.g., “ADFS”).<br /><br /> | ||
− | # | + | # Select the checkbox for '''Enable Single Sign-On'''. <br /><br /> |
− | # Enter the '''Identity Provider Single Sign-On URL''', which should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]]: | + | # Optionally, select the checkbox '''Use SSO for administrator portal login'''. |
− | + | #*When selected, SSO will be used to authenticate users of ''both'' the Agent Desktop and the Administrator Portal. | |
− | + | #*When not selected, SSO will only be used to authenticate Agent Desktop users, while Administrator Portal users will login with their BPCC credentials.<br /><br /> | |
− | + | # Enter the '''Identity Provider Single Sign-On URL''', which should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]]:<br /><br /><code>https://<adfs_hostname>/adfs/ls/idpinitiatedsignon</code><br /><br /> | |
− | + | # Enter the '''Identity Provider Single Sign-On Logout URL''', typically: <br /><br /><code>https://<adfs_hostname>/adfs/ls/?wa=wsignout1.0&wreply=<redirect_url_after_logout></code><br /><br /> | |
− | + | #* You may wish to specify the agent desktop URL, or another BPCC application URL, for <code><redirect_url_after_logout></code>.<br /><br /> | |
# Then, beside ''Identity Provider Certificate'', hover your cursor over “empty” and click '''EDIT'''.<br /><br /> | # Then, beside ''Identity Provider Certificate'', hover your cursor over “empty” and click '''EDIT'''.<br /><br /> | ||
# In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]].<br /><br /> | # In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]].<br /><br /> |
Latest revision as of 04:58, 7 March 2025
Configure Bright Pattern to Use SSO
The following guide assumes you have configured the ADFS console, and have access to the associated Single Sign-On URL and Certificate generated while installing ADFS.
The steps below describe how to configure the single sign-on integration in Bright Pattern’s Administrator application.
Bright Pattern Applications
The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the Contact Center Administrator Guide.
The Agent Desktop application (i.e., “https://<tenant>.brightpattern.com/agentdesktop”) is where contact center agents and supervisors interact with customers and other users. For more information, see the Agent Guide.
Procedure
Step 1: Ask your Service Provider to enable the SSO integration for your Contact Center
Ensure your service provider has enabled SSO for your contact center before continuing.
Step 2: Create SSO integration account in Contact Center Administrator
For SSO to work, you must also enable it for your contact center in SSO integration account properties.
- In the Contact Center Administrator application, go to Call Center Configuration > Integration Account.
- Click the Add account button (+) to create a new integration account.
- Select account type Single Sign-On.
- Name the account (e.g., “ADFS”).
- Select the checkbox for Enable Single Sign-On.
- Optionally, select the checkbox Use SSO for administrator portal login.
- When selected, SSO will be used to authenticate users of both the Agent Desktop and the Administrator Portal.
- When not selected, SSO will only be used to authenticate Agent Desktop users, while Administrator Portal users will login with their BPCC credentials.
- Enter the Identity Provider Single Sign-On URL, which should be taken from federationmetadata.xml, the file you saved while Installing ADFS:
https://<adfs_hostname>/adfs/ls/idpinitiatedsignon
- Enter the Identity Provider Single Sign-On Logout URL, typically:
https://<adfs_hostname>/adfs/ls/?wa=wsignout1.0&wreply=<redirect_url_after_logout>
- You may wish to specify the agent desktop URL, or another BPCC application URL, for
<redirect_url_after_logout>
.
- You may wish to specify the agent desktop URL, or another BPCC application URL, for
- Then, beside Identity Provider Certificate, hover your cursor over “empty” and click EDIT.
- In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from federationmetadata.xml, the file you saved while Installing ADFS.
- Click Apply to save your changes.
Step 3: Create a user
Before you can test that SSO works, you will need to create a dummy user.
- In the Contact Center Administrator application, go to Users & Teams > Users.
- Click the Add user button to create a new user.
- Set the username as “user1” and specify the desired password.
- Click Apply to save your changes.
Step 4: Test SSO in Agent Desktop
You can try logging in to Agent Desktop with the username and password you just created.
- Go to the Agent Desktop application (e.g., http://<bpsp_hostname>/agentdesktop).
- The login page should redirect you to the ADFS login page.
- Enter the credentials for “user1” that you just created.
- The system will then redirect you to Agent Desktop as the logged-in user.
< Previous | Next >