From Bright Pattern Documentation
Jump to: navigation, search
(Updated via BpDeleteTranslateTags script)
(Updated via BpClonePage extension. Source page: draft:Saml2-single-sign-on-integration-guide/ConfiguringBrightPatterntoUseSSO)
 
Line 1: Line 1:
 
= Configure Bright Pattern to Use SSO=
 
= Configure Bright Pattern to Use SSO=
Single sign-on integration configuration is completed in Bright Pattern’s Service Provider application and the Contact Center Administrator application, and it’s tested in the Agent Desktop application.
+
The following guide assumes you have [[Saml2-single-sign-on-integration-guide/ADFSConsoleSetup|configured the ADFS console]], and have access to the associated ''Single Sign-On URL'' and ''Certificate'' [[Saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|generated while installing ADFS]].
 +
 
 +
The steps below describe how to configure the single sign-on integration in Bright Pattern’s Administrator application.  
  
  
 
== Bright Pattern Applications ==
 
== Bright Pattern Applications ==
The Service Provider application (i.e., “https://<tenant>.brightpattern.com/sysmgmt”) is where Bright Pattern Contact Center-based solutions are configured and managed at the service provider level. For more information, see the [[service-provider-guide/LoginProcedure|Service Provider Guide]].
 
 
 
The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the [[contact-center-administrator-guide/LoginProcedure|Contact Center Administrator Guide]].
 
The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the [[contact-center-administrator-guide/LoginProcedure|Contact Center Administrator Guide]].
  
Line 12: Line 12:
  
 
== Procedure ==
 
== Procedure ==
=== Step 1: Enable SSO feature in Service Provider application ===
+
=== Step 1: Ask your Service Provider to enable the SSO integration for your Contact Center ===
By default, SSO functionality is disabled. Enable it by following these steps:<br /><br />
+
Ensure your service provider has enabled SSO for your contact center before continuing.
# In the Service Provider application, go to ''Tenants'' and select the name of your contact center from the list.<br /><br />
 
# Click the '''Features''' tab.<br /><br />
 
# In the list of features to enable or allow, select the checkbox for '''Enable Single Sign-On'''.<br /><br />
 
# Click '''Apply'''.
 
 
 
  
 
=== Step 2: Create SSO integration account in Contact Center Administrator ===
 
=== Step 2: Create SSO integration account in Contact Center Administrator ===
Line 26: Line 21:
 
# Select account type '''Single Sign-On'''.<br /><br />
 
# Select account type '''Single Sign-On'''.<br /><br />
 
# Name the account (e.g., “ADFS”).<br /><br />
 
# Name the account (e.g., “ADFS”).<br /><br />
# In the ''Agent Desktop SSO'' section, select the checkbox for '''Enable Single Sign-On'''.<br /><br />
+
# Select the checkbox for '''Enable Single Sign-On'''. <br /><br />
# Enter the '''Identity Provider Single Sign-On URL''', which should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]]:
+
# Optionally, select the checkbox '''Use SSO for administrator portal login'''.
 
+
#*When selected, SSO will be used to authenticate users of ''both'' the Agent Desktop and the Administrator Portal.
 
+
#*When not selected, SSO will only be used to authenticate Agent Desktop users, while Administrator Portal users will login with their BPCC credentials.<br /><br />
https://<adfs_hostname>/adfs/ls/idpinitiatedsignon
+
# Enter the '''Identity Provider Single Sign-On URL''', which should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]]:<br /><br /><code>https://<adfs_hostname>/adfs/ls/idpinitiatedsignon</code><br /><br />
 
+
# Enter the '''Identity Provider Single Sign-On Logout URL''', typically: <br /><br /><code>https://<adfs_hostname>/adfs/ls/?wa=wsignout1.0&wreply=<redirect_url_after_logout></code><br /><br />
 
+
#* You may wish to specify the agent desktop URL, or another BPCC application URL, for <code><redirect_url_after_logout></code>.<br /><br />
 
# Then, beside ''Identity Provider Certificate'', hover your cursor over “empty” and click '''EDIT'''.<br /><br />
 
# Then, beside ''Identity Provider Certificate'', hover your cursor over “empty” and click '''EDIT'''.<br /><br />
 
# In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]].<br /><br />
 
# In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from ''federationmetadata.xml'', the file you saved while [[saml2-single-sign-on-integration-guide/InstallingADFSonWindowsServer2012|Installing ADFS]].<br /><br />

Latest revision as of 04:58, 7 March 2025

• 5.19 • 5.2 • 5.3 • 5.8

Configure Bright Pattern to Use SSO

The following guide assumes you have configured the ADFS console, and have access to the associated Single Sign-On URL and Certificate generated while installing ADFS.

The steps below describe how to configure the single sign-on integration in Bright Pattern’s Administrator application.


Bright Pattern Applications

The Contact Center Administrator application (i.e., “https://<tenant>.brightpattern.com/admin”) is where contact center resources are configured and managed at the system administrator level. For more information, see the Contact Center Administrator Guide.

The Agent Desktop application (i.e., “https://<tenant>.brightpattern.com/agentdesktop”) is where contact center agents and supervisors interact with customers and other users. For more information, see the Agent Guide.


Procedure

Step 1: Ask your Service Provider to enable the SSO integration for your Contact Center

Ensure your service provider has enabled SSO for your contact center before continuing.

Step 2: Create SSO integration account in Contact Center Administrator

For SSO to work, you must also enable it for your contact center in SSO integration account properties.

  1. In the Contact Center Administrator application, go to Call Center Configuration > Integration Account.

  2. Click the Add account button (+) to create a new integration account.

  3. Select account type Single Sign-On.

  4. Name the account (e.g., “ADFS”).

  5. Select the checkbox for Enable Single Sign-On.

  6. Optionally, select the checkbox Use SSO for administrator portal login.
    • When selected, SSO will be used to authenticate users of both the Agent Desktop and the Administrator Portal.
    • When not selected, SSO will only be used to authenticate Agent Desktop users, while Administrator Portal users will login with their BPCC credentials.

  7. Enter the Identity Provider Single Sign-On URL, which should be taken from federationmetadata.xml, the file you saved while Installing ADFS:

    https://<adfs_hostname>/adfs/ls/idpinitiatedsignon

  8. Enter the Identity Provider Single Sign-On Logout URL, typically:

    https://<adfs_hostname>/adfs/ls/?wa=wsignout1.0&wreply=<redirect_url_after_logout>

    • You may wish to specify the agent desktop URL, or another BPCC application URL, for <redirect_url_after_logout>.

  9. Then, beside Identity Provider Certificate, hover your cursor over “empty” and click EDIT.

  10. In the dialog that pops up, paste your certificate to the certificate option. The certificate should be taken from federationmetadata.xml, the file you saved while Installing ADFS.

  11. Click Apply to save your changes.


Step 3: Create a user

Before you can test that SSO works, you will need to create a dummy user.

  1. In the Contact Center Administrator application, go to Users & Teams > Users.

  2. Click the Add user button to create a new user.

  3. Set the username as “user1” and specify the desired password.

  4. Click Apply to save your changes.


Step 4: Test SSO in Agent Desktop

You can try logging in to Agent Desktop with the username and password you just created.

  1. Go to the Agent Desktop application (e.g., http://<bpsp_hostname>/agentdesktop).

  2. The login page should redirect you to the ADFS login page.

  3. Enter the credentials for “user1” that you just created.

  4. The system will then redirect you to Agent Desktop as the logged-in user.
    < Previous | Next >