<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://all.docs.genesys.com/index.php?action=history&amp;feed=atom&amp;title=AUTH%2FCurrent%2FAuthPEGuide%2FMixedProv</id>
	<title>AUTH/Current/AuthPEGuide/MixedProv - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://all.docs.genesys.com/index.php?action=history&amp;feed=atom&amp;title=AUTH%2FCurrent%2FAuthPEGuide%2FMixedProv"/>
	<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/MixedProv&amp;action=history"/>
	<updated>2026-05-15T16:39:26Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/MixedProv&amp;diff=120518&amp;oldid=prev</id>
		<title>WikiSysop: Created page with &quot;{{Article |Standalone=No |DisplayName=Provision SAML-based SSO |Context=Learn how to provision Security Assertion Markup Language-based single sign-on for private edition and...&quot;</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/MixedProv&amp;diff=120518&amp;oldid=prev"/>
		<updated>2022-05-19T15:16:01Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Article |Standalone=No |DisplayName=Provision SAML-based SSO |Context=Learn how to provision Security Assertion Markup Language-based single sign-on for private edition and...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Provision SAML-based SSO&lt;br /&gt;
|Context=Learn how to provision Security Assertion Markup Language-based single sign-on for private edition and mixed mode deployments when you do not have access to Agent Setup.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=This topic describes how to configure SAML 2.0 single sign-on integration between Genesys Authentication and third-party identity providers (IdP), such as Okta or Google. &lt;br /&gt;
&lt;br /&gt;
{{NoteFormat|These instructions are for private edition or mixed mode deployments when Agent Setup is not available in your environment. If Agent Setup is available, see {{Link-AnywhereElse|product=PEC-AS|version=Current|manual=ManageCC|topic=Single_Sign-On}}.|3}} &lt;br /&gt;
&lt;br /&gt;
Genesys Authentication works as a SAML service provider entity (SP). It accepts authentication assertions according to the SAML protocol and, if the assertion is valid, redirects to the application that started communication. In general, complete this configuration for each region in your deployment where you need SSO integration. However, there are a few global settings that are applicable to all regions&amp;amp;mdash;see {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=global|display text=Configure global settings}} for details.   &lt;br /&gt;
&lt;br /&gt;
The following diagram shows the communication flow for SAML-based SSO. All communication goes through the user's browser and there is no direct traffic or firewall filtering between the SP and the IdP.[[File:Auth_saml_sso.png|alt=A diagram illustrates single sign-on with Genesys as the service provider and the customer as the identity provider.]]Here's a breakdown of the SAML SSO process illustrated in the diagram:       &lt;br /&gt;
&lt;br /&gt;
#The user requests access to a resource.&lt;br /&gt;
#The SP redirects a SAML request to the IdP.&lt;br /&gt;
#The IdP challenges the user for credentials.&lt;br /&gt;
#The user provides the credentials and logs in.&lt;br /&gt;
#The IdP sends a signed SAML response to the browser.&lt;br /&gt;
#The browser posts the SAML response to the SP.  Note: This diagram show SAML POST binding, which is selected by default. For a SAML redirect binding, #5 and #6 are merged into one arrow, similar to #2.&lt;br /&gt;
#The SP supplies the resource to the user.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Prerequisites&lt;br /&gt;
|anchor=prerequisites&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=You must have the following prerequisites to set up SAML-based SSO:&lt;br /&gt;
&lt;br /&gt;
*Genesys Administrator Extension&lt;br /&gt;
*The identity provider metadata XML file generated by your IdP server. This file contains configuration and integration details for SAML SSO. For more information, see {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=metadata|display text=SAML metadata}}.&lt;br /&gt;
*The fully qualified domain name URL of your Genesys Authentication deployment. All endpoints in the SP metadata generated by Genesys Authentication use this URL.&lt;br /&gt;
*The administrator credentials: {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=services.secret.admin_username|display text=services.secret.admin_username}} and {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=services.secret.admin_password|display text=services.secret.admin_password}} from the '''values.yaml''' file.&lt;br /&gt;
*curl or any REST client.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Configure SAML-based SSO&lt;br /&gt;
|anchor=config&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=To configure SAML SSO for your deployment, complete the steps in this section. In the table below, you can find details about the parameters used in the configuration instructions.&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
{{!}}+&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;auth-int-url&amp;gt;&lt;br /&gt;
{{!}}The Genesys Authentication internal ingress URL, as configured in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=internal_ingress.frontend|display text=internal_ingress.frontend}}.&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;auth-ext-url&amp;gt;&lt;br /&gt;
{{!}}The Genesys Authentication external ingress URL, as configured in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=ingress.frontend|display text=ingress.frontend}}.&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;ccid&amp;gt;&lt;br /&gt;
{{!}}Your contact center ID.&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;region&amp;gt;&lt;br /&gt;
{{!}}The deployment region. For example, USW1.&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;ops admin username&amp;gt;&lt;br /&gt;
{{!}}The user name of the operations administrator, as configured in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=services.secret.admin_username|display text=services.secret.admin_username}}.&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}&amp;lt;ops admin pwd&amp;gt;&lt;br /&gt;
{{!}}The password of the operations administrator, as configured in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=services.secret.admin_password|display text=services.secret.admin_password}}.&lt;br /&gt;
{{!}}}&lt;br /&gt;
{{AnchorDiv|global}}&lt;br /&gt;
===Configure global settings===&lt;br /&gt;
In Genesys Administrator Extension, [https://docs.genesys.com/Documentation/GA/9.0.0/user/CfgAccessGroup create an access group] for the SSO integration and add users to the group. Genesys recommends that you do the configuration with a test group and test users until you confirm that SSO is working correctly.  &lt;br /&gt;
&lt;br /&gt;
Next, configure the access group you want to use for the SSO integration. The '''value''' can be a comma-separated list.  &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings --data '&lt;br /&gt;
{&amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;name&amp;quot;: &amp;quot;samlAuthenticationAccessGroups&amp;quot;,&lt;br /&gt;
      &amp;quot;location&amp;quot;: &amp;quot;/&amp;quot;,&lt;br /&gt;
      &amp;quot;value&amp;quot;: &amp;quot;Test users&amp;quot;,&lt;br /&gt;
      &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;If needed, exclude an access group from SSO.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings --data '&lt;br /&gt;
{&amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
        &amp;quot;name&amp;quot;: &amp;quot;internalUserAccessGroups&amp;quot;,&lt;br /&gt;
        &amp;quot;location&amp;quot;: &amp;quot;/&amp;quot;,&lt;br /&gt;
        &amp;quot;value&amp;quot;: &amp;quot;Internal Users,Super Administrators&amp;quot;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Optional&amp;amp;mdash;set the SAML user name option to identify the subject of a SAML assertion. This specifies which attribute in a SAML response is used as the user ID. The default value is &amp;lt;saml:NameID&amp;gt;.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings --data '&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
        &amp;quot;name&amp;quot;:&amp;quot;userNameAttributeKey&amp;quot;,&lt;br /&gt;
        &amp;quot;location&amp;quot;:&amp;quot;/&amp;quot;,&lt;br /&gt;
        &amp;quot;value&amp;quot;:&amp;lt;value&amp;gt;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Optional&amp;amp;mdash;set the external ID option. If set to true, a user is identified by matching the user name from the SAML response with the '''external ID''' field from Configuration Server. If false, a user is identified by the '''username''' field in Configuration Server.  &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings --data '&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
        &amp;quot;name&amp;quot;:&amp;quot;useExternalUserId&amp;quot;,&lt;br /&gt;
        &amp;quot;location&amp;quot;:&amp;quot;/&amp;quot;,&lt;br /&gt;
        &amp;quot;value&amp;quot;:&amp;quot;true&amp;quot;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Optional&amp;amp;mdash;change the default SSO binding. Currently, Genesys Authentication supports POST (default) and Redirect bindings.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings  --data '&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
        &amp;quot;name&amp;quot;:&amp;quot;ssoBinding&amp;quot;,&lt;br /&gt;
        &amp;quot;location&amp;quot;:&amp;quot;/&amp;quot;,&lt;br /&gt;
        &amp;quot;value&amp;quot;:&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect&amp;quot;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Configure regional settings===&lt;br /&gt;
Specify the settings for each region in your deployment. You must have a least one region. &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings --data '&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;data&amp;quot;:&lt;br /&gt;
    {&lt;br /&gt;
        &amp;quot;name&amp;quot;:&amp;quot;serviceProviderBaseURL&amp;quot;,&lt;br /&gt;
        &amp;quot;location&amp;quot;:&amp;lt;region&amp;gt;,&lt;br /&gt;
        &amp;quot;value&amp;quot;:&amp;lt;auth-ext-url&amp;gt;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
Note: &amp;lt;region&amp;gt; must start with &amp;quot;/&amp;quot;. For example, /USW1.&lt;br /&gt;
&lt;br /&gt;
===Upload IdP metadata for the region===&lt;br /&gt;
Some IdP servers, like Okta, require you to submit service provider metadata before they generate IdP metadata. In this case, see {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=metadata|display text=SAML metadata}} before completing the following step.&lt;br /&gt;
&lt;br /&gt;
Once you have the IdP metadata from your identity provider, upload it to Genesys Authentication. &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H &amp;quot;Content-Type: text/html&amp;quot; -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/saml/&amp;lt;region&amp;gt; -d @&amp;lt;filename&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Note: &amp;lt;filename&amp;gt; is the name of your metadata file.&lt;br /&gt;
&lt;br /&gt;
===Enable SAML===&lt;br /&gt;
To enable SAML, first get the data for your contact center.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl  -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;The response:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
{&lt;br /&gt;
  &lt;br /&gt;
  &amp;quot;status&amp;quot;: {&lt;br /&gt;
    &amp;quot;code&amp;quot;: 0&lt;br /&gt;
  },&lt;br /&gt;
  &amp;quot;data&amp;quot;: {&lt;br /&gt;
    &amp;quot;id&amp;quot;: &amp;quot;526af7ee-a71a-44a0-9eea-695eb46478d6&amp;quot;,&lt;br /&gt;
    &amp;quot;environmentId&amp;quot;: &amp;quot;608b741c-99f3-4bb8-8456-4639088aff96&amp;quot;,&lt;br /&gt;
    &amp;quot;domains&amp;quot;: [&amp;quot;somedomain.com&amp;quot;],&lt;br /&gt;
    &amp;quot;auth&amp;quot;: &amp;quot;configServer&amp;quot;&lt;br /&gt;
  }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Copy the data object and change the value of '''auth''' to &amp;lt;code&amp;gt;saml&amp;lt;/code&amp;gt;. Now POST the data back to the server:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X PUT -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt; --data '&lt;br /&gt;
{&lt;br /&gt;
&amp;quot;data&amp;quot;: {   &lt;br /&gt;
    &amp;quot;environmentId&amp;quot;: &amp;quot;608b741c-99f3-4bb8-8456-4639088aff96&amp;quot;,&lt;br /&gt;
    &amp;quot;domains&amp;quot;: [&amp;quot;somedomain.com&amp;quot;],&lt;br /&gt;
    &amp;quot;auth&amp;quot;: &amp;quot;saml&amp;quot;&lt;br /&gt;
  }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Settings propagation to secondary regions===&lt;br /&gt;
In multi-regional deployments, Genesys Authentication data propagates to the secondary region according to the data replication or propagation interval.&lt;br /&gt;
&lt;br /&gt;
===Configure CORS===&lt;br /&gt;
Make sure to configure CORS settings to allowlist your IdP server endpoint URL. See {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Provision|anchor=UpdateCORS|display text=Update CORS settings}} for details.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Update configuration&lt;br /&gt;
|anchor=updateconfig&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=You can update configuration by following the steps in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=config|display text=Configure SAML-based SSO}} and then reloading the configuration. &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X POST -H 'Content-Type: application/json' -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i &amp;lt;auth-int-url&amp;gt;/auth/v3/ops/saml/contact-centers/&amp;lt;ccid&amp;gt; --data '&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;data&amp;quot;:&lt;br /&gt;
     {&lt;br /&gt;
        &amp;quot;operation&amp;quot;:&amp;quot;refresh&amp;quot;&lt;br /&gt;
     }&lt;br /&gt;
}'&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=SAML metadata&lt;br /&gt;
|anchor=metadata&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Genesys Authentication works with two kinds of SAML metadata:&lt;br /&gt;
&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=idp|display text=Identity provider (IdP) metadata}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=sp|display text=Service provider (SP) metadata}}&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|idp}}&lt;br /&gt;
===IdP metadata===&lt;br /&gt;
IdP metadata is a {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=prerequisites|display text=prerequisite}} to configure SAML-based SSO with Genesys Authentication. Some IdP servers (Okta, for example) might require you to submit SP metadata before they can generate IdP metadata. In this case, you must upload the IdP metadata to the Genesys Authentication service later in the configuration. &lt;br /&gt;
&lt;br /&gt;
Make sure your IdP metadata is up to date with any changes that might affect communication between Genesys Authentication and the IdP server. For example, if you change to a different IdP or a certificate expires for your existing IdP.&lt;br /&gt;
&lt;br /&gt;
Genesys stores IdP metadata as a plain text file in the Web Services and Applications Configuration database. &lt;br /&gt;
&lt;br /&gt;
For example:&amp;lt;syntaxhighlight lang=&amp;quot;json&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/saml/&amp;lt;region&amp;gt; -u &amp;lt;ops admin username&amp;gt;:&amp;lt;ops admin pwd&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|sp}} &lt;br /&gt;
===SP metadata===&lt;br /&gt;
You usually don't need the SP metadata. Retrieve it only when it is required to generate IdP metadata AND you don't want to {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=manual|display text=supply metadata entries to the IdP manually}}.&lt;br /&gt;
&lt;br /&gt;
Genesys Authentication generates SP metadata automatically when configuration is successful for a particular region. You can access SP metadata as follows:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;auth-int-url&amp;gt;/auth/v3/saml/metadata/alias/sp-&amp;lt;ccid&amp;gt;-&amp;lt;region&amp;gt;-0&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|manual}}&lt;br /&gt;
===Manual metadata entries===&lt;br /&gt;
To supply metadata entries to the IdP manually, you need the following information:&lt;br /&gt;
&lt;br /&gt;
*The SP entity ID, also known as the Audience or Reference URI. This is the unique identifier of the service provider. For Genesys Authentication, you can calculate this ID as &amp;lt;code&amp;gt;sp-&amp;lt;ccid&amp;gt;-&amp;lt;region&amp;gt;-0&amp;lt;/code&amp;gt;. Here's an example with a CCID of d49eab9b-ac85-4ad7-b9db-4197e6bc8020 and the region as USW1: &amp;lt;code&amp;gt;sp-d49eab9b-ac85-4ad7-b9db-4197e6bc8020-USW1-0&amp;lt;/code&amp;gt;&lt;br /&gt;
*The single sign-on URL, also known as the AssertionConsumerService URI. For Genesys Authentication, the URL format &amp;lt;code&amp;gt;&amp;lt;auth-int-url&amp;gt;/auth/v3/saml/SSO/alias/&amp;lt;SP entity ID&amp;gt;&amp;lt;/code&amp;gt;. Here's an example with the SP entity ID from the previous step: &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://auth.myexamplecompany.com/auth/v3/saml/SSO/alias/sp-d49eab9b-ac85-4ad7-b9db-4197e6bc8020-USW1-0&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*The single logout URL, also known as the SingleLogoutService URI. For Genesys Authentication, the URL format is &amp;lt;code&amp;gt;&amp;lt;auth-int-url&amp;gt;/auth/v3/saml/SingleLogout/alias/&amp;lt;SP entity ID&amp;gt;&amp;lt;/code&amp;gt;. Here's an example with the SP entity ID from the previous step: &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://auth.myexamplecompany.com/auth/v3/saml/SSO/alias/sp-d49eab9b-ac85-4ad7-b9db-4197e6bc8020-USW1-0&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*The signature certificate, also known as an X509 certificate, from a certificate authority.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Troubleshooting&lt;br /&gt;
|anchor=troubleshooting&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=The first step in troubleshooting SSO issues is to check the SAML settings:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
curl -X GET -H 'Authorization: Basic &amp;lt;base64 encoded credentials&amp;gt;' -i '&amp;lt;auth-int-url&amp;gt;/environment/v3/contact-centers/&amp;lt;ccid&amp;gt;/settings?category=saml'&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you're seeing errors, particularly intermittent errors, try {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=MixedProv|anchor=updateconfig|display text=reloading the configuration}} after checking the following:&lt;br /&gt;
&lt;br /&gt;
*Make sure the IdP metadata is valid, including valid certificates.&lt;br /&gt;
*If the IdP delegates authentication to other entities, make sure that your CORS settings include all fully qualified domain names in the authentication path.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>WikiSysop</name></author>
		
	</entry>
</feed>