Difference between revisions of "Draft: PEC-Hybrid/Current/Admin/About"

From Genesys Documentation
Jump to: navigation, search
Line 116: Line 116:
 
<ul>
 
<ul>
 
<li>'''issuer''': The SAML IDP URI that you created in the PureCloud Provisioning steps above (for example: <nowiki>https://www.genesys.com/pureengage</nowiki>).</li>
 
<li>'''issuer''': The SAML IDP URI that you created in the PureCloud Provisioning steps above (for example: <nowiki>https://www.genesys.com/pureengage</nowiki>).</li>
<li>'''certificate''': The public key of the SAML related certificate (a base64 PEM encoded key).</li>
+
<li>'''certificate''': The public key of the SAML related certificate (a base64 saml.pem PEM encoded key).</li>
<li>'''pkey''': The encrypted SAML related certificate private key (a private key encrypted in aes256 with a password (see password option below) and encoded in base64).</li>
+
<li>'''pkey''': The encrypted SAML related certificate private key (a saml.pkcs8 private key encrypted in aes256 with a password (see password option below) and encoded in base64).</li>
 
<li>'''password''': The password to decrypt the private key.</li>
 
<li>'''password''': The password to decrypt the private key.</li>
 
<li>'''expire_time''': The expiration time (in hours) for the access token. The default is 24 hours. This might be overridden on the server side.<br>
 
<li>'''expire_time''': The expiration time (in hours) for the access token. The default is 24 hours. This might be overridden on the server side.<br>
Line 130: Line 130:
 
openssl rsa -in key.pem -out key_protected.pem -aes256openssl base64 -in key_protected.pem -out result _file_name
 
openssl rsa -in key.pem -out key_protected.pem -aes256openssl base64 -in key_protected.pem -out result _file_name
 
</source>
 
</source>
 +
Once you have created the two PEM files perform the following steps:
 +
<ul>
 +
<li>Encode saml.pem into a base64 string (=>’saml.pem.b64’) using this command:
 +
<source lang="text">
 +
openssl base64 -in saml.pem -out saml.pem.b64
 +
</source>
 +
</li>
 +
<li>Encrypt the saml.pkcs using a password (=>’saml.pkcs.enc.password’) and then encode the resulting content into a base64 string (=>’saml.pkcs.enc.b64’) using this command:
 +
<source lang="text">
 +
openssl rsa -in saml.pkcs8 -out saml.pkcs8.enc -aes256
 +
</source>
 +
(specify the value of saml.pkcs.enc.password when prompted)
 +
<source lang="text">
 +
openssl base64 -in saml.pkcs8.enc -out saml.pkcs8.enc.b64
 +
</source>
 +
</li>
 +
</ul>
 +
The resulting material can be set in the saml section of the transaction object:
 +
<ul>
 +
<li>certificate=<saml.pem.b64></li>
 +
<li>pkey=<saml.pkcs.enc.b64></li>
 +
<li>password=<saml.pkcs.enc.password></li>
 +
</ul>
 
</li>
 
</li>
 
</ul>
 
</ul>

Revision as of 14:59, May 29, 2019

This is a draft page; the published version of this page can be found at PEC-Hybrid/Current/Admin/About.

This article describes the essential provisioning steps to enable a hybrid integration between PureEngage On-Prem deployments and Genesys PureCloud services.

Supported Services

About Provisioning

PureCloud Provisioning Steps

PureEngage On Premises: Transaction object for hybrid integrations

Opening Your Network