Difference between revisions of "Draft: PEC-Hybrid/Current/Admin/About"

From Genesys Documentation
Jump to: navigation, search
Line 31: Line 31:
 
|Type=Unstructured
 
|Type=Unstructured
 
|freetext=Perform the following steps using the PureCloud Admin UI or the PureCloud API.
 
|freetext=Perform the following steps using the PureCloud Admin UI or the PureCloud API.
<ol>
+
 
<li>As necessary, for each on-premises service, create OAuth Client Credentials grants:
+
# As necessary, for each on-premises service, create OAuth Client Credentials grants:
<ul>
+
 
<li>Using the UI, follow [https://help.mypurecloud.com/articles/create-an-oauth-client/ these steps],</li>
+
#* Using the UI, follow [https://help.mypurecloud.com/articles/create-an-oauth-client/ these steps],
<li>Or using the API, reference [https://developer.mypurecloud.com/api/rest/v2/oauth/ these endpoints].</li>
+
#* Or using the API, reference [https://developer.mypurecloud.com/api/rest/v2/oauth/ these endpoints].
</ul>
+
 
For more information about the different kinds of Client Grants, see the [https://developer.mypurecloud.com/api/rest/authorization/ Authorization] reference.<br>
+
For more information about the different kinds of Client Grants, see the [https://developer.mypurecloud.com/api/rest/authorization/ Authorization] reference.<br />
 
For more information about Permissions for Altocloud, see the [https://help.mypurecloud.com/articles/altocloud-permissions-overview/ Altocloud permissions overview].
 
For more information about Permissions for Altocloud, see the [https://help.mypurecloud.com/articles/altocloud-permissions-overview/ Altocloud permissions overview].
</li>
+
 
<li>Create a PureEngage Identity Provider (IDP). You can use the Identity Provider API via the PureCloud Developer Tools, SDKs, or Platform API.<br>
+
# Create a PureEngage Identity Provider (IDP). You can use the Identity Provider API via the PureCloud Developer Tools, SDKs, or Platform API.<br />
Sample Request:<br>
+
Sample Request:<br />
 
<source lang="text">
 
<source lang="text">
 
PUT https://api.{{environment}}/api/v2/identityproviders/pureengage
 
PUT https://api.{{environment}}/api/v2/identityproviders/pureengage
Line 54: Line 54:
 
}
 
}
 
</source>
 
</source>
<ul>
+
#* [https://developer.mypurecloud.com/developer-tools/#/api-explorer Developer Tools]<br />
<li>[https://developer.mypurecloud.com/developer-tools/#/api-explorer Developer Tools]<br>
 
 
[[File:Hybrid_Identity_Provider_Tools_PureEngage.png|500px]]
 
[[File:Hybrid_Identity_Provider_Tools_PureEngage.png|500px]]
</li>
+
 
<li>[https://developer.mypurecloud.com/api/rest/client-libraries/ SDKs]<br>
+
#* [https://developer.mypurecloud.com/api/rest/client-libraries/ SDKs]<br />
 
[[File:Hybrid_Identity_Provider_SDK_PureEngage.png|500px]]
 
[[File:Hybrid_Identity_Provider_SDK_PureEngage.png|500px]]
<ul>
+
 
<li>[https://developer.mypurecloud.com/api/rest/client-libraries/java/IdentityProviderApi.html Java]</li>
+
#** [https://developer.mypurecloud.com/api/rest/client-libraries/java/IdentityProviderApi.html Java]
<li>[https://developer.mypurecloud.com/api/rest/client-libraries/dotnet/IdentityProviderApi.html .NET]</li>
+
#** [https://developer.mypurecloud.com/api/rest/client-libraries/dotnet/IdentityProviderApi.html .NET]
<li>[https://developer.mypurecloud.com/api/rest/client-libraries/python/IdentityProviderApi.html Python]</li>
+
#** [https://developer.mypurecloud.com/api/rest/client-libraries/python/IdentityProviderApi.html Python]
</ul>
+
 
</li>
+
 
<li>[https://developer.mypurecloud.com/api/rest/v2/identityprovider/ Platform APIs]<br>
+
#* [https://developer.mypurecloud.com/api/rest/v2/identityprovider/ Platform APIs]<br />
 
[[File:Hybrid_Identity_Provider_API_PureEngage.png|500px]]
 
[[File:Hybrid_Identity_Provider_API_PureEngage.png|500px]]
</li>
+
 
</ul>
+
 
 
Authorization:
 
Authorization:
<ul>
+
 
<li>Type: OAuth 2.0</li>
+
#* Type: OAuth 2.0
<li>Access Token: request new token</li>
+
#* Access Token: request new token
<li>Add authorization data to: Request Headers</li>
+
#* Add authorization data to: Request Headers
</ul>
+
 
 
Troubleshooting:
 
Troubleshooting:
<ul>
 
<li>Ensure that the IDP is set with "autoProvisionUsers" = "true"</li>
 
<li>Ensure that the issuer URI in your SAML assertion is the same as the issuer URI for the IDP.</li>
 
<li>Ensure that you don't have multiple issuers with the same URI.</li>
 
</ul>
 
  
</li>
+
#* Ensure that the IDP is set with "autoProvisionUsers" = "true"
<li>By default, Altocloud permissions are included in the Admin and AI Agent roles. You may grant [https://help.mypurecloud.com/articles/altocloud-permissions-overview/ Altocloud permissions] to additional roles as needed.
+
#* Ensure that the issuer URI in your SAML assertion is the same as the issuer URI for the IDP.
</li>
+
#* Ensure that you don't have multiple issuers with the same URI.
<li>(Optional as needed) Create additional Admin accounts by [https://help.mypurecloud.com/articles/add-people-organization/ adding people to your organization] and [https://help.mypurecloud.com/articles/assign-roles-divisions-licenses-and-add-ons/ assigning them] to the Admin role.</li>
+
 
</ol>
+
 
 +
 
 +
# By default, Altocloud permissions are included in the Admin and AI Agent roles. You may grant [https://help.mypurecloud.com/articles/altocloud-permissions-overview/ Altocloud permissions] to additional roles as needed.
 +
 
 +
# (Optional as needed) Create additional Admin accounts by [https://help.mypurecloud.com/articles/add-people-organization/ adding people to your organization] and [https://help.mypurecloud.com/articles/assign-roles-divisions-licenses-and-add-ons/ assigning them] to the Admin role.
 
|Status=No
 
|Status=No
 
}}{{Section
 
}}{{Section
Line 106: Line 104:
 
#* '''base_service_url''': The base URL that can be used for any PureCloud service; for example: '''base_service_url''' should be <nowiki>https://[region_host]/api/</nowiki>. <nowiki>[region_host]</nowiki> should be the API-based FQDN for the region; the regions are listed on [https://developer.mypurecloud.com/api/rest/ this page]. The rest of the url is PureCloud service and version specific; for example: '''...v2/conversations'''. The '''base_service_url''' and the service specific portion is combined in your componment code.
 
#* '''base_service_url''': The base URL that can be used for any PureCloud service; for example: '''base_service_url''' should be <nowiki>https://[region_host]/api/</nowiki>. <nowiki>[region_host]</nowiki> should be the API-based FQDN for the region; the regions are listed on [https://developer.mypurecloud.com/api/rest/ this page]. The rest of the url is PureCloud service and version specific; for example: '''...v2/conversations'''. The '''base_service_url''' and the service specific portion is combined in your componment code.
 
# Create the following Object options in the '''saml''' section:
 
# Create the following Object options in the '''saml''' section:
#* '''issuer''': The SAML IDP URL.
+
#* '''issuer''': The SAML IDP URI that you created in the PureCloud Provisioning steps above (for example: <nowiki>https://<a href="http://www.genesys.com/pureengage">www.genesys.com/pureengage</nowiki></a>).
#* '''certificate''': The SAML related certificate.
+
#* '''certificate''': The public key of the SAML related certificate (a <span>base64</span>PEM encoded key).
#* '''pkey''': The encrypted SAML related certificate private key.
+
#* '''pkey''': The encrypted SAML related certificate private key (a private key encrypted in aes256 with a password (see password option below) and encoded in base64).
 
#* '''password''': The password to decrypt the private key.
 
#* '''password''': The password to decrypt the private key.
#* '''expire_time''': The expiration time for the access token.
+
#* '''expire_time''': The expiration time (in hours) for the access token. The default is 24 hours. This might be overridden on the server side.
 +
#* Certificate is base64 string created from PEM file by using this command:
 +
#* <source lang="text">
 +
#* openssl base64 -in cert.pem -out result _file_name
 +
#* </source>
 +
#* Pkey is also based64 string but requires additional command to create encrypted private key:
 +
#* <source lang="text">
 +
#* openssl pkcs8 -topk8 -inform PEM -outform PEM -in saml.pem -out <span>key.pem</span> -nocrypt
 +
#* openssl rsa -in key.pem -out key_protected.pem -aes256openssl base64 -in key_protected.pem -out result _file_name
 +
#* </source>
 
# To allow for better control and monitoring of the components using PureCloud Services, for each PureEngage Service that uses a common service you must create multiple sections, one for each OAuth client, in Configuration Server to allow for better control and monitoring of the components using the PureCloud Services and for different rate limiting per client. This does not mean that if you have ''n'' number of components on premises that are associated with one another, they cannot share a given client id.<br />
 
# To allow for better control and monitoring of the components using PureCloud Services, for each PureEngage Service that uses a common service you must create multiple sections, one for each OAuth client, in Configuration Server to allow for better control and monitoring of the components using the PureCloud Services and for different rate limiting per client. This does not mean that if you have ''n'' number of components on premises that are associated with one another, they cannot share a given client id.<br />
 
#: Genesys recommends that you consult architecture before performing this step.
 
#: Genesys recommends that you consult architecture before performing this step.

Revision as of 15:26, May 28, 2019

This is a draft page; the published version of this page can be found at PEC-Hybrid/Current/Admin/About.

This article describes the essential provisioning steps to enable a hybrid integration between PureEngage On-Prem deployments and Genesys PureCloud services.

Supported Services

About Provisioning

PureCloud Provisioning Steps

Transaction object for hybrid integrations

Opening Your Network