Provisioning overview
From Genesys Documentation
This topic is part of the manual Digital Channels Private Edition Guide for version Current of Digital Channels.
Contents
Learn about the steps involved in provisioning Digital Channels.
Related documentation:
RSS:
After you configure and deploy Digital Channels, you must complete a number of provisioning steps to enable Digital Channels to work with other Genesys services.
- Pre-configure tenant objects
- Enable a tenant for Digital Channels
- Provision API keys
- Setting up Integration for Inbound and Outbound SMS (optional)
- Setting up Integration for Outbound Email Campaigns (optional)
As an alternative to steps 1 and 2 in the previous list, you can auto provision your tenant by following the instructions below.
Auto tenant provisioning
To auto provision your tenant, Add GWS to the list of available GWS services for Nexus and then Get the authentication token.
Next, create a Kubernetes secret with the tenant credentials:kind: Secret
apiVersion: v1
metadata:
name: nexus-new-tenant-credentials
namespace: nexus
type: Opaque
stringData:
credentials: |
{
"cmeUser": "default",
"cmePassword": "password",
"gwsClientId": "external_api_client",
"gwsSecret": "secret"
}
apiVersion: v1
kind: Pod
metadata:
name: nexus-provisioning
labels:
service: nexus
servicename: tenant-provisioning
spec:
containers:
- env:
- name: NEXUS_PROVISION_PARAMS
value: |-
{
"debug": true,
"cme": {
"folderForObjects": "t100", ----> Short Tenant ID
"host1": "tenant-9350e2fc-a1dd-4c65-8d40-1f75a2e080dd.voice", --> CCID should be replaced with tenant CCID
"host2": "tenant-9350e2fc-a1dd-4c65-8d40-1f75a2e080dd.voice" --> CCID should be replaced with tenant CCID
},
"gws": {
"client_id": "nexus_client", --> GWS nexus client that created in previous step
"client_secret": "nexus_client", --> GWS nexus client secret that used in previous step
"extUrl": "https://gws.<yourcluster>",
"intUrl": "http://gws-service-proxy.gws",
"authUrl": "https://gws.<yourcluster>",
"envUrl": "https://gws.<yourcluster>"
},
"ucs": {
"url": "http://ucsx.ucsx:8080"
},
"nexus": {
"region": "USW1",
"url": "http://nexus.nexus",
"urlFromEsv": "http://nexus.nexus"
},
"platform": "Azure",
"tenant": {
"allRegions": ["westus2"],
"ccid": "9350e2fc-a1dd-4c65-8d40-1f75a2e080dd",
"id": "100",
"name": "t100",
"region": "USW1"
}
}
- name: ENVIRONMENT_TYPE
value: azure
image: pureengage-docker-staging.jfrog.io/nexus/tenant_deployment:<tenant_deployment_version>
imagePullPolicy: Always
name: tenant-deployment
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- mountPath: /tenant
name: credentials
readOnly: true
dnsPolicy: ClusterFirst
restartPolicy: Never
schedulerName: default-scheduler
securityContext: {}
imagePullSecrets:
- name: pullsecret
terminationGracePeriodSeconds: 30
volumes:
- name: credentials
secret:
defaultMode: 440
secretName: nexus-new-tenant-credentials
kubectl apply -f nexus-provisioning.yaml -n nexus
Comments or questions about this documentation? Contact us for support!