Okta Connector
This document focuses on setting up the integration with Okta and ingesting User details.
Create an API token from Okta Interface
API token is needed when creating an Okta integration. Hence it is important to have Token created inadvance. The process to create a Rest API token for Okta is described here. To create an API token, follow these steps:
Sign in to your Okta organization as a user with administrator privileges
(opens new window). API tokens have the same permissions as the user who creates them, and if the user permissions change, the API token permissions also change. See the section on Privilege level, regarding the use of a service account when creating an API token, to specifically control the privilege level associated with the token.
In the Admin Console, select Security > API from the menu and then select the Tokens tab.
Click Create Token.
Name your token and click Create Token.
Record the token value. This is the only opportunity to see it and record it.
Create an Okta Integration
Go to Settings> Integration > New Integration
Provide the following details
Name: Name of the integration
Endpoint: Provide the Okta URL you need to connect to
Public: Determines whether the integration can be used outside the firewall
Description: Enter the description (Optional)
Click Next
Enter the Authentication details
Access Token: Enter the access token.
Click OK
Name: Enter the name of the DataSource
Type: Select the Type i.e. DownStream or UpStream
Integration: Select the Integeation created in the previous step
Functions: User Learning, User Group Learning or User Profile Learning
Schedule: Select the schedule of the DS you want it to run.
Public Domain: Enter the public domain. If a data source is marked with a public domain name, any KB ingested from DS will come up as a hint to a related question to the bot.
Description: Enter the description you want to give to the DS.
Note - Other configuration options are not needed. 4. Go to the DataSource created and start the Data Source and shown below: 5. Default Mappings.
There is a set of default mappings for each Learning Function, however it is better to make sure that you create new field mappings according to the data you wish to extract from the JSON entries.
Users:
User Profiles:
User Groups:
Setup Okta SSO
1. Okta Setup Overview
The Okta integration is necessary for authentication, application provisioning, and can also be used as a reference in email group management actions. In order to restrict access to Aisera AISM UI and the webchat channel, Okta can be configured as an SSO endpoint as well.
This document describes the two use cases below:
Integration with Aisera for user and application management (requires specific roles to be assigned to the service account)
View user profile
Unlock account/Password Reset
Assign user access to applications and optionally add user to Okta security groups
Configuring access to the Aisera system via Okta SSO
2. Okta Integration with Aisera
This process describes how to obtain an access token from Okta.
In order to obtain the Access Token requested in the table below, please follow the instructions to set up your application by following the link https://developer.okta.com/docs/guides/create-an-api-token/main/.
Following is a summary of the steps:
Login as super administrator to your organization's Okta URL
Create a new user (Service Account for Aisera)
Assign the roles to the Service Account depending on the desired capabilities
Okta Roles
Function
Required Role
View user profile
Org Admin
Unlock account/Password Reset
Org Admin
Application Provisioning/Adding users to Okta security groups
Org Admin and App Admin
Login to your organization's Okta URL as the newly created user
Click on Admin (top right of the page)
Select on the menu option for Security -> API
Click Create token which will create a token with authorization privileges of the user creating the token (in this case, the Aisera Service Account)
Give a meaningful name for the token with datetime for reference (e.g., AiseraServiceAccount_022721)
The token value is shown only once, so copy it and save it before dismissing the popup
Send us the organization Okta URL, the newly created account name, and the newly created token by encrypted email (preferably in separate emails)
Create the service account which can be used to pull data.
System Details
Endpoint
OKTA URL for your organization
Access Token
3. Okta SSO Setup
The information obtained in this section can be used for two purposes:
SSO authentication to access the Aisera AISM UI
SSO authentication to access the Aisera Webchat channel
3.1. Aisera AISM UI SSO Setup
To configure access to the Aisera AISM UI using SSO authentication, use the information available in the
The table below and fill out the missing information.
Send back this information to your Aisera partner and they can configure SSO for your Aisera tenant.
SSO configuration (for Aisera AISM UI)
Entity ID
https://<tenant>.login.aisera.cloud/
ACS Endpoint URL
https://<tenant>.login.aisera.cloud/aisera/ssoLoginCallback
Identity Provider Single Sign-On URL
Default Relay
https://<tenant>.login.aisera.cloud/
Login URL
Typically, same as Login URL
Logout URL
X.509 Certificate
Certificate should be the full text value including “---END CERTIFICATE---”
3.2. Aisera Webchat SSO Setup
To configure access to the Aisera Webchat using SSO authentication, use the information available in the table below and fill out the missing information.
Send back this information to your Aisera partner and they can configure SSO for your Aisera tenant.
SSO configuration (for Aisera Webchat)
Entity ID
https://<tenant>.login.aisera.cloud/
ACS Endpoint URL
https://<tenant>.login.aisera.cloud/aisera/ssoLoginCallback
Identity Provider Single Sign-On URL
Default Relay
https://tenant.chatbot.aisera.cloud/awc/js?t=b9dcb23e-bf49-5719-bb22-5730fcc6f350&embed
The URL is the previous column is just an example and you should get the correct URL from your Aisera partner
Login URL
Typically, same as Login URL
Logout URL
X.509 Certificate
Certificate should be the full text value including “---END CERTIFICATE---”
Last updated