We’re excited to offer single sign-on (SSO) support for Conversica. We now integrate with some of the most popular SAML-supported central identity providers like Okta, OneLogin and Azure AD so you can securely manage access to Conversica from one place.
What are the benefits of SSO?
- Better User Experience - Your team members no longer have to juggle multiple passwords. They can use a single set of login credentials to access Conversica and their other corporate applications.
- Easy User Access Controls - When employees come and go, your admins can easily add users or revoke access to Conversica behind a single corporate directory.
- Improved Security - The SSO user authentication process helps reduce security risks by providing tighter control over who has access to your data.
SAML Identity Providers
SSO support is available to any customer using a SAML 2.0-compliant identity provider such as Okta, OneLogin, Azure AD and Auth0.
How to Configure SSO
If you’re interested in connecting your SSO provider to Conversica, contact your Conversica Technical Account Manager today. Your Technical Account Manager will assist you with configuring SSO to Conversica.
For all SSO services that allow metadata ingestion, the process is as simple as providing Conversica with your metadata XML file and ingesting Conversica's metadata XML file on your end.
You will also want to decide whether or not new users within Conversica can be created when logging in as a new user through SSO, and your preferred IDP identifier. Provide this information to your TAM once decided.
For Okta users, there are a few nuances involved that will be required to set up.
- Your metadata XML file is still required and will be added to your Conversica dashboard by your TAM.
- Since Okta does not allow metadata XML ingestion, you will need to set up the parameters within the SAML settings of Okta. See below for more details on that.
- Okta does not support the Conversica SAML 2.0 widget button. You will want to hide this widget and a new generic button needs to be created as a shortcut (via Bookmark app) to the new sign-on link provided to you by Conversica if you want an easy click to log in via the Okta browser tool. Details can be found here: Simulate an IdP-initiated Flow with the Bookmark App | Okta
Okta SAML Settings:
- Single Sign-On URL : https://my.conversica.com/sso/acs
- Audience URL https://my.conversica.com
Attribute Statements:
- Name: email, firstname, lastname
- Name Format: Unspecified
- Value: user.email, user.firstName, user.lastName
In the bookmark application use the URL provided to you by your TAM after ingesting your metadata XML file. EX: https://my.conversica.com/site/login?idp={idp}
Comments
0 comments
Article is closed for comments.