SevisBOT supports Single Sign On (SSO) when accessing Portal through OpenID Connect (OIDC). This document outlines the process of configuring SSO for your organization.
Since every identity provider is different, these steps and the terminology may vary slightly, please contact ServisBOT if further assistance is required.
ServisBOT requires the following information from this application:
https://servisbot.okta.com
Upon receipt of the information above, ServisBOT will generate the Login Redirect URL and provide it to you. This should be entered into your application.
If you have not done so already, it may be required to add your new application to selected users within your organization.
An application admin from your organization should visit the ServisBOT Portal and click Login with SSO
as shown below:
Once logged in you will notice that you have no ServisBOT Roles to access features. Please contact ServisBOT at this point and your user will be configured with the permissions to view features and also manage users.
Once roles are configured, log back in and you will now have access to both user management and the ServisBOT features required to build your experience.
It is at this stage that additional users should log into the ServisBOT Portal. Like before, users will not have any ServisBOT Roles, it is now up to your organizational administrator that has a fully configured user from the previous step to add the roles to the new users. The administrator may create additional users with the capability to manage users.
In ServisBOT it is possible to allow the identity provider to manage the roles of users.
Example of configuring Okta to manage roles for users.
Profile Editor
from the Directory
menu.servisbot_roles
. This should be a string
type.Profile Editor
find the application that requires the use of the servisbot_roles
user attribute. This will be named **application** OIDC User
**application** OIDC User
. This can be named as required but the name needs to be communicated with ServisBOT.Profile Editor
the application that you have been modifiying has a Mappings
buttonMappings
menu there is two tabs. Select the Okta User to **application**
tabservisbot_roles
attribute on the left hand side.servisbot_roles
attribute to the user and assign the roles that you want the user to have in ServisBOT.** Note ** At the time of writing Okta does not appear to support adding attributes to a users profile using groups. This means that you will need to add the attribute to each user that you want to have access to ServisBOT.
More information on ServisBOT Roles can be found here.
The string should be the following format:
{"roles":["master-bot-builder","bot-builder","bot-manager","data-scientist","it"]}
The items in the array should be the roles that you want the user to have in ServisBOT.
Here is a sample of the roles being configured on a users profile in Okta: