Maintenance Manual

Enabling Chat Entry Points for SSO 93
Assertion Decryption Certificate: If Enable Encrypted Assertion is Yes, click the assistance
button and provide the following in the Assertion Decryption Certificate window:
Java Keystore File: Provide the file path of your Java Keystore File. This file will be in .jks
format and contains the decryption key the system needs to access files secured by SAML.
Alias Name: The unique identifier for the decryption key.
Keystore Password: The password required for accessing the Java Keystore File.
Key Password: The password required for accessing the Alias' decryption key.
7. Click the Save button.
Enabling Chat Entry Points for SSO
Secure Chat settings (page 92) must be configured before you can enable chat entry points to use Chat Customer
Single Sign-On.
To enable chat entry points for chat customer single sign-on:
1. In the Tree pane, browse to Administration > Departments > Department_Name > Chat > Entry Points.
2. In the List pane, select or create the desired chat entry point.
3. In the Properties pane, change the Apply customer chat single sign-on setting to Ye s .
4. Click the Save button.
Once you enable the Apply Customer Chat SSO setting for an entry point, the chat creation request must contain
a SAML assertion. If the SAML assertion is missing, or is not valid for the entry point, chat requests are denied
for that entry point.
Configuring Your Website for Chat Customer SSO
To configure your website for chat customer single sign-on:
1. Generate the HTML code for the chat entry point. For more information about chat entry points, see About
Entry Points” on page 74.
2. Edit the
egainChat.postChatAttributes
parameter in the HTML code. Set the value of this parameter
to True.
3. Add the following code immediately after the
</script>
tag in the generated HTML code:
<script language=javascript>
// Customer information passed to Unified WIMas name-value pairs. Base64
encoded
SAML token is passed with the name “SAMLResponse”
egainChat.storeChatParameters('SAMLResponse', '<Base64 encoded SAML
assertion>');