Page tree

SAML2.0 is one of the two protocols supported by LiveVox for SSO.  Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between an identity provider and a service provider.  SAML 2.0 is a version of the SAML standard for exchanging authentication and authorization identities between security domains. SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about an end user between an Identity Provider and a Service Provider. SAML 2.0 enables web-based, cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the user.

To configure SAML2.0 on Okta, you must have the required credentials on your Okta client.


To configure SAML20 on Okta:

  1. On LVP, navigate to the Configure > Client > Security tab. Click the See Instructions link.


    You will find the required URLs to complete your IdP configuration setup.  


    The LIVEVOX SSO configuration window displays URLs for SAML2.0 and OIDC. For configuring SAML2.0 for Okta, note the following three URLs:

    User Single Sign On URL <URL1>  
    Agent Single Sign On URL <URL2>  
    Audience Restriction <URL3>

  2.  Log in to your OKTA client with the appropriate credentials.
  3. Select applications and create a new App Integration.
  4. Select the SAML 2.0 protocol.
  5. Enter a name in the App Name field and upload a logo (optional). Click Next.


  6. In the Create SAML Integration window, enter the User Single Sign-on URL and Audience URI and check the Use this for the Recipient URL and Destination URL field.
  7. Click Show Advanced Settings. Add the agent URL in the Other requestable SSO URLs. You have now added URLs for the User, the Agent, and the audience URI.
  8. Scroll down to the bottom of the page and click Next.


  9. Specify the appropriate option for the question “Are you a customer or partner?” Click Finish.
  10. On the following screen, Click View SAML Setup Instructions to obtain the URLs to be used on the LiveVox Portal (LVP) for completing the SSO configuration.


  11. Obtain the Sign On Url, Issuer URL and X.509 Cert, and copy the values in the respective fields in the Configure> Client > Security tab on LVP.


    Note

    When you add the x.509 certificate, ensure that there are no extra spaces at the end of the certificate.

  12. Click Save.
  13. Before enabling SSO on LVP , ensure that users are enabled on the IdP.  If required, add users to IdP, and click the Assign button.


  14. Ensure that users and agents have the same email address on the LiveVox Platform. See the Viewing Existing Users and Viewing Existing Agents section for more information.


  15. After confirming that all the users and agents have valid emails, enable SSO. On LVP, navigate to Configure > Client > Security tab and enable the Single Sign On switch.


    Important

    You can access the LiveVox Portal as an admin through the portal.livevox.com URL, or as an agent through the agent.livevox.com URL. LiveVox recommends using the URLs to access the platform instead of the Okta home page.

  • No labels