We have seen how an Alert task can be set up in Kore.ai virtual assistant platform here. In this section, we will see how basic authorization for the alert tasks can be set up.
How it Works
When basic authorization is used for a task, the XO Platform automatically prompts the user for login credentials to access the web application or web service, as shown in the following illustration.
After the end-user is authorized, the settings are saved using the following naming syntax:
{{ First Name }} {{ Last Name }} {{ VA Name }} {{ Account # }} {{ Sequence # }}
For example, John Smith’s Twitter Account #1.
The XO Platform can access the web application or web service for all future task requests using this account. In addition, the end-user can reuse the account for other tasks for the same Virtual Assistant.
General Setup
You can use Basic Authorization when configuring API Requests within Alert Tasks. To configure authorization using Basic Authorization:
- Select the VA you want to work with.
- Go to Build > Conversation Skills > Alert Tasks.
- Select the task you want to work with.
- Click the API Request tab within the Alert Task.
- Expand the Authorization section and click Create New to configure a new authorization.
- Next, the New Authorization Mechanism window opens, as shown in the illustration below.
To define Basic Authorization, select Basic Auth in the Authorization Type field. Then specify a Name for the authorization to be displayed in the XO Platform user interface. Next, please make your configuration according to the steps below.
Tenancy
If required, in the Subdomain section, select Yes if the base URL for a web application or user interface uses a tenant name in the URL. For example, kore is the tenant organization for a web service using tenants as www.kore.someCompany.com. In the following example configuration, the tenancy URL contains the {tenant} organization placeholder.
Form Fields
If the default username and password fields do not meet your needs, you can add new fields displayed to the end-user by adding authorization form fields. To add fields on the authorization form, click + Add Form Field. The following illustration is an example of a definition to add a password field to the authorization dialog.
The following table describes the fields used to define an authorization IDP form field.
FIELD NAME | DESCRIPTION |
---|---|
Field Title | Specify the name of the field displayed to the end-user in the authentication dialog. |
Field Key | The value represents the end-user input value to the authenticating service. |
Help Hint | The help text displayed in the field to describe what should be entered into the field. |
Field Type | When Advanced Options is selected, specify the type of field displayed in the end-user interface to collect the user input assigned as the value for the Field Key, one of:
|
Mandatory | When Advanced Options is selected, select if the end-user must define this field to complete authentication. |
Data Type | When Advanced Options is selected, specify the type of data expected as input from the end-user. For example, String. |
Visibility | When Advanced Options is selected, specify if the authentication field should be visible, hidden, or displayed as read-only. |
Authorization Fields
By default, authorization fields are configured as part of the header of the task request message. If your task request requires additional authorization fields or the expected authorization is not part of the header, for example, a verification code, click+ Add Authorization Field and then define the fields as shown in the following illustration.
- In the Field Type field, you can select one of the following depending on where in the task request message and the type of authorization fields that are required. Header – The VA expects the authorization fields as part of the header of the request.Payload – The assistant expects the authorization fields as part of the content of the body of the request. Query String – The VA expects the authorization fields as a query in the body of the request. Path Param – The VA expects the authorization fields as part of the URL path for the request.
- In the Field Key field, enter the name of the field for the selected Field Type.
- In the Field Value field, enter the value for the Field Key specified.
- Click Done. The new authorization field is added in the Authorization Fields section.
- To add additional authorization fields, click Add in the Authorization Fields section.
- In the Authorization Check URL field, optionally define a URL that is used to test the authentication settings from the XO Platform before you deploy the task with the authorization mechanism. You can use dynamic fields, path parameter fields, query fields, and so forth, to define the test URL, for example, https://kore.someCompany.com/sap/opu/odata/sap/{{authfield1}}/?$format=json
- Click Save to save the authorization settings and close the New Authorization Mechanism dialog.
Testing
After you save the authentication, if you have defined an Authorization Check URL for your new authorization type, you can test your authorization definition on the Authorization tab.
- Click Test Authorization before continuing to develop the remaining steps of your task.
- After you click Test Authorization, the Test Authorization window is displayed and populated with the URL you specified in the Authorization Check URL section, as shown in the following illustration.
To configure the Test Authorization – Basic Auth, follow the below steps:
- In the Auth Check URL field, verify or enter the URL to test the authentication configuration.
- If your assistant uses subdomains, the Tenancy field is displayed and you must specify the tenant.
- Enter your User Name and Password for the web service.
- Select the content type expected for the URL in the Content-Type field.
- For testing the URL, the Method field is read-only and set to GET.
- Click Test to begin the authorization test.
When the validation of authentication is complete, the Test Authorization window is closed and the results of the validation, either success or failure, is displayed to the immediate right of the Test Authorization button as shown in the following illustration.
If the authorization fails, the Auth Test Failed message is displayed along with the Headers and Response tabs as shown in the following illustration.