What's my plan?
Add-on Zendesk for Contact Center

Verified AI summary ◀▼

Use Cognito UserPools for agent sign-in if you're not using SSO. Log into your AWS account, access the Cognito service, and create users in the UserPool. Ensure email addresses match Amazon Connect usernames. Set Cognito as the identity provider in the Hosted UI settings. This configuration allows agents to sign in using the manually created users in the UserPool.

Users in Amazon Connect are the agents and supervisors who manage your contact center. You can add users manually or by importing them in a CSV file. Each user has attributes that determine their roles and capabilities. The high-level requirement for configuring SSO is summarized and can be used as guidance for configuration of any new SAML providers that have not yet been documented.

Contact Center leverages Amazon Cognito for agent authentication, including single sign-on (SSO). The benefits of this approach are:
  • No agent data is stored in the Zendesk environment. All agent data is stored in Amazon Cognito in the client's own AWS account.
  • Amazon Cognito caters for user pools where users can manually be created.
  • Amazon Cognito caters for SAML federation, which enables SSO, with most SAML providers.
  • A SAML application (and an associated XML configuration file) is required.
Note: To set up single sign-on (SSO) for Connect, configure the SAML application in the IAM Identity Center, which is often in a separate AWS account and region. However, the identity provider, role, and policy are established in the same AWS account as Connect.
This article contains the following topics:
  • Understanding required SAML application settings
  • Manually adding users using Cognito user pools (if you're not using SAML/SSO)
  • Setting up users with SSO and SAML
  • Setting up SSO with other services

Understanding required SAML application settings

Your SAML application must have the following settings:

Attribute Value
ACS URL https://${yourDomainPrefix}.auth.${region}.amazoncognito.com/saml2/idpresponse
Application SAML audience urn:amazon:cognito:sp:${yourUserPoolID}
Application start URL (optional) Contact Center login URL

The SAML application must have the following two SAML attributes:

SAML Attribute Maps to this string value or user attribute Format
Subject ${user:email} Persistent
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress ${user:email}  

Configure the identity provider in Cognito with the following attributes:

User pool attribute SAML Attribute
email http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

Manually adding users using Cognito user pools (if you're not using SAML/SSO)

When the CloudFormation stack ran, it created an Amazon Cognito user pool for this Contact Center instance. The user pool is a directory of user accounts who can authenticate to Contact Center. It likely also created an app client in Cognito (which the Contact Center app uses to allow users to lsign in), and an LMAdmin group for admin permissions. Next, you'll create at least one user in this user pool, so you can test signing in to Contact Center.

To manually add a user

  1. In the AWS console, open the Cognito service.
  2. Click the use pool you want to manage.

  3. On the Login pages tab of the app client setting, edit the Managed login pages configuration.
  4. Change the Identity Provider to be the Congito user pool directory.
  5. In the Cognito user pool console, find the section for Users” and click Create user (or Add user).
  6. Enter the following details for the new user account:
    • Username: Choose a username (for example, the person’s email address or a simple name).
    • Temporary Password: Set an initial password for the user. (Cognito might require the user to reset the password on first sign in, but for internal testing you can set a simple password and, optionally, turn off the reset requirement).
    • Contact Info: Depending on settings, you might need to provide a valid email address and/or phone number for the user (these can be used for password recovery or multi-factor authentication).
    • Account Status: Make sure that Mark phone/email as verified is checked if you provided those and don’t want Cognito to expect a verification step. Also, check Temporary password so the user must change it on first sign in (for production users).
    • Create the user: The new user will now appear in the user list for the pool.

This user represents an agent (or admin) who can log into the Contact Center web app.

Setting up users with SSO and SAML

Setting up SSO with other services

The following resources provide additional information about setting up SSO with various services:

  • Amazon Web Services (AWS)
  • Azure AD
  • Okta
  • Google Workspaces
  • Cognito Userpools
Powered by Zendesk