23-09-21 03:34 PM
23-09-21 08:25 PM
24-09-21 07:25 AM
@ewilson,
Yes, we have set up Active Directory SSO authentication. We tested different username variations and UPN works just fine when we are using accounts which belongs to real users (like myself). However, we cannot log in with corresponding service account even if we try the same way. There is probably something wrong with our service accounts which we tried to create following the Process Dispatch Framework - User Guide.
We created a group for Web Service Consumers and joined a service account (BPwsConsumer) to this group. After this we added this group to BP System - Security - User roles. The corresponding service account was also added to the BP credentials using the same user/account name and password. Does it matter that this service account is not part of BP System - Security - Users, because this information comes from Active Directory?
Can we use Postman to test this framework? If so, what kind of basic test scenario would be easy to create for this purpose? At the moment I feel that we don't have a clue what to do with this.
24-09-21 08:09 PM
25-09-21 07:18 AM
@ewilson,
When I'm talking about service account I'm referring to BP Process Dispatch Framework - User Guide:
3.2. Credentials
This framework utilizes credentials in three areas:
• Web Service Invocation
• AutomateC Execution
• Querying the Blue Prism Database
3.2.4. Credential Manager
The details of the various credentials, described above, must be stored in the Blue Prism Credential Manager. Use of Credential Manager allows the processes and VBOs of the dispatch framework to access the username and password in a secure manner without having to hardcode those values within the actual processes/VBOs. To add those credentials to Credential Manager, simply create a new General credential for each of the user accounts and populate the Username and Password with the account details. Within the various processes/VBOs of the framework simply reference the credential name where required. The processes/VBOs will then request access to the credential from Credential Manager.
Because we are using Active Directory SSO as a login method we can't create users directly from Blue Prism as the User Guide advice. So, we have created separate accounts for Web Service Invocation, AutomateC Execution and Querying the Blue Prism Database to Active Directory and Web Service Invocation and AutomateC Excecution accounts has joined to Web Service and Runtime Resource group and after that these groups can be added under BP System-Security-User Roles. Account for querying database was created to SQL Server and read only DW01 -account was added to BP Credentials. Corresponding Web Service Invocation and AutomateC Execution -accounts were added to Credential Manager.
It would be nice if User Guide took into account that someone is using purely AD SSO.
26-09-21 04:25 PM
<soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:urn="urn:blueprism:webservice:processdispatcher">
<soapenv:Header/>
<soapenv:Body>
<urn:RunProcess>
<bpInstance xsi:type="xsd:string">auto</bpInstance>
<UseSSO xsi:type="xsd:boolean">False</UseSSO>
<BPCredentialName xsi:type="xsd:string">Blue Prism</BPCredentialName>
<ProcessName xsi:type="xsd:string">CalcWSProcess</ProcessName>
<ProcessParameters xsi:type="xsd:string"><![CDATA[<inputs><input name='taskId' type='Text' value='12345' /></inputs>]]></ProcessParameters>
<CallbackInfo xsi:type="xsd:string">{'eventID': 3}</CallbackInfo>
<ResourcePoolName xsi:type="xsd:string">DispatchedProcessPool</ResourcePoolName>
</urn:RunProcess>
</soapenv:Body>
</soapenv:Envelope>
You'll want to set the following values:
29-09-21 06:24 AM