Moveworks for Web Installation - Azure OIDC
Installing Moveworks for Web with a Code Snippet and Azure OIDC
This guide walks you through the Azure SSO OIDC setup for Moveworks for Web (M4W). This will create an Azure application that will then allow customers to copy a code snippet of the bot and paste it onto any page governed by Azure SSO, and Moveworks for Web will just work, automatic authentication and all.
Prerequisite Questions
- Does the site/page you want to include Moveworks for Web on allow for HTML/JavaScript editing?
- If you want it to be everywhere on the site, does it support site templates, master pages, headers, footers, or other similar global page elements that support HTML/JavaScript editing?
- Is the site/page governed by Azure SSO?
Installation Prerequisites
- On the day of installation, we need an individual who has Global Administrator access in your Azure tenant
The Azure OIDC silent authentication only works if users are logged into only one MS tenant. Make sure users logged out from other testing tenants when testing webchat bot. This should be rare if the end users are logged into multiple tenants at once.
Step 1: Azure App Setup Instructions
- Go to the https://portal.azure.com/ that lets you create Applications.
- Click on App registrations
- Select New Registration in the next screen.
Step 2: Configure the application
-
Specify a name for the application. We recommend using your bot’s name.
-
Configure the application.
- Based on your bot environment, set the Redirect URI as one of the following:
Commercial Environment:https://webchat-kprod.moveworks.io/login/sso/oidc
GovCloud Environment:https://webchat.prod.am-usge1.moveworks.io/login/sso/oidc
EU Environment:https://webchat.prod.am-euc1.moveworks.io/login/sso/oidc
Canada Environment:https://webchat.prod.am-cac1.moveworks.io/login/sso/oidc
AU Environment:https://webchat.prod.am-apse2.moveworks.io/login/sso/oidc
- Based on your bot environment, set the Redirect URI as one of the following:
-
Select options as shown below.
Step 3: Generate idp_secret
- Go to Certificates & secrets on the left
- Click New client secret
- Add Description and Expires. 24 months is our recommended option to go with as it is the longest time possible. You can have multiple secrets at once, so before one expires you can create another for a seamless cutover.
Once the secret is created, copy the value and send to Moveworks engineer. Note that this value is only accessible at the time of creation. You will need to create a new one if the previous one isn’t saved before leaving the page.
Step 4: Grant tenant level user consent to the app
- Go to Azure Active Directory
- Go to Enterprise Application under Manage
- Find the application just created and open
- Go to Permissions and click Grant admin consent for
Step 5: Configure Moveworks
After setup is complete, the following information must be shared with Moveworks Customer Success, with the saved secret above.
- Go the Overview in App registrations → your app just created.
idp_client_id
idp_issuer
idp_secret
(saved locally in the previous step)
Step 6: Prepare code snippet
You will need to follow this section here to paste the code snippet onto your website.
Congrats! You did it! By pasting this onto a given page, or template for a page, the bot will appear if the user successfully authenticates. Authentication is seamless, and no login prompt will ever be seen by the user. If the user is not authenticated, the bot will simply not appear. This is true for all websites governed by Azure OIDC SSO, thus you are now free to paste this snippet anywhere that supports it.
By default, this behavior is NOT enabled for all users. Work with your CS team to first create an allowlist of users who can test the web bot before having them enable it to all users.
Updated about 19 hours ago