Authentication Methods
There's three different types of authentication:
- Collaborators: These users are able to access the Admin UI and will have access to manage and edit bots based on their roles.
- Chat Users: These users are only able to speak with bots, and they can see the list of bots if they log on the Admin UI
- External User: This method of authentication expects that you handle user authentication yourself and provide a JWT token to identify the user.
Authentication Overview
There are 4 different type of authentication strategies currently supported: Basic, SAML, OAuth2 and LDAP. You can also implement them multiple times (for example, you could have two different OAuth2 configurations for different workspaces).
No matter what authentication strategy is used, they are all stored in the database. When you add a new strategy in the botpress.config.json file, upon server restart a new table called strategy_STRATEGYID will be created.
When you give access to a user for a specific workspace, an entry is created in the table workspace_users with his role.
If you have more than one authentication strategy, a menu will be displayed to pick a strategy. You can skip the menu and bookmark a specific strategy by changing the page URL: /admin/login/STRATEGYID.
Moreover, you can access a specific workspace by using /admin/login?workspaceId=WORKSPACEID
You can find the definition for the various authentication strategies here.
Basic
Basic Authentication allows a user to log in with a simple username / password. The password is salted for added security.
To create more accounts, visit the Collaborators tab on the Admin UI. Choose the role and enter the E-mail of your collaborator, then you will receive a random password. The user will need to pick a password after the first login.
Super Admins are able to reset the password of any user using the basic authentication.
Configuration Example
In your botpress.config.json file:
{
"pro": {
"collaboratorsAuthStrategies": ["default"],
},
"authStrategies": {
"default": {
"type": "basic",
"label": "Default Auth",
"options": {}
}
}
}
Additional Security
There are additional options that can be configured when using this authentication strategy. Please refer to the configuration file for more information :
maxLoginAttempt: Max number of tries allowed before locking out the userlockoutDuration: Account will be disabled for this amount of time whenmaxLoginAttemptis reachedpasswordExpiryDelay: Password will expire after this specified durationpasswordMinLength: Minimum length for the user's passwordrequireComplexPassword: Requires at least 1 character of 3 categories of characters
Forgot your password?
Only the first user is allowed to register a new account. If you forgot your password and can't access your account, you will need to clear the list of users, then you will be able to re-create your account.
You can clear the list of users by emptying (or deleting) the table strategy_default (if you are using the default strategy)
OAuth2
Some OAuth2 implementations returns a JWT token containing all the user's information, while some other returns a special token, which must then be used to query the user's information.
{
"pro": {
"collaboratorsAuthStrategies": ["default"],
},
"authStrategies": {
"botpress": {
"type": "oauth2",
"options": {
"authorizationURL": "https://example.auth0.com/authorize",
"tokenURL": "https://example.auth0.com/oauth/token",
"clientID": "your-client-id",
"clientSecret": "your-client-secret",
"callbackURL": "http://localhost:3000/api/v1/auth/login-callback/oauth2/botpress",
/**
* If the token doesn't contain user information, set the userInfoURL
*/
"userInfoURL": "https://example.auth0.com/userinfo",
/**
* If the token already includes all user information,
* */
"jwtToken": {
"audience": "my-audience",
"issuer": "some-issuer",
"algorithms": ["HS256"],
// Either set the certificate, or save it in a file: data/global/oauth2_YOUR_STRATEGY_ID.pub
"publicKey": ""
}
"scope": "openid profile email"
},
"fieldMapping": {
"email": "email"
}
}
}
}
SAML
You can link your SAML Identity Provider seamlessly with Botpress. When it is enabled, Admins will be greeted with a Sign in with SSO button on the Admin UI. The first user to ever login to Botpress using the SSO provider will automatically have an account created and will be a Super Admin.
When a user successfully log on the Admin UI, Botpress will create an internal account for that user. They will be added to the table strategy_STRATEGYID
There are two possible behaviors. You can either:
- Allow any user that successfully logs on using your SAML IdP to create an account. Set
allowSelfSignuptotrue - Manage users manually (you need to add their emails in the Collaborators page). Set
allowSelfSignuptofalse
Prerequisite
- Botpress Pro enabled with a valid license key
- A SAML IdP (Identity Provider)
Quick Start
- Open
botpress.config.jsonand setpro.auth.strategy = 'saml' - Configure the available options. The complete list of SAML options is available here.
Here is a complete example
"auth": {
"strategy": "saml",
"options": {
"entryPoint": "https://botpress-saml-idp.auth0.com/somestuff/bla",
"callbackUrl": "http://localhost:3000/admin/login-callback",
"path": "/login-callback",
"issuer": "botpress-saml",
"cert": "MIIDETCCAfmgAwIBAgIJIHQ75dJxjRuEMA0GCSqGSIb3DQEBCwUAMCYxJDAiBgNVBAMTG2JvdHByZXNzLXNhbWwtaWRwLmF1dGgwLmNvbTAeFw0xOTAxMTUxNTAzMDFaFw0zMjA5MjMxNTAzMDFaMCYxJDAiBgNVBAMTG2JvdHByZXNzLXNhbWwtaWRwLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMUHXzCG3c4iSyU1N1Nzu8LsEIQ8tj5SHG+VtHrhWyfdckq5nP2wy/u6Tt20pdOx+4zu1718x2xVPMwFN9M2uUSJaY6vIXfHofKyn1htuYYzOklLZmnrLX4Pm7YHE2SubAsuwg6e7/sgIZ06T",
"acceptedClockSkewMs": 5000
},
"fieldMapping": {
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"firstname": "cn"
},
"allowSelfSignup": false
}
LDAP
Prerequisite
- Botpress Pro enabled with a valid license key
- Information to access the LDAP server
Quick Start
- Open
botpress.config.jsonand setpro.auth.strategy = 'ldap' - Configure the available options: check the full configuration for more details
Field Mapping
The fieldMapping configuration allows you to match existing properties of your users with the one Botpress uses. These are the fields that you can define for users: email, either fullname or firstname with lastname, company, role and location.
Whenever a user successfully logs on using SAML or LDAP, his details will be updated in his Botpress profile.
{
"fieldMapping": {
"email": "emailAddressOnIdp",
"fullname": "userFullName",
"company": "!Botpress",
"role": "userRole",
"location": "officeLocation"
}
}
User Authentication
Using External Authentication, it is possible to authenticate a user on your system, then validate his identity each time he sends a message to the bot. That information can be used in Actions, Hooks, and for Transitions on the Flow Editor.
Here's a summary of the process:
- User authenticate on your platform
- Your platform returns a JWT token to the user and configure the webchat
- The token is sent to Botpress every time a message is sent
- Botpress validates the token, decrypt the content and makes it available through
event.credentials
Prerequisite
- Botpress Pro must be enabled with a valid license
- A backend that will authenticate the user and generate the JWT token
- The public key used by the backend
Quick Start
- Edit
data/global/botpress.config.jsonand setpro.externalAuth.enabledtotrue - Configure the other variables for the JWT token (issuer, audience, algorithm, publicKey)
- Restart Botpress
- Edit the code of the embedded webchat to send the generated JWT token
- Enjoy!
Here is an example configuration, check the full configuration for more details
"externalAuth": {
"enabled": true,
"audience": "users",
"issuer": "botpress",
"algorithm": "HS256"
"publicKey": "MIIDETCCAfmgAwIBAgIJIHQ75dJxjRuEMA0GCSqGSIb3DQEBCwUAMCYxJDAiBgNVBAMTG2JvdHByZXNzLXNhbWwtaWRwLmF1dGgwLmNvbTAeFw0xOTAxMTUxNTAzMDFaFw0zMjA5MjMxNTAzMDFaMCYxJDAiBgNVBAMTG2JvdHByZXNzLXNhbWwtaWRwLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMUHXzCG3c4iSyU1N1Nzu8LsEIQ8tj5SHG+VtHrhWyfdckq5nP2wy/u6Tt20pdOx+4zu1718x2xVPMwFN9M2uUSJaY6vIXfHofKyn1htuYYzOklLZmnrLX4Pm7YHE2SubAsuwg6e7/sgIZ06T",
}
}
How to configure the Public Key
The public key can be added directly in the botpress.config.json file (on the same line). If you prefer to add the key in a file, remove the property certificate, and Botpress will load the key from data/global/end_users_auth.pub
How to create a new Key Pair
The certificate must be in the PEM format. You can use the below commands to generate one.
ssh-keygen -t rsa -b 4096 -m PEM -f jwtRS256.key
openssl rsa -in jwtRS256.key -pubout -outform PEM -out jwtRS256.key.pub
cat jwtRS256.key // Your private key
cat jwtRS256.key.pub // Your public key
Authenticate the user
Once you have generated the JWT token, it must be passed down to the web chat. It will then be sent to Botpress with every message and events. Check out the Connecting your bot with your existing backend for more details. There are two different situations:
- The user is authenticated before the webchat is loaded.
Simply add the external token as an option to the init method:
window.botpressWebChat.init({
host: 'http://localhost:3000',
botId: botId,
externalAuthToken: 'my.jwt.token'
})
- The user is already discussing with the bot, then he is authenticated
Use the configure method to change the option:
window.botpressWebChat.configure({ externalAuthToken: 'my.jwt.token' })
How to use the authenticated payload
When a user is authenticated, the JWT token is automatically decoded. If the token is valid, all the data it contains will be available through the event.credentials property. This can be accessed inside Hooks and while using Actions.