Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Difficulty: novice

Content

Table of Contents
minLevel1
maxLevel1

Learning Objectives

After reading this article, you’ll be able to:

  • Configure the necessary assets in the PointGrab™ Platform

  • Configure the device to its location in the Workplace Platform


A Workplace user is needed to access any Workplace touch point. Based on the assigned Workplace role(s), features are made available to the user (for example you need Admin role to access data export functionality in GO or to have access to the Workplace back-end Studio).

A Workplace user in itself can check live floorplans and dashboards, and/or manage users and devices. Yet when it comes to any functionality that leans on the underlying IWMS (for example making a reservation), also an IWMS user is needed.

Users can log in to Workplace touch points (Go, applications, Studio) using

  • UID (Unique ID within Workplace)

  • e-mail address

How to access Workplace User management:

Manually create

...

Workplace users

...

Add new users in Workplace back-end Studio by using the button "add new"

...

Image Added

Image Added

Mandatory fields:

  • UID (Unique ID within Workplace) always starts with (short) tenant name (so the Workplace tool knows which environment to connect to upon log-in)

    • possible characters:

      • letters (small caps and large caps): a-z, A-Z

      • numbers: 0-9

      • special characters: . _ -

  • First Name

  • Last Name

Not mandatory fields:

  • E-mail

    • can be used as login ID

    • can be used to send messages to the user (for example automatic mails based on Brain rules repository)

  • IWMS ID: Workplace user needs to be linked to an IWMS user in order to have certain rights (

...

  • for example to make a reservation

...

  • ). So make sure the users exist in IWMS first, this way you can link them during the

...

UID (Unique ID within Studio) and sumorea e-mail address will be created using

  • (short) tenant

  • first name

  • last name

Login to Cobundu (Studio, Go, touchpoints) is possible via either

  • UID

  • sumorea e-mail address

  • e-mail address

...

  • creation.

  • Password: set a standard/default password

  • active enable/disable toggle: upon user creation, it makes sene to keep this enabled.

  • Must change password toggle: upon user creation, it makes sene to keep this enabled.

  • Roles, see Roles & Profiles

Batch import/modify Workplace users

Upload or modification of multiple users at once (batch upload) is possible using the import-functionality

...

:

  • all fields are mandatory (

...

  • including the default password to start with)

  • document may not contain hyperlinks (so better to set e-mail address as text)

...

View file
nameimport_workplace_users.xls

Info

Best practice is to take an export of the users in your environment and use that as the import file.

Automatic creation of

...

Workplace users

...

After configuration of Workplace SSO: for every (new)

...

Workplace user signing in, upon first login,

...

Workplace creates an account on-the-fly and the user can start using

...

A user logging in with Cobundu ID (tenant.ID) is recognized as being part of a tenant where SSO has been setup and Cobundu will automatically create a Cobundu account.

Prerequisites for Automatic creation of Cobundu users, see section "Cobundu SSO".

Status
titleUnknown Attachment

Cobundu SSO

Cobundu SSO is available for Go.cobundu.comStudio.cobundu.com and Workplace App.

Prerequisites for Cobundu SSO

  • IWMS account for user must exist

    • Ideally, an HR interface takes care of automatic creation of IWMS users

    • In case the logged in user doesn’t exist in IWMS, the user will not be able to use any IWMS-dependant features like making reservations.

  • Identity Provider Mapping (receiving following attributes from the identity provider: "IWMS login ID", "First Name", "Last Name" and "E-Mail“)

    • In case the “IWMS login ID” attribute is not correctly mapped, the user will not be able to use any IWMS-dependant features like making reservations.

  • (optional) Mapping between Active Directory account groups with Cobundu roles

How is it set up?

Cobundu supports SAML 2.0 protocol which is the industry standard among all up-to-date integrations. See SSO SAML 2.0 for a general understanding of how SSO works.
The SSO configuration from IWMS cannot be re-used on Cobundu. These are 2 separated apps from the Identity Provider perspective, and each requires an independent SSO federation setup.

Development takes 2 MDs (incl PM).  The estimate depends on configuration and regulations on the Identity Provider in terms of supported SAML 2.0 options and features, as well as on the maturity of IT staff that is responsible for configuring federation on the customer side. The estimate does not cover HR interface setup on IWMS (user accounts sync), which is a prerequisite for SSO to work on Cobundu.

Contact applicationintegration@spacewell.com for a more detailed quote or to plan your next project.

How does it work?

A user logging in with Cobundu ID (tenant.ID) is recognized as being part of a tenant where SSO has been setup and Cobundu will automatically create a Cobundu account. The user can proceed to login.

A user logging in with e-mail address is now also supported: It uses a whitelist of e-mail providers (eg @spacewell.com or @mcs.be) to check the tenant. To whitelist an e-mail domain, add it to Settings > SAML SSO > "Allowed email domains (comma separated)" (underneath "Auto-Create user").

On GO and Studio, if your customer has SSO installed and you want to bypass (and login using your Cobundu ID), go to https://go.cobundu.com/no-sso or https://studio.cobundu.com/no-sso; select "Log in with your Cobundu credentials"; then log in with your Cobundu ID and password.

Role Mapping (see Roles & Profiles)

Initially, SSO was creating users, but that's as far as the user management went. There is no update done, no deletion or deactivation. If a user is set to disabled in the IWMS, the consequence will be that the Cobundu user is still active, but does not have any IWMS rights anymore: the user can login to Cobundu touchpoints and browse reservable rooms, floorplans etc, but as soon as they want to make a reservation or book a ticket, this will not be possible (because they don't have the correct IWMSrights anymore).

We have now added a way to overcome this by providing a mapping table in Studio, where one can map the Active Directory account groups with Cobundu roles:

If a user logs in using SSO and has no Cobundu account yet

  • The user will be automatically created

  • Based upon the AD Account Group ID passed via metadata, the user will be created and assigned a Cobundu role as defined in the role mapping 

If a user logs in using SSO and already has a Cobundu account

  • Based upon the AD Account Group ID passed via metadata, the user will be assigned a Cobundu role as defined in the role mapping

This Feature can be turned on or off.

More information on Cobundu SSO can be found in this presentation (keep in mind: Cobundu SSO available for Go, Workplace app and Studio)

View file
nameCobundu MCS User Management - Cobundu SSO_FR.pdf

Presentation in French (2020):

...

Workplace.

For more information on Automatic creation of Workplace users, see How to set up Workplace SSO.

Good to know

In the Workplace platform, users are automatically disabled after 3 wrong login attempts.
For more details on possible password security settings, see

...

Tenant Setup.


Search

Live Search