Configuring a CxEngage Service Account

When integrating Microsoft Teams and CxEngage, there must be at least one user that has permission to read the MS Teams and Active Directory user profiles. We recommend the user account be called CxEngageService Account. It does not need to be linked to a CxEngage agent's account.

The CxEngage Service Account is used to:

  • Read all Active Directory and Microsoft Teams user details, such as email, phone number, other emails, account state, and display name.

  • Create or delete the user presence subscription for a group of users.

  • Receive user presence change notifications, when the Microsoft Teams presence status is updated.

Note: The CxEngage Service Account must be common between Microsoft Teams and Active Directory and have administrative read access to both Microsoft Teams and Active Directory.

Creating the CxEngage Service Account

To create a CxEngage Service Account, do the following:

  1. Log in as the Administrator to your newly created CxEngage AD Tenant.

  2. Select Users from the menu.

  3. Click New User.

  4. Enter the Name and email (user name) for the user.

  5. Copy the auto-generated password from the Password field.

    Note: Record the password that is created. It will be used when creating the Microsoft Teams integration in CxEngage.

  6. Click the Create button.

Configuring API Delegated Permissions

Once the CxEngage Service Account is created you must configure the delegated permissions for the account.

While logged in with the Active Directory administrator account do the following:

  1. Select App registrations from the menu.

  2. Select the Active Directory application you created for the Microsoft Teams and CxEngage integration.

  3. Under Manage, select API permissions.

  1. Click Add a permission.

  2. On the Request API permissions panel, select Microsoft Graph.

  3. Under What type of permissions does your application require?, select Delegated permissions.

  4. Under Select permissions, expand each section and check all the boxes.
    Note: See the API Permissions List for a list of Delegated permissions.

  5. Click the Add Permissions button to complete the process.

Assigning Roles to the CxEngage Service Account

The CxEngage Service Account must be assigned certain roles to allow the user account to read information related to users in Active Directory and MS Teams.

  1. Log in as the Administrator to your newly created CxEngage AD Tenant.

  2. Select Users from the menu.

  3. Click the CxEngage Service Account user.

  4. Select Assigned Roles.

  5. Click the Add Assignments button.

  6. In the Directory Roles section, one by one, type in the following roles and click the Add button.

  • Global administrator

  • Teams administrator

Note: It may take a few minutes for the new roles to show in the user account.

Disabling Multi-Factor Authentication

You will want to disable multi-factor authentication for the CxEngage Service Account.

  1. Log in as the Administrator to the Azure Active Directory Admin Center.

  2. Select the Active Directory tenant that was created for the MS Teams and CxEngage integration.

  3. Select Users.

  4. Click the Per-user MFA button.

  5. From the list of users, click the CxEngage Service Account user.

  6. Click Disable MFA.

  7. When prompted, confirm that you want to disable MFA for this user.

Disabling Security Defaults

You will want to disable the security defaults for the CxEngage AD Tenant.

  1. Log in as the Administrator to the Azure Active Directory Admin Center.

  2. Select the Active Directory tenant that was created for the MS Teams and CxEngage integration.

    Graphic of the Tenant Properties Manage Security Defaults screen

  3. Select Properties.

  4. Click the Manage security defaults button.

  5. In the Enable security defaults panel, click the toggle to change it to No.

  6. Click the Save button to keep your changes.