Configure the Interaction Capture Control API Adapter
The Interaction Capture Control Adapter can be used in standard integrations with applications such as Customer Feedback Product in the system that provides a highly reliable, scalable and flexible voice and Web/email system for conducting intelligent and dynamic postcall and post contact surveys. or Desktop Process Analytics (DPA) and custom integrations built by third party companies. More information about the Interaction Capture Control API can be found on Verint Connect Developer Resources.
Procedure
-
Click General Setup > Integration Adapters > Settings.
-
Click Create, then click Recorder Integrations API (eQuality Connect V6) Adapter.
-
Specify settings for this adapter in the right-hand pane, referring to the following table (all fields are required unless otherwise indicated):
Field
Description
Adapter Name
Type a unique name for this adapter. Do not use any special characters or characters that truncate xml. This field is not case sensitive.
Description
Type a description of the adapter (optional).
Adapter Type
A read-only field that lists the adapter selected above.
Startup Type
Select a startup type: Automatic, Manual, or Disabled.
DataSource
Select a data source Third-party systems that provide data to the system, including employee and device states, and data change events. Typical data sources are phone switches, PBXs, or LANs. — this should be the switch used in Quality Monitoring (see "Creating a Data Source" in the Integration Service Integration Guide).
Listen Port
Specify the port number on which the eQCAdapter listens for connections. Default: 3020.
Disable Session Management Interface
Enabled by default. Leave this check box selected if you want this adapter to perform tagging only while the switch controls recording. When selected, data tagging, agent login and logout, and recording control (pause/resume, start/stop) will continue to function. Call control (such as connected/disconnected, held/retrieve) will not function. IMPORTANT: Clear this setting only if these call control features are required for the associated Data Source.
Security Settings
Select one of the following options:
-
No Security (HTTP)—HTTP will be used, meaning no encryption of traffic will occur. This is the default.
-
HTTPS with built-in keys—This setting uses built-in, supplied certificates for the server.
-
HTTPS with below keys—If you select this option, you must complete the Keystore Filename, Keystore Password, and Keystore Format fields below. The Integration Service supports any public/private keystore in the Java Key Store (JKS) or Public-Key Cryptography Standard (PKCS) 12 formats. JKS is the default. If reusing the keys used by the TLS server certificate located in %IMPACT360SOFTWAREDIR%\conf\security, use the 'HTTPS with System Certificates' option instead.
-
HTTPS with System Certificates—This option supports encryption of the API. If you select this option, the deployed TLS server certificates %IMPACT360SOFTWAREDIR%\conf\security are used by the adapter. Updates to these certificates are automatically picked up by the adapter.
-
Security Profile option—This option sets security ciphers and protocols used by the adapter. The options are "Server Site", "Intermediate", and "Modern".
-
The "Server Site" option tells the adapter to use the "HTTPS Protocol and Cipher Configuration" setting for the local server.
-
The "Intermediate" and "Modern" option allow the adapter to differ from the server configuration, by loading the respective configuration instead.
-
-
Private Network Access—This option controls how the adapter responds to the Private-Network-Access header, if present. The default behavior is to allow private network access from any origin. Customers may disable this option, or set a specific URL to suit their needs.
Both HTTPS with built-in keys and HTTPS with below keys cause the eQuality Connect server to run using HTTPS, so all URLs must use https:// to access the connect server when you select either of these options.
Keystore Filename
If you selected HTTPS with below keys as the Security Setting, enter the Keystore Filename in this field.
Keystore Password
If you selected HTTPS with below keys as the Security Setting, enter the password for the above keystore in this field.
Keystore Format
If you selected HTTPS with below keys as the Security Setting, select either JKS or PKCS as the keystore format. JKS is the default.
-
-
Under Advanced Settings, use the Key and Value fields to enter any proprietary pairs that are in use in your system.
-
Click Save. The adapter appears in the left-hand pane.
You may also need to configure attributes—see Configure adapter custom attributes for instructions.