This tutorial shows how to make an existing Spark bot more secure.
If you are building your first bot, it is recommended you start with this tutorial.
Then come back here once it’s up and running!
If someone outside of your organization never interacted with your bot, they can’t just run a simple search to find it. However, if they know or guess the ‘email’ address of your bot, they will be able to add it to a space (formerly called room) and send it messages. The more bots that are out there, the higher the possibility of that happening! To prevent unwanted attention, there are three main ways to control access to your bot:
1. You can setup a space (formerly called room) filter when you create a webhook, which points to your bot application’s server. If someone adds your bot to a Cisco Spark space, and the space does not fit the filter rule for any of the bot’s webhooks, the bot application server will not receive any messages from Spark. For large enterprise bots that need access to many different spaces, that might not work out. That’s okay— you can setup one webhook for your bot, with no filter, to receive all messages from any space to which it belongs, and use the following two methods to secure the bot.
2. Filter at the bot’s code level - JSON Payloads are sent from Cisco Spark via HTTP POST to your webserver, which is defined in your webhook (see Handling Requests from Cisco Spark). When the JSON payload comes in, you can begin your server’s code by checking the incoming message’s data[“personId”] or data[“personEmail”], compare it to a predefined list in your code or database, and handle accordingly. You can also make a request to Spark with data[“personId”] to check other details, like the organization, to only allow people of a specific org.
Note: the OrgId that comes in with the webhook JSON Payload is the OrgId of the person that created the webhook.
3. Last, but not least, we have the webhook secret. This should be used to prevent your bot from processing any POST request that does not come from your specific webhook. This will block any of your other Spark webhooks, or Spark webhooks setup by other users trying to send to your bot’s webserver location.
Here is a brief tutorial on using a webhook secret in Python.
Everything together, here is a code snippet of all of these features combined:
print"orgId does not match or person not in list of authorized users"
print"Secret does not match!"
You can get the full, working example on Github. You’ll just need to replace your desired orgId, bot name, and token values in the variables at the bottom of the file. Let us know if you have any questions!
Hello there. I'm wondering if there is a way to test the CCX REST API ecosystem locally without having an actual CCX installed. In particular, I just need a sandbox to use a local client to play with these endpoints: https://developer.cisco.com/...
Hello,We develop a Chrome extension to add Cisco Telephony features to a web-based application.For that we use the Cisco Jabber SDK Web (with the installation of the Cisco web communicator Chrome extensions and the SDK Browser add-on for MAC)We are many u...
Hello, We develop a Chrome extension to add Cisco Telephony features to a web-based application.For that we use the Cisco Jabber SDK Web (with the installation of the Cisco web communicator Chrome extensions and the SDK Browser Add-on)We are many use...
I wonder if there is a report or a real time tool / API to get a report to Check Skill Mapping for all Agents in Cisco Unified Contact Center Express I understand , using the below mentioned SQL query in the CLI prompt , we can get the desired o...