Review & Audit Integration

Integration guide

This page sets out how to integrate the Case Review Portal with single sign-on.

Setup

Fourthline's Case Review Portal access leverages single-sign-on which can be integrated with Identity Provider that supports SAML 2.0 and multi-value SAML attributes.

Fourthline supports the following Identity Providers:

  • ADFS
  • Azure Entra ID
  • Google
  • Okta
  • OneLogin

Recommended browser

We recommend using the latest version of Chrome as your browser for the Case Review Portal, which we use for all testing.

Overview

  1. Provide Fourthline with the following information:
ConfigurationDescription
Use caseCase Processing
  • Escalations
  • Time-tracking
  • Case auto-assign
  • Case Guidance
Case Auditing
  • View only
  • Compliance review
  • Case Guidance
IdPSpecify which SAML 2.0 identity provider (IdP) you are using.
IP addressesProvide the IP addresses that need to access the portal for both the sandbox and production environments.
  1. Setup the IP address routing correctly for the two received URLs
  2. Setup the app integration with the received SAML information from Fourthline in your IdP's configuration section. Follow your IdP's instructions to configure single sign-on.
  3. Configure the app roles within your IdP, required for correctly granting permissions towards your users. The required roles will be shared by Fourthline.
  4. Configure correctly the SAML Attribute mapping within your IdP.
  5. Share the generated SAML statement towards Fourthline.
  6. After Fourthline finalized the configuration the integration can be tested.

App roles

The following app roles can be configured to manage your user's permissions. The role permissions are managed in your organization's IdP. These roles are required and must be sent from your IdP to gain the right permissions within the Case Review Portal.

Different roles are required depending on your use case: Case Processing only, Case Auditing only, or both:

Global roles

RolePermissionsPortal page
AccessCan access the portal.

Required for all users
UserManagementCan assign agents to process cases for specific business partners.
This role is only needed if you need to access multiple partner accounts through your Case Review Portal.
Users

Case Processing

RolePermissionsPortal page
CaseProcessorCan process cases.Processing
ReviewerCan perform four-eyes reviews and edit other agents' incomplete cases.
Configure your own rules for when four-eyes review is required.
Processing
SupervisorCan view and edit completed cases processed by other agents, unassign cases from agents, and view backlog metrics.Processing
DailyWatchlistAutomationCan view and process AML Screening and Monitoring cases.Processing

Case Auditing

RolePermissionsPortal page
CaseAuditorCan view completed cases.Auditing
QaAuditorCan create case samples and confirm compliance reviews.Auditing
AfcReporterCan create and download fraud and AML hit data.Reports

Required SAML Attribute mapping

You must configure the following required claims:

SAML Attribute NameMaps toAdditional Explanation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUser's email addressThis claim is also referred to as Name ID or User Principal Name. It is used as the unique identifier to match the user identity principle from the federated IdP to the shadow account in our system.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressUser's email address
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennameUser's first name
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameUser's last name
http://schemas.microsoft.com/ws/2008/06/identity/claims/roleUser's granted rolesThis field must be returning the roles as a multi-valued attribute. See the SAML response below.
Important
The role names specified in the AttributeValue elements must exactly match those listed under Role permissions.

Example SAML response

The following is an example of a SAML response from your IdP:

<samlp:Response>
  <Assertion>
    <AttributeStatement>
      <Attribute
        Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name">
        <AttributeValue>[email protected]</AttributeValue>
      </Attribute>
      <Attribute
        Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress">
        <AttributeValue>[email protected]</AttributeValue>
      </Attribute>
      <Attribute
        Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname">
        <AttributeValue>John</AttributeValue>
      </Attribute>
      <Attribute
        Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname">
        <AttributeValue>Smith</AttributeValue>
      </Attribute>
      <Attribute
        Name="http://schemas.microsoft.com/ws/2008/06/identity/claims/role">
        <AttributeValue>User</AttributeValue>
        <AttributeValue>Reviewer</AttributeValue>
      </Attribute>
    </AttributeStatement>
  <Assertion>
</samlp:Response>

Troubleshooting

I see a "Sorry, you have been blocked" page when trying to access the portal
The IP address connected to your request to the portal has not been whitelisted by Fourthline. Reason could be your requests are not routed correctly through your VPN with the allowed IP address(es) to access the portal.

I am able to reach the portal, and click on Login button, but I am getting an error after signing in
The received SAML statement likely doesn't have the correct attributes and/or required user roles in it. Confirm that the correct SAML Attribute mappings have been setup and make sure that the user that signs in have the required app roles configured.

Top of page