--- id: 04-salesforce-lambdas-manual-setup title: Setting Up The Salesforce Lambdas Manually --- import useBaseUrl from "@docusaurus/useBaseUrl"; Below are manual setup instructions for the Salesforce Lambdas. ### Prerequisite Configuration and Data Collection In order to successfully deploy and utilize the functions in the Amazon Connect Salesforce Lambda package, you will need to validate and configure some items in your Salesforce Org and gather some information from your Amazon Connect instance. - Check your Salesforce API version - Create a new Connected App - Create a new API user - Gather Amazon Connect information As you are preparing to deploy the package, it is a good idea to open a text editor and note information as you configure the environment. We will point out the items you will need to provide. ### Check your Salesforce API Version 1. Log in into your Salesforce org and go to **Setup** 2. In the **Quick Find** field, type **apex**, then select **Apex Classes** from the results 3. Select New 4. Select the Version Settings tab 5. Note the Salesforce.com API version in your notepad. The pattern of this value is ```vXX.X```. #### Create a New Connected App To leverage the full potential of the integration, Salesforce data needs to be accessed from AWS environment. The package comes with a set of pre-built AWS Lambda functions to lookup, update and create Salesforce objects within Amazon Connect Contact Flows. These Lambda function access Salesforce using the Salesforce REST API. To get access to the environment, a Connected App must be configured with OAuth settings enabled. 1. Log in into your Salesforce org and go to **Setup** 2. In the **Quick Find** field, type **app manager**, then select **App Manager** from the results 3. In the upper right corner, select **New Connected App** 4. On the New Connected App form, enter a name for the Connected App, such as **Amazon Connect Integration** and press tab. This will populate the API Name automatically. Then provide a contact email address 5. Select the checkbox to **Enable OAuth Settings** 6. Set the **Callback URL** to your domain url. Find the domain at _Setup_ -> _My Domain_. 7. In the Selected OAuth Scopes section, select the following and add them to the Selected OAuth Scopes: 8. Access the identity URL service (id, profile, email, address, phone) 9. Manage user data via APIs (api) 10. Select the checkbox for Require Secret for Web Server Flow, and the checkbox for Require Secret For Refresh Token Flow 11. The **API (Enable OAuth Settings)** section should now look like this 12. Select **Save** at the bottom of the screen. 13. Select **Continue** on the New Connected App page 14. You should now be at the new app's page 15. Copy the value for **Consumer Key** to your notepad 16. Select **Click to reveal** next to Consumer Secret and copy the value to your notepad 17. At the top of the detail page, select **Manage** 18. On the Connected App Detail page, select the **Edit Policies** button 19. Set Permitted Users to **Admin approved users are pre-authorized** and choose OK on the pop-up dialog 20. Set IP Relaxation to **Relax IP restrictions** 21. The OAuth Policies section should now look like the following 22. Select **Save** ### Create a new API user The Lambda functions authenticate with Salesforce via user credentials. It is a common practice to create an API user account for this purpose. 1. Log in into your Salesforce org and go to **Setup** 2. In the **Quick Find** field, type **profiles**, then select **Profiles** from the results 3. Select New Profile 4. Provide a Profile Name, such as **API_ONLY** 5. From the **Existing Profile** dropdown, select **System Administrator** **NOTE:** You\'re advised to use a full Salesforce License for the user to be able to set the below permissions and have full access to avoid any other errors. 6. Select **Save** to create the new profile 7. Once the new profile page opens, scroll down to and select the **System Permissions** section 8. When the next page opens, select **edit** 9. Make sure the **Lightning Experience User** option is unselected 10. Select **Save**, and confirm the changes 11. Go back to the Profile Overview, scroll down, and select **Password Policies** 12. Select **Edit**. 13. Set **User passwords expire in** to **Never expires** NOTE: Failure to this may lead to production outages. 14. Select **Save**. 15. In the **Quick Find** field, type **connect**, then select **Manage Connected Apps** from the results 16. Select the app you have created earlier, **Amazon Connect Integration** 17. In the profiles section, select **Manage Profiles** 18. Select the new **API_Only** profile that you just created 19. Select **Save** at the bottom of the page 20. In the **Quick Find** field, type **users** then select **Users** from the results 21. Select New User 22. Set the required fields as: a. Last Name: apiuser b. Alias: apiuser c. Email: provide a valid email address d. Username: apiuser@.com e. Nickname: apiuser 23. On the right-hand side, set **User License** to **Salesforce** 24. Set Profile to API_ONLY 25. Choose **Save** 26. In **Quick Find**, search for "Permission Sets". Select the **AC_Administrator** permission set. 27. Select **Manage Assignments**. Add the apiuser you just created to the permission set. 28. A confirmation email with an **activation link** will be sent to the email address provided. Choose the link to activate your user and set their password 29. Fill out the form to set a password for the API user 30. Select **Change Password**. The API user will log into the Salesforce Classic view 31. Access the API user's personal settings by selecting the username in the top right corner, then choose **My Settings** 32. In the **Quick Find** field, type **security** then select **Reset My Security Token** from the results 33. Select **Reset Security Token**. Your security token will be emailed to you 34. Copy the security token from the email to your notepad #### Allowing the API user to authenticate using password The api user created above authenticates using username-password flow in Salesforce. This flow needs to be unblocked and to do that, go to _Setup_ and in the Quick Find box, search for __OAuth and OpenID Connect Settings__. After that, make sure that the toggles for __Allow OAuth Username-Password Flows__ and __Allow OAuth User-Agent Flows__ are turned ON, as shown in below image. ### Gather Amazon Connect information The last thing to do before you can install the Amazon Connect Salesforce Lambda Package is gather some details about your Amazon Connect instance. These will be used during the package installation. 1. In a new browser tab, login to the [**AWS console**](https://console.aws.amazon.com/) 2. Navigate to the [Amazon Connect Console](https://console.aws.amazon.com/connect/home) 3. Select your Instance Alias 4. On the Overview page for your instance, copy the string following instance/ in the Instance ARN and paste it to your notepad. This is your Instance ID. 5. In the left nav, select **Data storage** 6. On the **Data storage** page, copy the S3 bucket names for your Call recordings and Exported Reports. The bucket name is everything preceding the first / in the XX will be stored here sections 7. In the left nav, select **Data streaming** 8. Note the name of the Kinesis stream configured in the Contact Trace Records section, then select **Create a new Kinesis Stream**. This will take you to the list of Kinesis streams configured in this region. 9. Select the **Kinesis stream name** that matches what was configured in the previous step 10. On the stream detail page, copy the entire value for Stream ARN #### Store Salesforce Credentials in AWS Secrets Manager To ensure that your Salesforce credentials are secure, the Lambdas require that the credentials are stored in AWS Secrets Manager. AWS Secrets Manager is a highly secure service that helps you store and retrieve secrets. 1. In a new browser tab, login to the AWS console 2. Make sure you are in the same region as your Amazon Connect instance. You can set the region by expanding the region selector in the upper right and choosing the region 3. Navigate to the [Secrets Manager console](https://console.aws.amazon.com/secretsmanager/home) 4. Select **Secrets** 5. Select **Store a new secret** 6. Select **Other types of secrets** 7. Make sure **Secret key/value** is selected 8. Enter key value pairs that match the following: a. **Key:** Password, **Value:** the password for the API user that you configured in the previous section b. **Key:** ConsumerKey, **Value:** the Consumer Key for the Connected App you created in the previous section c. **Key:** ConsumerSecret, **Value:** the Consumer Secret for the Connected App you created in the previous section d. **Key:** AccessToken, **Value:** this is the access token for the API user that you configured in the previous section 9. For the encryption key, click **Add new key** 10. Select **Create Key** 11. Make sure key type is set to **symmetric** 12. Give your key an **alias**, like *SalesforceCredentialsSecretsManagerKey* 13. Click Next 14. Select administrators you want to have access permission to change the key policy. Make sure you are being as restrictive as possible 15. Click Next 16. Select the users and roles you want to have access to the Salesforce credentials in Secrets Manager. Make sure you are being as restrictive as possible 17. Click Next 18. Click Finish 19. Click on the managed key that you just created (which is *SalesforceCredentialsSecretsManagerKey* in this case). 20. Note down the ARN. This is SalesforceCredentialsKMSKeyARN that will be used later when installing the Amazon Connect Salesforce Lambda package. 21. Navigate back to the Secrets Manager setup tab 22. Select the key you just created 23. Click Next 24. Give your secret a name, like *SalesforceCredentials* 25. Click Next 26. Make sure **automatic rotation** is disabled. 27. Click Next 28. Click Store 29. Select the secret you just created, and copy the Secret ARN 30. You should now have all of the information you need to install the package ### Install the Amazon Connect Salesforce Lambda package 1. In a new browser tab, login to the [AWS console](https://console.aws.amazon.com/) 2. Make sure you are in the same region as your Amazon Connect instance 3. Once you have selected the region, navigate to the [Amazon Connect Console](https://console.aws.amazon.com/connect/home) 4. Verify that the Amazon Connect instance that you wish to configure is listed 5. Once you have verified your Amazon Connect instance, Open the [Serverless Application Repository Console](https://console.aws.amazon.com/serverlessrepo/home) 6. In the left navigation, select **Available Applications** 7. In the search area, make sure that **Public applications** is selected, check the box for **Show apps that create custom IAM roles or resource policies**, and enter **Salesforce** in the search field, this will automatically filter the available packages 8. Select AmazonConnectSalesForceLambda 9. When the Application loads, scroll down to the **Application settings** section 10. Fill in the parameters using the data you gathered in your notepad in the previous section using the following notes: 1. **Application name:** You can accept the default here or change it as desired 2. **AmazonConnectInstanceId:** You Amazon Connect Instance Id. Only required if you enable real time reporting 3. **CTRKinesisARN:** This is the ARN for the Kinesis stream that was configured for Contact Trace Record streaming in Amazon Connect. This is the complete ARN. Amazon Kinesis Firehose is not supported. 4. **ConnectReportingS3BucketName:** This is the name of the S3 bucket used to store exported reports for your Amazon Connect instance. This is ONLY the bucket name, no sub-folders or suffixes 5. **HistoricalReportingImportEnabled:** true \| false - if set to true, the package will include a feature to import Amazon Connect Queue and Agent Historical Metrics into your Salesforce Org. This feature requires you to provide **ConnectReportingS3BucketName** 6. **LambdaLoggingLevel:** DEBUG \| INFO \| WARNING \| ERROR \| CRITICAL - Logging level for Lambda functions 7. **PrivateVpcEnabled:** Set to true if functions should be deployed to a private VPC. Set VpcSecurityGroupList and VpcSubnetList if this is set to true. 8. **RealtimeReportingImportEnabled:** true \| false - if set to true, the package will include a feature to publish Amazon Connect Queue Metrics into your Salesforce Org. This feature requires you to provide **AmazonConnectInstanceId** 9. **SalesforceAdapterNamespace:** This is the namespace for CTI Adapter managed package. The default value is **amazonconnect**. If a non-managed package is used, leave this field blank. 10. **SalesforceCredentialsKMSKeyARN:** This is the ARN for KMS customer managed key that you created in the previous section. 11. **SalesforceCredentialsSecretsManagerARN:** This is the ARN for the Secrets Manager Secret that you created in the previous section. 12. **SalesforceHost:** The full domain for your salesforce org. For example `https://mydevorg-dev-ed.my.salesforce.com`. Please make sure that the host starts with `https`, and that the url ends with `.my.salesforce.com`. This url can be found in `Setup` -> `My Domain`. 13. **SalesforceProduction:** true \| false - True for Production Environment, False for Sandbox 14. **SalesforceUsername:** The username for the API user that you configured in the previous section. Salesforce usernames are in the form of an email address. 15. **SalesforceVersion:** This is the Salesforce.com API version that you noted in the previous section. The pattern of this value is ```vXX.X```. 16. **TranscribeOutputS3BucketName:** This is the S3 bucket where Amazon Transcribe stores the output. Typically, this is the same bucket that call recordings are stored in, so you can use the same value as found in **ConnectRecordingS3BucketName**. Not required if PostcallRecordingImportEnabled, PostcallTranscribeEnabled, ContactLensImportEnabled set to false. 17. **VpcSecurityGroupList:** The list of SecurityGroupIds for Virtual Private Cloud (VPC). Not required if PrivateVpcEnabled is set to false. 18. **VpcSubnetList:** The list of Subnets for the Virtual Private Cloud (VPC). Not required if PrivateVpcEnabled is set to false. 19. **AmazonConnectQueueMaxRecords:** Enter record set size for list queue query. Max is 100. 20. **AmazonConnectQueueMetricsMaxRecords:** Enter record set size for queue metrics query. Max is 100. 21. **CTREventSourceMappingMaximumRetryAttempts:** Maximum retry attempts on failure for lambdas triggered by Kinesis Events. 22. **ConnectRecordingS3BucketName:** This is the name of the S3 bucket used to store recordings for your Amazon Connect instance. This is ONLY the bucket name, no sub-folders or suffixes 23. **ContactLensImportEnabled:** true \| false - Set to false if importing Contact Lens into Salesforce should not be enabled. 24. **PostcallCTRImportEnabled:** true \| false - Set to false if importing CTRs into Salesforce should not be enabled on the package level. This setting can be disabled on a call-by-call basis. 25. **PostcallRecordingImportEnabled:** true \| false - Set to false if importing call recordings into Salesforce should not be enabled on the package level. This setting can be disabled on a call-by-call basis. 26. **PostcallTranscribeEnabled:** true \| false - Set to false if post-call transcription should not be enabled on the package level. This setting can be disabled on a call-by-call basis. 27. **TranscriptionJobCheckWaitTime:** Time between transcription job checks 11. Once you have completed the form, select **Deploy** 12. Deployment will take some time, with status updates being provided by the UI. Once it has completely deployed, you will receive a notification on the screen ### Test the Core Functionality The package provides a core Lambda function (sfInvokeAPI) that supports multiple operations, like lookup, create and update. For the initial validation, sample events are provided within the function. Validating this function provides a good check that the installation and configuration is correct. Validating the lambda functions requires the use of test events to simulate data coming into the function as it would in a typical deployment. Each function has a set of test event samples included to make validation easier. #### Validate the core functionality 1. In a new browser tab, login to the [**AWS console**](https://console.aws.amazon.com/) 2. Open the [AWS Lambda Console](https://console.aws.amazon.com/lambda/home) 3. In the Filter field, enter sfInvokeAPI and press enter, this will filter your list out to the core function that we just installed 4. Select the **function name.** First, we will validate a phone number lookup. 5. In the Environment pane, double-click the event-phoneLookup.json file 6. The test even JSON will open in the Lambda editor 7. Modify the value for sf_phone to match the phone number of the test contact you created when you setup the CTI adapter or for any valid contact in your Salesforce org\ NOTE: The phone number must be in [E.164 format](https://docs.aws.amazon.com/connect/latest/adminguide/amazon-connect-contact-control-panel.html#international-calls-ccp) 8. Select the entire JSON event and copy it, then close the **event-phoneLookup.json** tab. 9. In the top-right corner, select drop-down arrow next to **Test** and choose **Configure test events** 10. Select the radio button for **Create new test event** and provide an event name, for example: **phoneLookup** 11. Select the existing event JSON and **delete** it. Paste the modified JSON payload you copied from the **event-phoneLookup.json** file 12. Select **Create** to save your test event 13. By default, your new test event should be selected in the drop-down list to the left of the Test button. 14. Select **Test** 15. If successful, the result will contain fields defined in "sf_fields" parameter in the invocation event 16. Copy the value for the **Id** key in the response. Next, we are going to use that Id to create a Case in Salesforce. 17. In the Environment pane, double-click the **event-create.json** file. Replace the existing ContactId value with the ID value you copied previously. 18. Select the entire JSON event and copy it, then close the **event-create.json** tab. 19. In the top-right corner, select drop-down arrow next to **Test** and choose **Configure test events** 20. Select the radio button for **Create new test event** and provide an event name, for example: **createCase** 21. Select the existing event JSON and **delete** it. Paste the modified JSON payload you copied from the **event-create.json** file 22. Select **Create** to save your test event 23. By default, your new test event should be selected in the drop-down list to the left of the Test button. 24. Select **Test** 25. If successful, the result will contain the Case Id 26. Copy the value for the **Id** key in the response. 27. When we created the case, the **Status was set to New** and the **Priority to Low**. We are going to use the update operation to close the case. 28. In the Environment pane, double-click the **event-update.json** file and replace the existing Case Id in "sf_id" parameter with the new one you copied from the last test result 29. Select the **entire JSON event** and copy it, then close the **event-update.json** tab. 30. In the top-right corner, select drop-down arrow next to **Test** and choose **Configure test events 31. Select the radio button for **Create new test event** and provide an event name, for example: **updateCase** 32. Select the existing event JSON and **delete** it. Paste the modified JSON payload you copied from the **event-update.json** file 33. Select **Create** to save your test event 34. By default, your new test event should be selected in the drop-down list to the left of the Test button. 35. Select **Test** 36. If successful, the result will be the **HTTP 204** No Content success status response code 37. Log in into your Salesforce org and go to the **Service Console** 38. In the search box, change the object type to Cases and type Amazon Connect Case, then press enter 39. You should find 1 case opened by the API user, and the status should be closed 40. You have completed core function validation ### Allow Amazon Connect to Access the sfInvokeAPI Lambda Function Once you have validated function, you can use the Amazon Connect console to add the sfInvokeAPI Lambda function to your Amazon Connect instance. This automatically adds resource permissions that allow Amazon Connect to invoke the function. #### Add the Lambda function to your Amazon Connect instance 1. In a new browser tab, login to the [**AWS console**](https://console.aws.amazon.com/) 2. Navigate to the [Amazon Connect Console](https://console.aws.amazon.com/connect/home) 3. Select your **Instance Alias** 4. In the navigation pane, choose **Contact flows**. 5. For **AWS Lambda**, select the function that includes sfInvokeAPI in the name 6. Choose **Add Lambda Function**. Confirm that the ARN of the function is added under **Lambda Functions**. 7. The AWS Lambda function has been added to your Amazon Connect instance.