When a contact center user opens a console-app page with Omni-Channel present, Salesforce initiates the user's SSO authentication to Amazon Connect in the background.
If the background SSO authentication fails, the user would continue to see a grayed-out Dial-Pad in Omni-Channel widget despite being on an Available/Busy status.
This SSO authentication process can be tested manually with visual progress to identify & resolve any configuration-level issue for such a user in order to allow them a successful authentication to Amazon Connect.
Pre-requisites :-
Steps to follow for the affected User :-
Open the 'Telephony Provider Settings' link shared by your admin in a new browser tab & observe the screen for any error page as mentioned below :-
Cause : This could happen due to the user lacking access to the Contact Center's SSO Connected App with either of the following :
User’s Salesforce Profile is not added to the SSO Connected App's 'Manage' page
No permission set (like 'Salesforce Voice Permission Set') is assigned to the user that allows them access to the SSO Connected App
Resolution : Perform either of the following steps to resolve this problem :
Add the user’s Salesforce Profile to the SSO Connected App’s access on its ‘Manage’ page
Assign a permission set (like 'Salesforce Voice Permission Set') to the user that allows access to the SSO Connected App
Cause : This could happen due to deletion of the self-signed certificate that is selected in the Contact Center's SSO Connected App, leading to a bad reference while SAML XML is being generated by the connected app for the user. To validate this:
Resolution : Create / identify another self-signed certificate in [Setup --> Certificate and Key Management] & update it as the chosen certificate in 'Idp Certificate' field of your "{contact_center_internal_name} Connected App".
Cause : Certificate mismatch between Salesforce Connected App & AWS-side SAML metadata
Resolution :
Check if the certificate has expired
If YES, follow step #1 - #5 specified in the Help Article [Manage Contact Center Certificates]
If the certificate has not expired,
First ensure that both Salesforce Identity Provider & Contact Center's SSO Connected App are using the same self-signed certificate
Download SAML metadata XML from Salesforce Identity Provider page & replace SAML metadata in [AWS Management Console → IAM → Identity Provider → SalesforceServiceVoiceIdp → "Replace Metadata"]
Cause : SAML Metadata has a mismatch between Salesforce Connected App & AWS-side Identity Provider — “Issuer“ passed by Connected App does not match with ”Issuer” (EntityId XML attribute) present in AWS-side Identity Provider's SAML metadata
Resolution :
Cause : User is not added to the Contact Center (as per Amazon Connect configuration)
Resolution :
Ensure that user has the correct Contact Center Admin/Agent permission-set assigned and is successfully added to the Contact Center under “Contact Center Users” section
After all resolution steps are taken as per the error scenarios listed above, the user can open the 'Telephony Provider Settings' link again and it should take them to Amazon Connect Home Page similar to this :
Note: Ensure clicking on your Amazon Connect username on top-right corner to log-out of Amazon Connect and then perform the following steps before attempting to login again in Omni-Channel :-
Is your Omni-Channel dial-pad still grayed-out despite successful manual SSO Authentication test for your user?
Check the following Knowledge Article to validate if your contact center has a metadata-level problem restricting the loading of Amazon's CCP panel in the background:
Salesforce Voice: Amazon Connect CCP loading issue with "net::ERR_NAME_NOT_RESOLVED" error
005316458

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.