FAQ
Last updated
Was this helpful?
Last updated
Was this helpful?
Please see
There are 2 distinct things:
the that the brand provides, for which we recommend a lifetime of 1 minute (but it could equal the session duration desired by the brand) (by default, it is set at 1 minute).
and the lifetime of the iAdvize session, which specifies when the engagement/conversation session must re-verify the visitor's identity, and this one is based on the brand's use case: A bank would prefer a short delay (for example 7 minutes). For an electricity supplier, 20-30 minutes seems acceptable (by default, it is set at 60 minute).
Read this to see examples of what is seen on the agent side and on the visitor side.
The activate function needs to be called every time that the iAdvize tag is loaded. It means that you will need to call the activate function on every page change, once per page.
Visitor id might change during the conversation if the visitor logs in and logs out.
Test your JWE with this GraphQL API call:
Otherwise, with this implementation:
You should see this in the console:
Error type
Why it happens
What to do about it
A valid authentication option must be provided,
The brand makes a mistake on authenticaton.option
Give valid arguments: authenticationOption : { type: 'SECURED_AUTHENTICATION', token: visitor_token }
An activation is already ongoing
The brand calls activate several times in a row before resolving the first one
Wait for call to finish (you can await iAdvize.activate)
Can't activate twice, please logout first
The brand calls activate several times in a row after the first has been successfully resolved
Logout before login if already authenticated
Failed to fetch authentication with a server error
Something went wrong on the server side
In this case, there could be different errors: wrong keys, no flag set, wrong token, etc. (this is on the iAdvize side so the client can create a ticket)
Failed to authenticate visitor from credentials : the website is not correctly setup (null)
Ensure you set all the required claims with the right prefixes
Ensure the JWT is signed with the right algorithm
Ensure the JWE is encrypted with the right algorithm
Ensure you use the right private key and the right iAdvize public key. Ensure iAdvize setup your public key in your settings.
userId defined in the JWE should remain static and constant. Visitor id (used when the visitor isn't authenticated) is different and is an iAdvize internal data. All the cases of authentication during a conversation, that could impact the visitor id (but not the userId) are described .
Be sure, when you are in an authenticated space of your website where the visitor authentication is enabled, to remove the usage of the `extId` system: