This documentation supports the 21.3 version of BMC Helix CMDB.

To view an earlier version, select the version from the Product version menu.

21.3 enhancements

Review the BMC Helix CMDB 21.3 enhancements for features that will benefit your organization and to understand changes that might impact your users.

Related topics

Known and corrected issues

Release notes and notices

Additional BMC Helix ITSM enhancements Open link


(Controlled availability customers only) Facilitate application access to users having different email domains 

Allow multiple users having different email domains and authentication mechanisms to access the same application URL by enabling BMC Helix Single Sign-On (SSO) based multiple service providers (MSP) in your environment. 

MSP incorporates a robust authentication mechanism, ensuring an exclusive and secure access to the application.

After configuring the authorization patterns, when you enable MSP for BMC Helix CMDB, the following  screen asking for user authorization is displayed:

Enter your user name to complete the authorization and then you are redirected to the following application login screen asking for your application login credentials for authentication:

For information about enabling BMC Helix Single Sign-On based MSP in BMC Helix CMDB, see  Facilitating application access to users having different email domains Open link .

CMDB Explorer enhancements

Easily edit and manage the CIs and relationships:

Quick Edit: Edit the name, descriptions, and impact directions for CIs and relationships within the CMDB Explorer view.

Collapse: If a large number of CIs are displayed, easily unclutter the view by using the Collapse Parents and Collapse Children options.

Show Relationship Details: View relationship details in CMDB Explorer and compare changes made in the sandbox dataset with the existing data in the production dataset.

For more information about Quick Edit, see Editing CIs and relationships in BMC Helix CMDB Explorer.

For more information about the Collapse function and to view relationship details, see Searching and viewing CIs and relationships in CMDB Explorer.

New attribute to store cloud resource IDs

The CloudId attribute is added under the BMC_BaseElement class in the Common Data Model. Easily store and locate the identification numbers for all the cloud resources from multiple cloud providers. The information for the CloudId attribute is populated by BMC Helix Discovery.

For more information, see Summary of changes to the Common Data Model.

View information in full-screen mode in the Class Manager UI

When you view the class information in Class Manager, the tables that display information about relationships can be resized or viewed in full-screen mode. For more information, see Class Manager interface to view CDM and extensions.

What else changed in this release

The following table lists the changes in the product behavior:

UpdateProduct behavior in versions earlier than 21.3Product behavior in version 21.3

(Available only for fresh installation)

Changing the dependency direction in DSM

When you relate a service CI to an IT infrastructure CI by using a Dynamic Service Modeling query, the direction of the BMC_Dependency relationship shows that the infrastructure CI is dependent on the service CI. To change the direction, you were required to create the relationship manually between the service CI and the infrastructure CI.

Before running the Dynamic Service Modeling query, use the DSM Relationship Direction option in Configurations > Core configurations > DSM to change the direction of dependency between a service CI and an infrastructure CI.

For more information, see Dynamic Service Modeling configuration settings.

Auditing relationshipsYou could not enable audit for a relationship class or view the history of changes made to a relationship.

You can enable audit for a relationship class and view the change history for relationships.

For more information, see Viewing the history of changes to a CI and relationships.

CMDB user permissions

CMDB user could access Search and CMDB Explorer, and edit non-asset CIs.

CMDB user needs at least Asset user or Asset admin permissions to access CMDB Portal.

Was this page helpful? Yes No Submitting... Thank you