To export the SSL certificate of the Tomcat on which BMC Helix SSO is deployed, perform the following steps: Open BMC Helix SSO URL, and click the padlock symbol in the address line of the browser. In the Certificate window, click the Details tab. Click Copy to File. In the Certificate Export Wizard, click Next. Select "DER encoded binary X.509 (.CER)", and click Next. Provide a name for the file and include the path in the file name. Important The Common Name (CN) attribute of this certificate must be the same as the FQDN of BMC Helix SSO server. To import certificates to the AD FS server, perform the following steps: BMC Helix SSO is the relying party which depends on the IdP to check the claims of the user. In this case, AD FS is the IdP. On the Trust Relationships tab, select Relying Party Trusts and right-click it. Select Import data about the relying party published online or on a local network radio button. Important If AD FS and BMC Helix SSO servers cannot connect via SSL because of some specific network settings, you might see a warning. This error message might be normal and you can ignore it. In this case, you can import the service provider metadata XML to the AD FS in the offline mode. If you are unable to proceed with the configuration, the certificates were not exchanged correctly. Contact the BMC Helix SSO administrator for more information. In the Federation metadata address field, enter the link copied from the BMC Helix SSO Admin Console (click View Metadata and copy the URL). In the Display Name field, type any value, for example rsso-sp, and then click Next. After you close the Add Relying Party Trust Wizard window, rsso-sp appears in the Relying Party Trusts list. Enter the Send Claims Using UPN claim-rule name. Use the following script: To support SAML groups retrieving, add one more claim rule to the Relying Party Trust. Use the following script: Important Restart the BMC Helix SSO server.Before you begin
Task 1: To import service provider certificates to the AD FS identity provider
The Certificates snap-in dialog box is displayed.Task 2: To configure a relying party trust
Task 3: To configure the claim rules for the relying party
c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn"]
=> issue(
Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
Issuer = c.Issuer,
OriginalIssuer = c.OriginalIssuer,
Value = c.Value,
ValueType = c.ValueType,
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] =
"urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier"] =
"<idp-entity-id>",
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier"] =
"<sp-entity-id>/<realm-id>"
);
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(
store = "Active Directory",
types = ("http://schemas.microsoft.com/ws/2008/06/identity/claims/role"),
query = ";tokenGroups;{0}",
param = c.Value);
Task 4: To import AD FS certificates to BMC Helix SSO
Watch these videos to understand how to configure AD FS as a SAML IdP provider.
Important
The following videos show an older version of BMC Helix SSO. The previous product name was Remedy SSO. Although there might be minor changes in the user interface, the overall functionality remains the same
https://www.youtube.com/watch?v=HcW-u-V9yvo?rel=0
https://www.youtube.com/watch?v=FsIxJOeursU?rel=0