In BMC Helix SSO, a realm associates application domains of the integrated BMC Helix SSO applications with an identity provider, and a realm also defines an authentication method to be used to protect integrated applications. End users accessing applications integrated with BMC Helix SSO are authenticated based on domains they can access.
The following diagram shows the role of realms in an authentication flow:
Realm identification is based on the application URL used for accessing an end user application.
For example, an end user uses the application.domain.com URL to access an application. To authenticate the user, BMC Helix SSO needs to identify the realm by checking the following mappings in all realms available on the BMC Helix SSO server:
When a realm with a matching application domain is found, this realm is used for authentication.
If you have several realms with the same matching application domain parts, realm selection becomes unpredictable. To avoid authentication errors, application domain mapping must be unique across all realms on the BMC Helix SSO.
Suppose an organization has the following applications:
You can create helpdesk and itsm realms and map the application domains and authentication methods to these realms described in the following table:
Application | Accessed by | Realm | Application domain | Authentication method | Description |
---|---|---|---|---|---|
http://helpdesk.yourcompany.com/ | All users | helpdesk | helpdesk.yourcompany | SAML 2.0 | The helpdesk realm contains one helpdesk.yourcompany application domain, and it is authenticated by the SAML 2.0 authentication method. |
http://itsm.yourcompany.com/ | IT team | itsm | itsm.yourcompany | Kerberos | The itsm realm has two application domains: itsm.yourcompany and dwp.yourcompany. Both application domains are authenticated by the Kerberos authentication method. |
http://dwp.yourcompany.com/ | IT team | itsm | dwp.yourcompany | Kerberos |
When an end user accesses the Helpdesk application belonging to the helpdesk.yourcompany.com application domain (Domain 1 in the diagram), the end user gets authenticated through BMC Helix SSO, via helpdesk realm (see Realm 1 in the diagram) which is configured for SAML authentication method (Authentication 1 in the diagram), and allows authentication via helpdesk.yourcompany.com (Domain 1 in the diagram).
This end user can access the ITSM application belonging to the itsm.yourcompany.com application domain (Domain 2 in the diagram). The end user gets authenticated through BMC Helix SSO, via itsm realm (see Realm 2 in the diagram) which is configured for Kerberos authentication method (Authentication 2 in the diagram), and allows authentication via itsm.yourcompany.com (Domain 2 in the diagram).