To enable the BMC Helix SSO authentication flow of an application in an iframe, you must configure the Allow-From Domains option on the BMC Helix SSO server:
Your application is launched in a nested iframe:
In this use case, your application is launched in an iframe from the grandparent application.
Important
This use case is not limited to launching application in iframes from a second-level hierarchy. The level of nested hierarchy is not restricted, and you can have a child application launched from a grandparent, grandgrandparent, etc.
If you have applications in nested iframes, then the following requirement must be met before you enable the BMC Helix SSO configuration:
The child application must pass the following parameter in the GET call to the sub-child application: allow-from-domain=http://parentApplicationDomainName:port,http://ApplicationDomainName:port
The port value is not mandatory. If the port is not stated, then the default port is applied. The default port for HTTP is 80, the default port for HTTPS—443.
The value of this parameter must be URL-encoded.
On BMC Helix SSO server, in the BMC Helix SSO Admin Console, configure the Allow-From Domains option for your authentication type.
Important
If you have authentication chains, then you must specify Allow-From Domain(s) for every authentication type in the chain.
If your application is nested in more than one iframe (see the grandparent-parent-child use case in the diagram), you must specify all domains in the Allow-From Domains field in the following order and format: <domain of the grandgrandparent>,<domain of the grandparent>, <domain of the parent>.
The possible values for Allow-From Domains settings are the following:
proto://hostname:port - Allowed for exact match host:port (proto is ignored, the actual one is taken from the original referrer).
proto://hostname - If the port is not stated, then the default port is applied. The default port for HTTP is 80, the default port for HTTPS—443.
Add Comment