This documentation supports the 22.1 version of BMC Helix Single Sign-On, which is available only to BMC Helix customers (SaaS). 

To view an earlier version, select the version from the Product version menu.

Configuring advanced functions for SAML authentication

Depending on the configuration of your identity provider (IdP), you might need to configure advanced functions for SAML authentication on the BMC Helix Single Sign-On server. 

Before you begin

Create a service provider signing certificate if you plan to use any of the additional functions for SAML authentication described in this topic. For information about how to do this, see Creating and updating the SP signing certificate for SAML authentication.

To sign SAML metadata for IdP

When you import SAML metadata to the IdP, you can sign it up on the BMC Helix SSO server. This ensures additional security between the IdP and the service provider (SP).

  1. On the Realm > Authentication tab, ensure that the Sign Request check box is selected. 
  2. On the General > Advanced tab, specify the Signing Key Alias field.
  3. Click Save.

To sign SAML authentication requests

If you have configured BMC Helix SSO to sign SAML metadata for IdP, you can additionally configure BMC Helix SSO to sign the SAML authentication requests between BMC Helix SSO and the IdP.  

  1. On the General > Advanced tab, complete the Keystore File and Keystore Password fields.
  2. Click Save.

To decrypt the encrypted assertions in SAML responses 

If encryption is enabled on the identity provider side, you must configure BMC Helix SSO  server to decrypt the encrypted assertions in SAML responses. To encrypt SAML assertions, the identity provider uses one of the following methods: AES-128, AES-192, and AES-256. 

If the identity provider uses AES-192 or AES-256 encryption method, you must enable Java on the BMC Helix SSO server to decrypt the SAML assertions.

  1. In BMC Helix SSO Admin Console, navigate to General > Advanced > SAML Service Provider
  2. Enter the Encryption Key Alias parameter. 
  3. Click Save.

Where to go from here

Importing configuration from an identity provider and configuring SAML

Was this page helpful? Yes No Submitting... Thank you