This documentation supports the 19.08 version of Remedy Single Sign-On.

To view an earlier version, select the version from the Product version menu.

Integrating Remedy SSO with TrueSight Orchestration

To integrate TrueSight Orchestration (formerly BMC Atrium Orchestrator [BAO]) with Remedy Single Sign-On (Remedy SSO), you can use one of the following options: 

Embedded Remedy SSO

In this option, Remedy SSO is installed with the TrueSight Orchestration upgrade when you install the TrueSight Orchestration repository, CDP, and HA-CDP and you do not need to install Remedy SSO separately.

If you install the embedded Remedy SSO during the TrueSight Orchestration Platform installation, a realm named BAOLocal is automatically created during the installation of the repository, CDP, and HA-CDP if it is installed.

External Remedy SSO

In this option, you need to install a supported version of Remedy SSO on a separate server before installing TrueSight Orchestration components.

Install an external Remedy SSO only if you are not installing the embedded Remedy SSO with the TrueSight Orchestration installation. Install Remedy SSO before you install TrueSight Orchestration components. 

To install Remedy SSO, use the instructions   Installing BMC Remedy SSO . During the external Remedy SSO installation, the system prompts you for a database type. To use Remedy SSO with TrueSight Orchestration, choose embedded database or Oracle database.

After installing Remedy SSO, perform the following steps:

  1. Create a realm. For information on creating a realm, see To create a realm for Local user authentication.
  2. Create a user called aoadmin. For information on creating a user, see Configuring Local authentication.
  3. Create a role called AoAdmin. For information on creating a role, see Configuring Local authentication.
  4. Assign the aoadmin user to the AoAdmin role. For information on assigning a role to a user, see Configuring Local authentication.

To create a realm for Local user authentication

  1. In the Authentication Type field, click Local.
  2. (Optional) Click Enable Chaining Mode and perform the following steps to enable authentication chaining. For information about the authentications that you can chain with LDAP, see Authentication fallback.
    1. Click Add Authentication.
    2. Select the required authentication type and enter the authentication details.
    3. Repeat steps a and b to add more authentications for the realm.
  3. Click Add.

Was this page helpful? Yes No Submitting... Thank you

Comments