This documentation supports the 9.1 version of Remedy Single Sign-On.

To view the latest version, select the version from the Product version menu.

Integrating Remedy SSO with BMC Atrium Orchestrator

To integrate BMC Atrium Orchestrator (BAO) Platform with Remedy Single Sign-On (Remedy SSO), you can use one of the following options: 

  • Embedded Remedy SSO: In this option, Remedy SSO is installed with the BAO upgrade when you install the BAO repository, CDP, and HA-CDP and you do not need to install Remedy SSO separately.
  • External Remedy SSO: In this option, you need to install a supported version of Remedy SSO on a separate server before installing BAO Platform components. See 7.9.00 enhancements for supported Remedy SSO information.

Note

Remedy SSO versions 9.1.01.001 and 9.1.02.01 only support BAO high availability with an embedded database. Stand-alone Remedy SSO versions 9.1.01.001 and 9.1.02.01 installations do not support HA with embedded DB.

Embedded Remedy SSO

If you install the embedded Remedy SSO during the BAO Platform installation, a realm named BAOLocal is automatically created during the installation of the repository, CDP, and HA-CDP if it is installed.

External Remedy SSO

Install an external Remedy SSO only if you are not installing the embedded Remedy SSO with the BAO Platform installation. Install Remedy SSO before you install BAO Platform components. 

To install Remedy SSO, use the instructions in   BMC Remedy Single Sign-On installing During the external Remedy SSO installation, the system prompts you for a database type. To use Remedy SSO with BAO Platform, choose embedded database or Oracle database.

After installing Remedy SSO, perform the following steps:

  1. Create a realm. For information on creating a realm, see Creating a realm for the Local user authentication.
  2. Create a user called aoadmin. For information on creating a user, see Configuring Local User Management authentication.
  3. Create a role called AoAdmin. For information on creating a role, see Configuring Local User Management authentication.
  4. Assign the aoadmin user to the AoAdmin role. For information on assigning a role to a user, see Configuring Local User Management authentication.


Creating a realm for the Local user authentication 

  1. In the Authentication Type field, click Local.
  2. (Optional) Click Enable Chaining Mode and perform the following steps to enable authentication chaining. For information about the authentications that you can chain with LDAP, see Authentication chaining.
    1. Click Add Authentication.
    2. Select the required authentication type and enter the authentication details.
    3. Repeat steps a and b to add more authentications for the realm.
  3. Click Add.

Related topics

Was this page helpful? Yes No Submitting... Thank you

Comments