Out of support

 

This documentation supports the 8.1 version of BMC Atrium Single Sign-On, which is in "End of Version Support." However, the documentation is available for your convenience. You will not be able to leave comments.

Click here to view the documentation for a supported version of Remedy Single Sign-On.

Integrating BMC MyIT

This topic describes how to configure the integration of BMC Atrium Single Sign-On and MyIT. This procedure does not apply to multi-tenant environment. 

Before you begin 

  • Install BMC Atrium Single Sign-On and configure realms to support the needed authentication methods. For more information, see Configuring after installation.

  • Install BMC MyIT 2.1 or later.
  • Verify access to the MyIT and the Atrium Single Sign-On servers use the same domain. Otherwise, deploying the Atrium Single Sign-On agent will not work.
  • Verify the location of the Webagent folder or compressed file in the BMC Atrium Single Sign-On installation files at the following location. 

    AtriumSSOinstallerDirectory\BMCAtriumSSO\Disk1\files\webagent
    Example:
    location webagent

To enable Atrium Single Sign-On in the BMC MyIT database

  1. Using the business schema login, log on to the Oracle or Microsoft SQL database configured for BMC MyIT during installation.
    MyIT is installed with two logins for business schema and system schema. If you do not know login details, look at the database configuration files at TomcatInstallationPath/Tomcat7.0/conf/catalina/localhost/ux.xml

  2. In the TENANT table for all the tenants (all the entries in the table), set the SAML Authentication field to True

    Microsoft SQL Example: Setting SAML_AUTHENTICATION

  3. Repeat this step each time that you add a tenant to the Single Sign-On configuration.  

To deploy the Atrium Single Sign-On agent and web.xml

For clusters, complete the following procedure for each BMC MyIT server.

  1. Stop the Tomcat server.

  2. Copy the WebAgent folder to any location on the BMC MyIT server, and, if a compressed file, extract the files. 

  3. In a Linux shell or DOS command window, go to the WebAgent/Deployer folder. 
  4. Specifying the ssoServer:port, myitUrl, tomcatServerPath, ssoAdminName, and ssoAdminPassword values, run the following command with the fully qualified domain names:

    JavaInstallationPath\java -jar deployer.jar --install --container-type tomcatv7 --atrium-sso-url https://ssoServer:port/atriumsso --web-app-url http://myitUrl/myit --container-base-dir tomcatServerPath --admin-name ssoAdminName --admin-pwd ssoAdminPassword

    Tip

    Create a .bat or .sh file with the command so that, if needed, you can modify and run the command, such as in clusters, or server groups. 

    Example: /usr/java/jdk1.7.0_01/bin/java -jar deployer.jar --install --container-type tomcatv7 --atrium-sso-url https://vm-sso1.calbro.com:443/atriumsso --web-app-url http://vm1-03.calbro.com/myit --container-base-dir /opt/bmc/apache/tomcat7.0 --admin-name admin --admin-pwd Pass1234

  5. Look at the output for errors.
  6. Verify that the atssoAgents folder is created in the Tomcat folder. 
    Example: Apache Software Foundation\Tomcat7.0\atssoAgents
  7. Log on to the Atrium Single Sign-On server, and verify /myit@myitServer:port in the agent list.

  8. For 2.0 and 2.1, extract the ux.war file so that you can edit web.xml.  
  9. Edit the web.xml file
    Version 2.0 and 2.1: web.xml is in ux/war/ after extraction.
    Version 2.2: web.xml is in Smart_IT_MyIT/ux/WEB-INF
    Linux example:  /opt/bmc/Smart_IT_MyIT/Smart_IT_MyIT
    Windows example: C:\Program Files\BMC Software\Smart_IT_MyIT\Smart_IT_MyIT\ux\WEB-INF  
  10. Uncomment the Atrium SSO webagent <filter> and <filter-mapping> elements (by deleting <!--  and -->) and save the file. 

        <!-- Atrium SSO webagent filter. Uncomment when needed -->
        <!--
    	<filter>
            <filter-name>Agent</filter-name>
            <filter-class>com.bmc.atrium.sso.agents.web.SSOFilter</filter-class>
        </filter>
        <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/myitapp/*</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/smart-it/*</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/restapi/SSOLogin/*</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/restapi/users/sessions</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/rest/SSOLogin/*</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/rest/users/sessions</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  <filter-mapping>
    		<filter-name>Agent</filter-name> 
    		<url-pattern>/atssologout.html</url-pattern> 
    		<dispatcher>REQUEST</dispatcher> 
    		<dispatcher>INCLUDE</dispatcher> 
    		<dispatcher>FORWARD</dispatcher> 
    		<dispatcher>ERROR</dispatcher> 
    	  </filter-mapping>
    	  -->
  11. For 2.0 and 2.1, add the edited web.xml to the ux.war archive. 

  12. Restart the Tomcat server for BMC MyIT.

  13. Log on to BMC MyIT with Atrium Single Sign-On. 

Related topics

BMC Atrium Single Sign-On 8.1 online documentation

Was this page helpful? Yes No Submitting... Thank you

Comments

  1. Eyal Rosen

    We cannot find neither the webagent folder, nor a compressed file. We are using Atrium 8.1 SSO which seems to be the one this document is referring to. Is the documentation wrong?

    Dec 08, 2015 03:32
    1. Kamalakannan Srinivasan

      Hi Eyal,

      I was not able to find much information about the web agent folder.

      Hence you may want to raise a help ticket for our support regarding the web agent folder.

      Regards,

      Kamal

      Dec 17, 2015 02:48
  2. Kamalakannan Srinivasan

    Hi Eyal,

    Thank you for your comment. I will check with the technical team and keep you informed.

    Regards,

    Kamal

    Dec 08, 2015 04:02