Setting up authentication for the on-premises gateway
With BMC Helix Single Sign-On (SSO), BMC Helix Intelligent Integrations on-premises gateway users are required to present credentials to authenticate themselves.
Perform the following tasks to set up the authentication for the BMC Helix Intelligent Integrations on-premises gateway:
- Register the OAuth client (on-premises gateway).
Perform one of the following tasks to register the client depending on whether BMC Helix SSO is running in your on-premises environment or the BMC Helix environment:- On-premises environment: Perform the steps in Task 1.
- BMC Helix SaaS environment: Contact the BMC Support team.
- Update the BMC Helix SSO configuration for Auth Proxy.
Before you begin
- Ensure that you have the TenantAdmin role with BMC Helix SSO SaaS administrator credentials.
- On the server <FQDN>:<portNumber>, where the II on-premises gateway is installed, the firewall should allow:
- outbound data transmissions from the II server to the ADE platform.
- inbound data transmissions from the ADE platform to the II server.
Task 1: To register the OAuth client
- Create a tenant administrator account for BMC Helix SSO:
- Log on to the BMC Helix SSO Admin Console as a SaaS administrator.
- Click Tenant and from the list of tenants, select a tenant.
- Click the pin icon to switch to the BMC Helix SSO Admin Console of the selected tenant.
- On the navigation panel, click the Admin User tab.
The list of administrator users is displayed. - (Optional) Click Add Admin User.
On the Add Admin User page enter the following information and click Save:- Login: Enter a name of the BMC Helix SSO administrator.
- Password: Create a password for the tenant administrator account.
- Confirm Password: Confirm the password for the tenant administrator account.
The tenant administrator account is added and is available in List of Admin Users.
- Register the OAuth client:
- Log on to the BMC Helix SSO Admin Console as a tenant administrator by using the credentials you created in step1(f).
- Click OAuth2.
- On the OAuth2 and OpenID Configuration page, click the Clients tab.
- Click Register Client.
- Enter a name for the OAuth client.
- Ensure that the Enabled check box is selected to enable the client for authorization.
- Click Add Redirect URI, and then add the URI in the following format to which the authorization code is sent after an /authorize request succeeds. The client side must support the URI.
https://<hostName>:<portNumber>/swpui/auth/code/callback
In the URL:- Replace <hostName> with the fully-qualified domain name of the server where the on-premises gateway is installed.
- Replace <portNumber> with a custom port if you are using a port other than the default of 443.
- Select the openid (Scope used for OpenID connect) check box to enable the OAuth client to use the OpenID Connect protocol.
Click Save.
The following information is automatically generated when you register the client:Client ID
Registers the client identifier issued to the client by BMC Helix SSO server during the registration process. You can view this information when you select the registered client.
Client Secret
Shows the client secret (private key) only after you click Save.
The private key is used to sign the JWT, which contains the client authorization. This JWT is different from the one containing the end-user credentials that is used in the JWT assertion grant type.- Save the Client ID and Client Secret values in a file somewhere because these values will not be displayed again.
- Log out of the BMC Helix SSO admin console.
- Add a realm and configure authentication for the realm:
- Log on to the BMC Helix SSO console as a SaaS administrator.
- Click the edit icon corresponding to the realm of the tenant.
- In Application Domain(s), enter the fully-qualified domain name of the server where the on-premises gateway is installed.
- Click Save.
Task 2: To update the BMC Helix SSO configuration for Auth Proxy
- Log on to the server where the on-premises gateway is installed as a tenant administrator.
- Navigate to the <IIGATEWAY_INSTALL_DIR>/hii/conf/authproxy directory and open the external.conf file with a text editor.
- Update the file:
- Search for the rsso_external_url and rsso_internal_url parameters and replace {RSSO_URL} with the OpenID Connect Issuer URL.
- Search for the target_host parameter and replace {RSSO_TARGET_HOST} with swp-ui.
- Search for the client_id parameter and replace {RSSO_CLIENT_ID} with the Client ID that you saved in a file while registering the OAuth client.
- Search for the client_secret parameter and replace {RSSO_CLIENT_SECRET} with the Client Secret that you saved in a file while registering the OAuth client.
- Save the file.