BMC Atrium Single Sign-On and OpenSSO
BMC Atrium Single Sign-On is built on the open source project OpenSSO. This project has a long history of providing authentication and authorization across many different platforms by using many authentication techniques. The OpenSSO platform is built using a pluggable architecture which allows the system to expand as new authentication technologies evolve. The goal of BMC Atrium Single Sign-On is to provide a simplified, turnkey system that applies OpenSSO technology to BMC products. Configuration of the servers and agents is automated as much as possible, allowing for easy adoption.
This topic discusses the OpenSSO technologies that are certified by BMC Atrium Single Sign-On and how to access the OpenSSO and Atrium SSO consoles.
OpenSSO technologies
BMC Atrium Single Sign-On uses a subset of the technologies within the OpenSSO project that are required by BMC products. The current technologies of OpenSSO that are certified by BMC Atrium Single Sign-On include:
- Authentication chaining
- Authentication schemes - Internal, LDAP, BMC Remedy Action Request (AR) System, Active Directory, RSA SecurID, Common Access Cards (CAC), ActivIdentity-based, Kerberos, and SAMLv2
- Groups
OpenSSO Administrator console access
The OpenSSO Administrator console is accessed through the following URL:
- In this syntax, host is the FQDN of the server host.
- In this syntax, port is the HTTPS port selected during server installation (default is 8443).
- The default administrator name is amAdmin.
- The password is one that you supplied during installation.
When BMC Atrium Single Sign-On is installed on a Microsoft Windows platform, a shortcut is created in the Start menu which can be used to access the Administrator console.
Atrium Single Sign-On user console access
The user console access is through the following URL:
This URL can be used to verify the authentication module configuration. You do not need to rely on an installed and configured BMC application to initiate login in order to test configuration of authentication modules.