Configuring BMC Atrium Single Sign-On as an IdP
If you configure the BMC Atrium Single Sign-On server as an Identity Provider (IdP), do not use the server as the integration server for BMC products. Instead, a separate BMC Atrium Single Sign-On server should be configured as a Service Provider (SP) and used as the integration host.
Verify that a X509 certificate is imported into the keystore
Before creating the IdP, a X509 certificate is needed for signing communications between the IdP and SP of the SAML Circle of Trust (COT). When joining an already existing COT, the certificate for the COT must be imported into the keystore.. A default certificate is created and stored in the keystore during the installation with the alias name of test. This certificate can be used without creating and importing a new certificate.
To import the Circle of Trust certificate
When BMC Atrium Single Sign-On is configured as an IdP, the Circle of Trust certificate must be imported into a keystore for the server to use.
Navigate to the keystore location, and replace the test certificate with your generated certificate.
- If the password for the keystore was changed, update the default .keypass and .storepass configuration files with the encrypted form of the new password.
The configuration files are located in the same <installationDirectory>/tomcat/ directory as the Circle of Trust keystore. Stop and restart the Tomcat server.
To encrypt the passwords for storage in the files
- Enter the following URL into the browser:
https://:/atriumsso/encode.jsp
In this case:- host is the FQDN of the BMC Atrium Single Sign-On host.
- port is the port number that BMC Atrium Single Sign-On is using for secure communication.
- Enter a new password.
- To encrypt the value, click Encode.
- Copy the encrypted password into the configuration files.
- Stop and restart the BMC Atrium Single Sign-On server.
Create a local IdP
The Local Identity Provider (IdP) Editor has the following options:
To create a local IdP
- On the BMC Atrium SSO Admin Console, click Edit BmcRealm.
- On the Federation tab, click Add.
- Select Local Identity Provider (IdP).
- Provide the local IdP information.
- Click Save.
Create a remote SP
- On the BMC Atrium SSO Admin Console, click Edit BmcRealm.
- On the Federation panel, click Add.
- Select Remote Service Provider (SP).
- Create a name for the remote IdP and upload the IdP metadata on the Create Service Provider (SP) pop-up.
Parameters
Description
Name
Name for the remote SP.
URL
Select URL to acquire the remote IdP metadata from the URL location. Specify the FQDN of the host, including the port and any required path information. This URL is IdP-specific. For information on the metadata URL, consult the SP documentation. For information about providing SP metadata from another Atrium Single Sign-On server, seeProviding SP metadata from another Atrium Single Sign-On server
File Upload
Select File Upload to upload a file that contains the remote SP metadata.
Providing SP metadata from another Atrium Single Sign-On server
For accessing SP metadata, the following URL syntax is used:
https://<host>:<port>/atriumsso/saml2/jsp/exportmetadata.jsp?role=sp&realm=BmcRealm&entityid=<entityid>In the case:
- host is the FQDN of the server hosting the SP.
- port is the port used for secure communications of the server hosting the SP.
- entityid is the name of the SP hosted by the server.
For example:
https://sp.bmc.com:8443/atriumsso/saml2/jsp/exportmetadata.jsp?role=sp&realm=BmcRealm&entityid=https://sp:8443/atriumsso
- Click Save
- On the Federation panel, select the remote IdP.
- Click Edit.
- Provide the remote SP parameters.
- Click Save.
Remote SP Editor parameters
The Remote Service Provider (SP) Editor has the following options:
(Optional) Federate your user accounts in bulk
For information about using bulk federation, see Federating-user-accounts-in-bulk.
Where to go from here
- For information about managing users, user groups, and authentication modules, see Administering.
- For information about troubleshooting SAMLv2 authentication, see Troubleshooting-SAMLv2.