Configuring SAMLv2 for authentication using the Tenant Console
For this release, you may use BMC Remedy Action Request System (BMC Remedy AR System) authentication or SAMLv2 authentication. If you are using Security Assertion Markup Language 2.0 (SAMLv2) authentication, you must use the BMC Atrium SSO Tenant Console. The SAML Console tab on the Tenant Console enables you to configure the service provider (SP) and external identity provider (IdP) details for your realms.
The following topics are provided:
Before you begin
- Verify that the BMC Remedy administrator has provided you with appropriate tenant admin account credentials and the BMC Atrium SSO Tenant Console URL. The URL has the following format: https://<fqdn>:<port>/atriumsso/UI/Login?realm=<realm_name>
- Verify the integration architecture when BMC Atrium Single Sign-On is integrated with BMC Remedy AR System and BMC Remedy Mid Tier. For more information, see BMC-Atrium-Single-Sign-On-integration-architecture.
To configure SAMLv2 for authentication
- Log on to the BMC Atrium SSO Tenant Console using the credentials you received from the BMC Remedy administrator. The URL has the following format: https://<fqdn>:<port>/atriumsso/UI/Login?realm=<realm>.
- In the BMC Atrium SSO Tenant Console, click the SAML Console tab.
- Enter the appropriate parameters on the panels:
- Configuring the Identity Provider (IdP) panel—The customer's IdP provides information that you will need to enter appropriate values for these parameters. The most common IdPs are AD FS and AR System.
- Configuring the Service Provider (SP) panel—Most of the parameters are already present on this panel. You must select the authentication context and name ID formats.
- Configuring the Logging panel—You can enable logging if you are having issues integrating with the customer's IdP. The logs are used for debugging integration issues. When you do not need debugging information, you should turn off logging, because logs occupy a lot of disk space.
Verify the configuration and perform one of the following actions:
- To confirm the changes, click Save.
To reset the values to the last saved configuration, click Revert to Saved.
Configuring the Identity Provider (IdP) panel
Enter values for the parameters listed in the following table, and then click Save.
Field | Description |
---|---|
Name | Enter the IdP name or IdP URL that you want to provide for identification. |
SingleSignOn URL | Enter the single sign-on URL that is provided to you by your IdP. The Atrium SSO server uses this URL to redirect users to the IdP for authentication. The format of the URL depends upon your IdP. The URL must be a valid HTTP or HTTPS URL. |
(Optional) Final Logout URL | This URL is the final URL that a user is redirected to after logging off from the application. It is not a Federation Server URL. You can specify a URL to perform user logoffs, or you can provide a URL that provides your company information; for example, http://www.bmc.com. |
SAMLv2 Binding | Select SAMLv2 binding. This option determines the way in which SAMLv2 messages are sent and received between the IdP and the SP. The following two binding options differ in the method used to exchange SAMLv2 messages: HTTP Redirect or XHTML Form with Post. |
Certificate | Upload the certificate that you received from your IdP. This certificate is used for authenticating incoming user requests. The certificate must be a PEM/DER-encoded certificate. After you upload the certificate, it is available for viewing in human-readable format. To upload a certificate, perform the following actions:
|
Configuring the Service Provider (SP) panel
Enter values for the parameters listed in the following table, and then click Save.
Field | Description |
---|---|
Assertion Consumer Service URL | This field is read only. The Assertion Consumer Service URL sends assertion to the service provider. This field contains a predefined value; for example, https://xyz.bmc.com:8443/atriumsso/Consumer/metaAlias/xyzrealm/sp. You must use this URL when you configure your IdP. |
Default Authentication Context | Select the authentication context. This attribute maps the SAMLv2-defined, authentication context classes to the authentication level that is set for the user session for the SP. |
Name Id Formats | Define the name-identifier formats that the SP supports. Providers use name identifiers to communicate with each other about a user. The Name ID format list is an ordered list. The first name ID has the highest priority in determining the name ID format to use. If the user does not specify a name ID to use when initiating single sign-on, the first one in this list is chosen and supported by the remote IdP. A persistent identifier is saved to a particular user's data-store entry as the value of two attributes. A transient identifier is temporary, and no data is written to the user's persistent data store. Note: |
Sign Authentication Requests | Select this check box to add a signature to all authentication requests sent from the SP to the IdP. |
View Metadata XML | Click this option to view metadata XML for the configured SP. When you click View Metadata XML, a new page opens, displaying the metadata. |
Configuring the Logging panel
Enter values for the parameters listed in the following table, and then click Save.
Field | Description |
---|---|
Logging panel | Enable Logging to log federated processing of the SP. You can log information about the following items:
Click View Log to view the logs in a new window. |
Where to go from here