Self-service configuration for BMC Helix SSO Tenant administrator


As a Tenant Administrator in addition to existed local user management, you can perform the following  list of operations in the BMC Helix SSO:

  • view audit records.
  • manage sessions (view or delete existing sessions).
  • configure settings of allowed authentications.

A self service configuration allows Tenant Administrators to perform administrative operations available in BMC Helix SSO autonomously. 

To configure self service in the Tenant

  1. As a SaaS administrator, log in to the BMC Helix SSO Admin Console.
  2. On the navigation panel, click Tenant.
  3. Select the appropriate Tenant for editing. 
  4. Select the Self Service checkbox.

By default, the Self Service checkbox is disabled. Once it is checked, it provides the list of available parameters for the self service configuration. Here, you can select the appropriate type of authentication among the set of authentications created by Saas Administrator and set an AR host name and AR service port for AR Bypass authentication mechanism. Enabled Self service checkbox on a tenant level allows to limit the available authentication types for a realm.

self_service_tenant.JPG

To configure self service in the Realm

After the configurations in the Tenant are done, navigate to the appropriate Realm to make it available for the Tenant Administrator for further configurations of the authentication settings.

  1. From the list of the Realms, select the necessary one.
  2. Click Edit Realm.
  3. Select the Self service checkbox.
  4. Save your changes.

Note

By default, all existing or newly created realms are disabled for a self service configuration.

The four tabs become available for a Tenant Administrator in addition to existed Local User management:

  • Realm – make changes for branding, update Authentication settings (with no access to information about bypass)
  • Session – get information about existed sessions, manage them (delete)
  • OAuth2 – to manage OAuth2 related settings
  • Audit – to get data about admin and end-user audited actions

Edit OAuth2 parameters

As a Tenant Administrator, you can configure all settings related to OAuth2 except the OpenID Connect Issue URL.

outh_tab_ui.JPG

Note

The OpenID Connect Issuer URL parameter is not available for editing by the Tenant Administrator under the self-service configuration.


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*