25.4 enhancements and patches


Review the BMC Helix SSO 25.4 enhancements and patches for features that will benefit your organization and to understand changes that might impact your users.

Version

SaaS

On premises

Fixed issues

Updates and enhancements

25.4.02✅️ NA25.4.02
25.4.01✅️ Known and corrected issues25.4.01

25.4.00

✅️

 

Known and corrected issues

For a list of recent updates and enhancements across multiple versions, see Release notes and notices.

BMC Helix applies upgrades as described in theBMC Helix Upgrade policy. BMC Helix applies upgrades and patches duringMaintenance windows.

25.4.02


Improved self-service for​​​​​ domain management

Tenant administrators can manage application domains directly within their tenant realms, including adding, updating, or removing application domains. The feature is disabled by default and can be turned on through the tenant configuration settings. An ability to modify application domains helps establish smooth integration with other BMC Helix applications and simplifies URL management within a self-service portal. For more details, see Self-service configuration for BMC Helix SSO Tenant administrator.

Allow tenant admins to domain names.png


Extended information in OpenID Connect and SAML audit records

Audit records for the USER_LOGIN_FAILED event include trace IDs. Additional data is available for the OpenID Connect and Security Assertion Markup Language (SAML) methods. This feature helps administrators and support teams diagnose authentication issues, eliminating the need to investigate logs. To read more about audit, see Reviewing audit records.

traceid.png


Enforced password policy for admin and local users

The minimum password length is increased from 8 to 14 characters for all admin users. For local users, this policy applies only if the Federal Information Processing Standards (FIPS) mode is detected. Overwise, their password policy does not change. To learn more about password management for local users, see Managing local users and passwords.

2025-12-22_17-33-49.png

25.4.01


Enhanced Auth Proxy support for AR JWTs and IMS JWTs

Auth Proxy supports special authentication use cases by handling Action Request JSON Web Tokens (AR JWTs) and Identity Management Service JSON Web Tokens (IMS JWTs). BMC Helix SSO token validation by the BMC Helix SSO agent is no longer required. This enhancement helps the Converged Server to transition from the BMC Helix SSO agent to Auth Proxy. Configuration options added:

  • excluded_authorization_scheme_names
  • excluded_cookie_names 

For more details, see Configuring Auth Proxy for deployment with BMC Helix SSO.

25.4.00


Enhanced end-user audit logging

As an administrator, obtain greater visibility and traceability of end users' authentication activities. In addition to the source IP address, you can view the authentication method, its position in the authentication chain, and a 128-bit Universally Unique Identifier (UUI) of the identity provider. For more information about audit logging, see Reviewing audit records.

audit delails.png


What else changed in this release

The following table lists the changes in the product behavior:

UpdateProduct behavior in versions earlier than 25.4Product behavior in version 25.4 and later versions
Increased backend idle timeout.The default backend idle timeout was 16 minutes, which caused unexpected logouts in the BMC Helix Digital Workplace administrator console.The default backend idle timeout is 60 minutes.
Localization of the copyright text.Incorrect or missing translation of copyright text.Correct localization of copyright texts in all supported locales.
Login page usability.

The login page was not pre-populated with the user ID hint when accessing an integrated BMC Helix application through OpenID Connect or SAML authentication, as detected by the Multiple Service Provider (MSP) page.

Provided a user ID hint for users accessing the application by the Open ID Connect or SAML authentication flows identified by the MSP functionality.
SAML.When invalid data was detected for a SAML certificate, the system logged an exception.When invalid data is detected for a SAML certificate, the system logs a WARNING.
Token invalidation upon session removal.

When a session was deleted, the administrator had to manually remove the associated tokens. 

When a session is deleted, its associated tokens are automatically removed. 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix Single Sign-On 25.4