Setting up tenants


As a SaaS administrator, to enable the single sign-on experience for a customer company, you must first create a tenant on the BMC Helix Single Sign-On server. You can then proceed with the onboarding tasks for this tenant. 

The SAAS_TENANT, which is available on the BMC Helix SSO server, is the default and central tenant. You cannot modify the name of this tenant or disable this tenant. You can only change the default description and host for this tenant. However, you cannot modify the SaaS tenant host name if its value was set by using the RSSO_SAAS_HOST environment variable. Only a SaaS administrator has access to this tenant.

SaaS tenant.png

As a SaaS administrator, you can create, modify, configure, and disable other tenants. To switch between different tenants, on the List of Tenants page, select and pin a tenant. The Tenant field on the navigation panel will display the name of the tenant you have switched to.

Tenant switch.png

​​​​​

To create a non-SaaS tenant

  1. As a SaaS administrator, log in to the BMC Helix SSO server. On the navigation panel, click Tenant.
  2. Click Add Tenant, and specify the following fields in the Basic Information section:
    • Name - Tenant name
    • Hostname - Host name to access an individual tenant by using the following format: host.example.com
    • (Optional) Description
  3. To enable the tenant, select the Enabled check box.
  4. Click Save Changes.

The tenant name and tenant host name must be unique.

To enable self-service for a tenant

You can enable the self-service feature to allow customers to manage their tenant’s configuration settings independently through a dedicated admin console available on the specified tenant host. If the feature is enabled, you can customize which authentication options are available to the tenant administrator and predefine the host and port for bypass scenarios. When the feature is disabled, all authentication methods are available for self-service realms.

  1. As a SaaS administrator, log in to the BMC Helix SSO server. On the navigation panel, click Tenant, and click Edit Tenant image-2023-9-27_15-38-14.png for the tenant that you want to modify. 
  2. In the Self Service Config section, select the Enable Self Service check box.
  3. Select an authentication method from the list:
    • SAML
    • AR
    • CERT
    • LDAP
    • KERBEROS
    • PREAUTH
    • LOCAL
    • OIDC
  4. (Optional) To enable tenant administrators to isolate different applications, select the Allow tenant admins to update application domains check box.
  5. (Optional) To enable AR authentication to bypass other authentication methods configured for a realm, enter the host name and port of the AR System server in the Bypass AR Hostname section.
  6. Click Save Changes.

For more information, see Self-service configuration for BMC Helix SSO tenant administrator.

To enable features for a tenant

Use feature flags to enable specific functionalities for a tenant.

  1. Edit or create a tenant for which you want to update the feature flags.
  2. In the Tenant Properties & Feature Flags section, select the check boxes with the functionalities to be enabled for a tenant. All these features are disabled by default.
  3. Click Save Changes.
    The changes are applied automatically for a tenant.

Functionality

Description

Reference

User management

Local User Management "Confirm Registration"

Allows the registration of a user with an email  through an API call, enabling users to set or change their password.

Disable email template sanitizing

Helps check and modify the email template input in the Forgot Password functionality.

Security & Session

Webhooks on authentication response

Helps notify an external service about user authentication in BMC Helix SSO by using webhooks.

Path-specific session cookie

Helps limit the scope of the cookie to the /rsso path on the BMC Helix SSO server.

Check TCP connection

Enables the Check TCP connection feature in the Service tab of a tenant. Helps administrators troubleshoot failed connections between BMC Helix SSO and other applications. The Host, Port, and Type fields are required. In the Type field, select a Transmission Control Protocol (TCP) connection type established between the BMC Helix SSO server and an integrated BMC application:

  • Plain - Non-TLS connection.
  • Encrypted insecure - TLS connection without certificate verification.
  • Encrypted secure - TLS connection with certificate verification.

Use tenant token timeouts for multi-tenant clients

Helps apply the same access and refresh timeout values that are defined for the particular tenant level for multi-tenant clients.

UI & Experience

Hide copyright

Helps administrators hide the BMC copyright message on the login page and managed service provider page of the integrated BMC application.

UI idle timeout

Enables user logout from a BMC application integrated with BMC Helix SSO due to inactivity in the UI based on defined criteria.

This option is available for deployments where applications are protected by the BMC Helix SSO agent:

  • Deployments where the BMC Helix SSO agent communicates with the BMC Helix SSO server using the legacy flow.
  • Deployments where the BMC Helix SSO agent is deployed with multi-domain support.
  • Deployments where the BMC Helix SSO agent is protected by Auth Proxy.
Advanced

MSP server side

Enables the BMC Helix SSO Server with a realm identifying functionality on the server side. It is used for multi-domain applications to enhance configuration experience for user sessions. MSP server side feature is applicable for a BMC Helix SSO Agent and Auth Proxy. 

Login-audit decoupling

Ensures an uninterrupted admin and end-user login if an audit event fails due to database exceptions. The feature disassociates the creation of a BMC Helix SSO session from auditing the login event.

Database exceptions

ADMIN_LOGIN_SUCCESS
AR_CTM_PEOPLE_DATA_OBTAIN_SUCCESS
OAUTH_TOKEN_DELETED
ON_AUTH_WEBHOOK_SUCCESS
REAUTHENTICATION
REQUEST_AUTH_CODE
REQUEST_NEW_OAUTH_INTERNAL_TO_EXTERNAL_EXCHANGE_TOKEN
REQUESTS_NEW_OAUTH_TOKEN_WITH_AUTH_CODE
REQUESTS_NEW_OAUTH_TOKEN_WITH_JWT
REQUESTS_NEW_OAUTH_TOKEN_WITH_ONLINE_REFRESH
REQUESTS_NEW_OAUTH_TOKEN_WITH_REFRESH_TOKEN
TOKEN_INFO_REQUESTED
TOKEN_USER_GROUPS_REQUESTED
USER_LOGGED_IN
USER_LOGGED_IN_NATIVE_APP
USER_SESSION_DELETED
USER_WENT_THROUGH_CONSENT_PAGE

Reviewing audit records
Configuration archiveAllows administrators to revert the BMC Helix SSO ​​​​server configuration to a previous state, rewinding the server settings up to the selected point in time.Reverting BMC Helix SSO configuration to an earlier version

 

​​​​Where to go from here

After you have created a tenant, create administrators for this tenant. For information about how to create a tenant administrator, see Setting up Remedy SSO administrator accounts.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix Single Sign-On 26.2