Administering


When you have BMC Helix Single Sign-On server installed or upgraded, and BMC Helix Single Sign-On agent installed for all integrated applications, you can proceed with administering tasks. This section contains information about configuring BMC Helix SSO for various authentication types, and other administrative tasks such as configuring branding details or viewing user sessions.


Administering tasks for BMC Helix SSO subscribers

The following task applies to you if you have the permissions of a tenant administrator on the BMC Helix SSO server: 

Task

Reference

Create, edit and delete users and groups for realms with local authentication type

Administering tasks for BMC Helix SSO on-premises users

The following tasks apply to you if you have the permissions of a SaaS administrator in the BMC Helix SSO Admin Console: 

Task

Reference

Create internal administrators (SaaS administrators and tenant administrators) with access to the BMC Helix SSO Admin Console.

Set up multiple tenants on the BMC Helix SSO server.

Configure the following settings on the BMC Helix SSO server:

  • General settings—cookie domain, session settings, and server logging
  • Advanced settingscookie name, service URL, and service provider options for SAML authentication
  • Admin authentication settings—Enable authentication for internal administrator users, and configure access to BMC Helix SSO Admin Console for users from an external LDAP directory.

Configure BMC Helix SSO for end user authentication:

  • Add and configure authentication for realms
  • Enable AR authentication for bypass
  • Enable BMC Helix SSO to authenticate applications in iframes
  • Rebrand the BMC Helix SSO end user login page
  • Set up the user ID transformation
  • Enable and configure authentication chains for a realm

Create, edit and delete users and groups for realms with local authentication type.

Configure OAuth 2.0 protocol for one or more of the following tasks:

  • Register OAuth 2.0 native client applications
  • Register OAuth 2.0 non-native client applications
  • Set up token timeout for client applications
  • Generate JWKs for OAuth 2.0 flow
  • View and delete tokens of active user sessions

Enable single sign-on experience for applications hosted on different domains.


Configuring Remedy SSO for applications hosted on different domains


Enable single sign-on experience for applications cross-launched from a different BMC Helix SSO server.


Enabling cross launch for applications integrated with different Remedy SSO servers






Create a backup of the BMC Helix SSO server before upgrade.

Restore the BMC Helix SSO configuration from backup.

Kill end users sessions.

View audit records for actions performed by all BMC Helix SSO administrators.


The following tasks apply to you if you have read and write permissions for the file system on servers with  BMC Helix SSO server and  BMC Helix SSO agents:

Task

Reference

Configure the rsso.agent.properties file on the servers with applications integrated with BMC Helix SSO.

Transfer data between two BMC Helix SSO servers.


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*