This documentation supports the 19.11 version of BMC Remedy Single Sign-On, which is available only to BMC Helix subscribers (SaaS).To view an earlier version, select the version from the Product version menu.

FAQs and additional resources


This topic provides information that supplements the Remedy Single Sign-On documentation. 

Related topics

Frequently asked questions

This section provides answers to frequently asked questions (FAQs) about Remedy SSO.


An end user has modified the password, however the end user is still able to access Remedy SSO applications. Has the password been updated?

Identity providers do not automatically notify Remedy SSO about the password change. Hence, an end user's Remedy SSO session remains active until it expires, and is not revoked after password change on IdP. To force the logoff, and receive the request for entering a new password, an end user needs to ask a Remedy SSO administrator to delete all active sessions/OAuth of this end user.

How can I change my Remedy SSO administrator password?

You can change your password in the Remedy SSO Admin Console, in the Admin User Management. To change your password, select your user account name, and then edit your password as required. See Setting-up-Remedy-SSO-administrator-accounts for more details about how to change the password of an administrator.

I'd like to obtain Remedy SSO server version. How can I get that?

You can obtain the Remedy SSO server version information through the <RSSO Server>/config/server-status URL. But, you must be authenticated as a Remedy SSO administrator before that.

Does Remedy SSO support multi-factor authentication?

Multi-factor authentication is not implemented on theRemedy SSO side. Remedy SSO only supports scenarios where the Identity Provider that is configured in Remedy SSO for authentication has configured multi-factor authentication.

For example, if your application is integrated with the Remedy SSO server that is configured to use the SAML protocol to authenticate users accessing an application, then for the end users to pass the authentication flow, multi-factor authentication must be enabled and configured on the SAML Identity Provider.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*