Security planning
Security is a critical aspect of Remedy Single Sign-On. Key requirements and best practices include protecting sensitive data, securing system access, and managing administrator accounts within Remedy SSO.
Ensuring security for sensitive data
Sensitive data, such as user credentials and authentication tokens, must be secured by HTTPS configuration. To use HTTPS connections, ensure that Secure Sockets Layer (SSL) certificates are generated and signed.
Security on a high-availability system
Remedy SSO supports the X-Forwarded-Proto and X-Forwarded-Host headers that might be sent by the load balancer with a request. Remedy SSO uses these headers when generating login URLs (pointing to the Remedy SSO server) for the end user. This feature keeps external traffic secure, though internal traffic behind the load balancer might not be secure.

Ensuring more secure and restricted access to the cookie
The domain attribute of the cookie determines which domains can access it. By default, the cookie set is to the parent domain and its sub-domains while installing the Remedy SSO server. If the cookie contains sensitive data, it might be accessible to all less trusted or less secure applications hosted on these domains. To mitigate the risk, set the cookie domain value to the specific domain where the server is installed, rather than restricting it to the parent domain. You can set the cookie domain value during installation or after installation in the Remedy SSO Admin Console. For more information, see Configuring the Remedy SSO server.
Support for multiple administrator accounts in Remedy SSO
For security reasons, in the Admin User tab, the Remedy SSO administrator can create and manage multiple administrator accounts. The Remedy SSO administrator can block, unblock, delete the administrator account they created, or change their password. For more information about creating and managing multiple administrator accounts, see Setting up Remedy SSO administrator accounts.
User accounts lockout policy
To prevent unauthorized logins, Remedy SSO administrators who exceed the allowed number of failed login attempts due to an incorrect password are automatically blocked. Remedy SSO administrators can unblock the locked administrators manually through the Remedy SSO Admin Console. For more information, see Configuring the Remedy SSO server.
Remedy SSO relies on the external identity providers to authenticate end users. Users who exceed the allowed number of failed login attempts should be blocked by the identity provider.
Related videos
Watch the video on how to manage SSL certificates with SSL offloading.