Configuring SAML 2.0 and Azure Active Directory for User Management
This page explains how to configure BMC Helix Network Management to use Azure Active Directory for user management when using SAML 2.0 for SSO logins to Azure Active Directory.
To use Active Directory (LDAP) without SAML 2.0, see Configuring Active Directory (LDAP) for User Management.
Once SAML 2.0 is enabled, you will only be able to log in to BMC Helix Network Management using Azure Active Directory usernames and passwords (except for the default BMC Helix Network Management administrator local account). To log in to BMC Helix Network Management using the default administrator local account, use the username/password “omnicenter/administrator,” which will indicate to BMC Helix Network Management that you wish to bypass Active Directory. This is useful if your Active Directory server is down or unreachable.
Configuring BMC Helix Network Management to use Azure Active Directory and SAML 2.0 for user management requires you to make configuration changes in Azure Active Directory in your Microsoft Azure account before configuring BMC Helix Network Management.
Procedure
To perform the procedure below, you will need administrative access to both BMC Helix Network Management and your Microsoft Azure account. It is recommended to have both open in separate tabs in your browser as you perform the steps below, switching back and forth between them as needed.
- In BMC Helix Network Management:
- Log in to BMC Helix Network Management as a user with the SuperAdmin access level.
- From the main menu, select Administration >> Users >> Authentication Settings.
- On the Authentication Settings page, in the Authentication panel, in the TYPE field, use the pull-down menu to select SAML (2.0). The SAML configuration options now appear.
- At this point, you will need to configure the Active Directory settings in your Azure account. Leave this page open and return when instructed.
- In Azure:
- Log in to your Microsoft Azure account.
- Click on your Azure Active Directory service. (If you have not already added this service to your Azure account, you must do so before continuing.)
- On the Azure Active Directory service management page, from the Manage menu on the left, select Enterprise Applications.
- On the All applications page, click New application at the top to add a new application.
- From the Azure AD Gallery, select the Azure AD SAML Toolkit. (You can use the search field to find this application quickly.)
- In the side panel that opens:
- In the Name field, change the name to something more easily identifiable (e.g., "BMC Helix Network Management Services SAML" or a similar name).
- Click the Create button to add the new application to your Azure Active Directory service.
- You are taken to the Overview page of your new application.
- On the Overview page under Getting Started, click on step 2: Set up single sign-on.
- On the Single Sign-On page, click SAML to open the SAML-based Sign-On page.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Service URLs for your Identity Provider panel, copy the value from the AUDIENCE (ENTITYID) URI field.
- In Azure:
- On the SAML-based Sign on page, in the Basic SAML Configuration panel, click Edit.
- In the Basic SAML Configuration side panel that opens:
- In the "Identifier (Entity ID)" section of the edit area, click Add identifier.
- In the new empty field that appears, paste the value that you copied from BMC Helix Network Management.
- Select the checkbox to make that value the default.
- Delete the previous default value, leaving only the value pasted from BMC Helix Network Management.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Service URLs for your Identity Provider panel, copy the value from the ACS (CONSUMER) URL field.
- In Azure:
- In the Basic SAML Configuration side panel:
- In the "Reply URL (Assertion Consumer Service URL)" section of the edit area, click Add reply URL.
- In the new empty field that appears, paste the value that you copied from BMC Helix Network Management.
- In the Basic SAML Configuration side panel:
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Service URLs for your Identity Provider panel, copy the value from the SINGLE LOGOUT URL field.
- In Azure:
- In the Basic SAML Configuration side panel:
- In the "Sign on URL" section of the edit area, paste the value that you copied from BMC Helix Network Management.
- Edit the "logout" portion of the pasted value to "login".
- In the "Logout URL" section of the edit area, again paste the value you copied from BMC Helix Network Management (leave it unedited).
- Click Save at the top of the side panel.
- On the SAML-based Sign-on page, the configuration values will be updated in the Basic SAML Configuration panel.
- On the SAML-based Sign on page, in the Attributes & Claims panel, click Edit.
- On the Attributes & Claims page, click Add a group claim.
- In the Group Claims side panel that opens:
- Select the All groups radio button.
- Click the down arrow to open the Advanced Options area.
- Click the checkbox next to "Customize the name of the group claim"
- In the Name field, enter an easily identifiable name for your group (for example, something like BHNM_Groups). Then copy the value that you entered.
- Click Save.
- In the Basic SAML Configuration side panel:
- In BMC Helix Network Management:
- On the Authentication Settings page, in the User Permission Mapping panel, in the ATTRIBUTE NAME field, paste the value that you copied from Azure.
- In Azure:
- Navigate back to your Azure Active Directory service management page.
- From the Manage menu on the left, select Groups.
- We will now create four new primary Active Directory groups to match the BMC Helix Network Management user types (User, Power User, Administrator, and SuperAdmin). If you require more granular organization for your Active Directory user groups, you can add subgroups to any primary group. Users in a subgroup will be logged in at the primary group access level.
- For each BMC Helix Network Management user type:
- On the All groups page, click New group.
- On the New Group page:
- In the Group name field, enter an appropriate name for this group (such as BHNM_Users, BHNM_Power_Users, etc.).
- Click Create.
- On the All groups page, locate your new group and click on it.
- On the group management page, from the Manage menu on the left, select Members.
- On the Members page, select Add members.
- In the Add members side panel that appears, select the members to add to the group.
- Click Select.
- Navigate back to the All groups page and:
- Locate the group that contains the basic BMC Helix Network Management Users.
- In the Object ID column, copy the object ID for that group.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the User Permission Mapping panel, in the BMC Helix Network Management Access Levels area, in the USER field, paste the value that you copied from Azure.
- In Azure:
- On the All groups page:
- Locate the group that contains the BMC Helix Network Management Power Users.
- In the Object ID column, copy the object ID for that group.
- On the All groups page:
- In BMC Helix Network Management:
- On the Authentication Settings page, in the User Permission Mapping panel, in the BMC Helix Network Management Access Levels area, in the POWER USER field, paste the value that you copied from Azure.
- In Azure:
- On the All groups page:
- Locate the group that contains the BMC Helix Network Management Administrator users.
- In the Object ID column, copy the object ID for that group.
- On the All groups page:
- In BMC Helix Network Management:
- On the Authentication Settings page, in the User Permission Mapping panel, in the BMC Helix Network Management Access Levels area, in the ADMIN field, paste the value that you copied from Azure.
- In Azure:
- On the All groups page:
- Locate the group that contains the BMC Helix Network Management SuperAdmin users.
- In the Object ID column, copy the object ID for that group.
- On the All groups page:
- In BMC Helix Network Management:
- On the Authentication Settings page, in the User Permission Mapping panel, in the BMC Helix Network Management Access Levels area, in the SUPERADMIN field, paste the value that you copied from Azure.
- In Azure:
- Navigate back to the SAML-based Sign on page for your application.
- On the SAML-based Sign-on page, in the SAML Certificates panel, download either the Base64 or Raw certificate (your choice; BMC Helix Network Management will accept either).
- Open the downloaded certificate in a basic text editor (one that does not add hidden formatting to the text) and copy the contents of the certificate.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Identity Provider Configuration panel, paste the contents of the certificate into the X509 CERTIFICATE STRING field.
- In Azure:
- On the SAML-based Sign on page, in the Set up "your application" panel, copy the value from the Azure AD Identifier field.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Identity Provider Configuration panel, in the ENTITY ID field, paste the value that you copied from Azure.
- In Azure:
- On the SAML-based Sign on page, in the Set up "your application" panel, copy the value from the Login URL field.
- In BMC Helix Network Management:
- On the Authentication Settings page, in the Identity Provider Configuration panel, in the LOG IN URL field, paste the value that you copied from Azure.
- For the INCLUDE SUBJECT IN REQUEST field, switch the selector to OFF.
- Click Save.
- You are finished configuring BMC Helix Network Management to use Active Directory and SAML 2.0 for user login.
All current users must log out and log back in again using their Active Directory credentials.
Troubleshooting
Authentication Settings
If, after configuring BMC Helix Network Management to use Active Directory and SAML 2.0, you find that your users are unable to log in, Azure provides a tool to test your authentication settings and determine whether they work and, if not, where the problem lies. To access the tool, follow the steps below.
- Log in to your Microsoft Azure account.
- On the Microsoft Azure homepage, under Azure services, click Active Directory.
- On the Azure Active Directory service management page, from the menu on the left, under Manage, select Enterprise applications.
- On the All applications page, locate the SAML application you want to test, then click its name.
- On your application's Overview page, click Set up single sign-on.
- On the SAML-based Sign on page, at the top, click Test this application.
- In the side panel that opens:
- Select the radio button for how you would like to test the settings.
- Click Test sign in.
The test generates an XML response that contains information about the data being passed to BMC Helix Network Management during sign-on.
The primary information to check for errors are the values found on the SAML-based Sign on page (from where you ran the test) in the Set up "your application" panel. Those values are:
- Login URL
- Azure AD identifier
- Logout URL
Using BMC Helix Network Management SaaS in a Sandbox Environment
If you intend to use Active Directory and SAML 2.0 to manage users in a BMC Helix Network Management SaaS sandbox environment, make sure that you configure a CNAME in your DNS for the domain of the users logging in before attempting to use SAML.