Configuring Single Sign-On
Infrastructure Management uses the BMC Atrium Single Sign-On (SSO) system to provide single sign-on with authorization and authentication of users. For full information about installing and configuring BMC Atrium SSO, see the online documentation of BMC Atrium Single Sign-On versions 8.0 or 8.1.
The Infrastructure Management Single sign-on feature can be integrated either during installation or post-installation.
The SSO feature can be configured post-installation in one of two ways:
- Using the Post Installation Configuration interface in the operator console. For more information, see Configuring-Infrastructure-Management-Integrations-using-the-operator-console.
- Using the pw sso commands. For more information, see pw-sso.
After you integrate SSO and when you launch Infrastructure Management, the BMC Atrium SSO Login dialog box appears. Enter your user name and password, and Infrastructure Management automatically starts.
Defining users and groups in BMC Atrium SSO
To enable single sign-on, you must first create Infrastructure Management users and user groups in BMC Atrium SSO. The users must be assigned to groups, and groups must be assigned privileges.
Users, user groups, and privileges defined in BMC Atrium SSO are used for Infrastructure Management group mapping.
During installation of Infrastructure Management, the BMC TrueSight Infrastructure Management Server Installer prompts for information that must already be defined in BMC Atrium SSO. The information is the minimum required definition in BMC Atrium SSO. Therefore, before installing Infrastructure Management, perform the following steps:
- In BMC Atrium Single Sign-on 8.0
- Create and define a Searcher user.
- Define the SSO amAdmin user and assign full access privileges. (The SSO amAdmin user is automatically created during installation of BMC Atrium SSO.)
- Create an Administrative user group and assign full access privileges.
- In BMC Atrium Single Sign-on 8.1
- Create a Searcher user and assign the BmcSearchAdmins group.
- Define the SSO amAdmin user and assign full access privileges. (The SSO amAdmin user is automatically created during installation of BMC Atrium Single Sign-On.)
- Create an Administrative user group.
The Administrative user group must be created only in BMC Atrium Single Sign-on and must not be created in BMC TrueSight Infrastructure Management. While, integrating BMC TrueSight Infrastructure Management with BMC Atrium Single Sign-on, when prompted, you must select the Administrative user group that you created in BMC Atrium Single Sign-on in step 3.
Configuring Infrastructure Management sessions
BMC Atrium SSO Server has Dynamic Attributes which determine Infrastructure Management sessions.
The following message displays when the configured period of time expires:
Connection to the BMC TrueSight Infrastructure Management Server has been lost. This may be due to a network problem or the server may be unavailable. No new data can be obtained and no actions can be performed. If the problem persists, please re-login or contact your administrator.
When the session expires, you must relaunch Infrastructure Management and log on again.
Dynamic Attributes can be configured to suit your requirements.
To reconfigure Dynamic Attributes
- In BMC Atrium SSO 8.0 console
- Log on to the BMC Atrium SSO console.
- Navigate to Configuration > Global > Session > Dynamic Attributes
- Edit the default setting values as required:
- Maximum Session Time — Maximum period of time in minutes, after which a session expires. The default setting is 120 minutes. Accepts a value of 1 or higher.
- Maximum Idle Time — Maximum period of time in minutes, after which an idle session expires. The default setting is 30 minutes. Accepts a value of 1 or higher.
Maximum Caching Time — Maximum interval in minutes, before which cached session information is refreshed. The default setting is 3 minutes. Accepts a value of 0 or higher.
- Active User Sessions — Maximum number of concurrent sessions allowed per user. The default setting is 5 sessions.
- Save and log off the BMC Atrium SSO console.
- Launch Infrastructure Management and log on to the BMC Atrium SSO Login window.
The new configuration will be effective in the next new session.
- In BMC Atrium SSO 8.1 console
- Log on to the BMC Atrium SSO console.
- Click Edit Server Configuration and edit the default setting values as required:
- Maximum Session Time — Maximum period of time in minutes, after which a session expires. The default setting is 120 minutes. Accepts a value of 1 or higher.
- Maximum Idle Time — Maximum period of time in minutes, after which an idle session expires. The default setting is 90 minutes. Accepts a value of 1 or higher.
Maximum Caching Time — Maximum interval in minutes, before which cached session information is refreshed. The default setting is 3 minutes. Accepts a value of 0 or higher.
- Active User Sessions — Maximum number of concurrent sessions allowed per user. The default setting is 5 sessions.
- Save and log off the BMC Atrium SSO console.
- Launch Infrastructure Management and log on to the BMC Atrium SSO Login window.
The new configuration will be effective in the next new session.
Creating new users in BMC Atrium SSO
New users can be created only when you are using the internal LDAP server for authentication. If an external source is used for authentication, new users must be created within that external system.
To create a new user
- In BMC Atrium Single Sign-On 8.0 Admin console
- Sign onto BMC Atrium Single Sign-On.
- Navigate to the User page: Access Control > BmcRealm > Subjects tab > User
- Click New. Each of the fields marked with an asterisk is a required field.
- In the ID field, enter a unique identifier for the new user.
This value is used as the user ID when the user logs in. - Enter the user's last name and full name.
- Enter an initial default password (which the user changes) and confirm this default
password. - In the User Status field, verify that the Active radio button is selected (default).
- Click OK.
The name attributes (First, Full, and Last) can be provided to BMC products to help identify user accounts by using terms that are more user-friendly. The actual use of these attributes, though, is dependent on the BMC product.
- In BMC Atrium Single Sign-On 8.1 Admin console
- Log on to BMC Atrium SSO Admin Console, click Edit BMC Realm.
- Select the User tab.
- Click New.
- In the ID field, enter a unique identifier for the new user.
This value is used as the user ID when the user logs in. - Enter the user's last name and full name.
- Enter the password and confirm this password.
- In the Status field, verify that the Active radio button is selected (default).
- Click Save.
Assigning users to user groups in BMC Atrium SSO
Perform the following steps to assign users to user groups:
- In BMC Atrium Single Sign-On 8.0 Admin console
- In BMC Atrium Single Sign-On, navigate to the Group tab: Access Control > BmcRealm > Subjects tab > Group
- Click on the group name.
- The Edit Group page displays showing the Universal ID details.
- Click the User tab.
- Select users from the list of Available users.
- Click Add.
- Alternatively, you can add all of the users by clicking Add All.
- Click Save to save the changes, Reset to reset to the default or (Back to Subjects* to return to the Group page.
Multiple users can be assigned to a group from the Group page. The membership change is immediately put into effect.
- In BMC Atrium Single Sign-on 8.1 Admin console
- In BMC Atrium Single Sign-On, click Edit BmcRealm and select the Groups tab.
- Select the group name and click Edit.
- Select users from the Available Users list.
- Click Add.
- Alternatively, you can add all of the users by clicking Add All.
- Click Save to save the changes.
Multiple users can be assigned to a group from the Group page. The membership change is immediately put into effect.
Assigning privileges in BMC Atrium SSO
Perform the following steps to assign privileges in BMC Atrium SSO:
- In BMC Atrium SSO, navigate to Access Control > BmcRealm.
- On the Privileges tab, select the group name.
The Group - Properties page is displayed.
- Select the appropriate option from the available privileges, which are listed as follows:
- Read and write access only for policy properties
- Write access to all log files
- Read access to all log files
- Read and write access to all configured Agents
- Read and write access to all realm and policy properties
- Read and write access to all log files
- Click Save.
The privileges are implemented immediately.
Deleting Web Agent entries in BMC Atrium SSO
Perform the following steps to delete Web Agent entries on the BMC Atrium SSO Server when the BMC TrueSight Infrastructure Management Server is uninstalled:
- In BMC Atrium SSO 8.0
- In BMC Atrium Single Sign-On, navigate to Access Control > /Top Level Realm.
- Click the Agents tab.
- Click the J2EE tab.
A list of the Agents that are registered on the Single Sign-On server displays. Identify the two Agents corresponding to your BMC TrueSight Infrastructure Management Server host.
Search for the following patterns:/@<BMC TrueSight Infrastructure Management Server Host>:<Port>
/admin@<Infrastructure ManagementServer Host>:<Port>- Mark the Agents to delete by selecting their corresponding checkboxes.
- Click Delete.
- In BMC Atrium SSO 8.1
- On BMC Atrium Single Sign-On Console, click Edit BMC Realm.
- Click Agents Details.
A list of the Agents that are registered on the Single Sign-On server displays. Identify the two Agents corresponding to your BMC TrueSight Infrastructure Management Server host.
Search for the following patterns:/@<BMC TrueSight Infrastructure Management Server Host>:<Port>
/admin@<Infrastructure ManagementServer Host>:<Port>- Mark the Agents to delete by selecting their corresponding checkboxes.
- Click Delete.
Disabling BMC Atrium SSO integration
You can disable the integration between Infrastructure Management and BMC Atrium Single Sign-on (SSO) integration by using the Infrastructure Management pw CLI command. To disable the BMC Atrium SSO, perform the following steps:
- Run the pw sso config --disable command. For more information about the pw sso config command, see pw-sso-config.
- After the command is executed successfully, run the pw sso load command.
Removing BMC Atrium SSO integration
You can remove the BMC Atrium Single Sign-on (SSO) integration by using the Infrastructure Management pw CLI command. To remove the BMC Atrium SSO, perform the following steps:
- Run the pw sso config --disable command. For more information about the command, see pw-sso-config.
- After the command is executed successfully, run the pw sso load command.
- After the command is executed successfully, run the pw sso unregister command. For more information about the command, see pw-sso-unregister.
Related topic