Docs.bmc.com will undergo a brief maintenance outage 27 March 2025. The site will be unavailable for ten minutes starting at 6:30 AM CDT/5 PM IST.

Setting up LDAP or Active Directory users in Remedy SSO


You can configure the Remedy Single Sign-On server to authenticate TrueSight Presentation Server users through an LDAP server. 

The following topics help you to perform the LDAP/AD configuration tasks in Remedy SSO and create an authorization profile in the TrueSight console:

Before you begin

Configuring LDAP or Active Directory users in Remedy SSO

Failed to execute the [excerpt-include] macro. Cause: [Error number 2 in 0: No wiki with id [confluencePage:page] could be found]. Click on this message for details.

To configure local authentication for use with App Visibility Manager

Add local authentication if your system includes integration with App Visibility Manager, Synthetic Monitor, or both.

  1. Log in to the Remedy SSO console as an Admin user.
  2. Click the Realm tab.
  3. Select a tenant (realm) with LDAP authentication.
  4. In the left navigation pane of the Edit Realm page, click Authentication.
  5. Click Enable Chaining Mode.
  6. By the List of Authentications, click Add Authentication.
  7. From the Authentication Type list, select LOCAL.
  8. Click Save to save the authentication type, and click Save to save the chain of authentication.

To create or edit an authorization profile with LDAP users in the Presentation Server

  1. Log in to the TrueSight console as a Super Admin.
  2. Navigate to Administration>Authorization Profiles.
  3. Create a new authorization profile or edit an existing authorization profile to associate the user groups from Active Directory.
  4. Select the tenant that you configured in Remedy Single Sign-On for Active Directory users and select Edit under User Groups
    AuthProfile_LDAP_110.png
  5. Click Add and select the Active Directory user group from the list of user groups.
  6. Select the required roles from the list roles.
  7. (Optional) Select the required objects from the list of object.
  8. Select OK and then Save.
  9. Select Yes to confirm changes to the authorization profile.
  10. Log out of the TrueSight console.
  11. Log in to the TrueSight console as an Active Directory user.
  12. Log in to the Infrastructure Management server as an Administrator and perform the following steps:
    1. Edit the self_collector.mrl file located at /pw/server/etc/<cellname>/kb/collectors/ and add the groups to the permissions that are needed.
      r - Read-only

      w - Write

      x - Execute

    2. Save the self_collector.mrl file.
    3. Recompile the cell using the commands
      mccomp -n <cellname>
      mcontrol -n <cell> restart