Manually integrating BMC Helix Single Sign-On with Jetty server


An administrator can manually integrate BMC Helix Single Sign-On with the Jetty server. Manual integration is required when:

  • You are using BMC Helix Single Sign-On version 19.05 or earlier.
  • The BMC Helix Single Sign-On installation fails. 

By default, the Action Request System and Jetty server are installed on the same computer.

Before you begin

  • Make sure the BMC Helix Single Sign-On server is up and running.
  • Extract the BMC Helix Single Sign-On installer on a Jetty server. 

To manually integrate SSO with Jetty server

  1. Stop the Action Request System.
  2.  In the ar.cfg file located in the ARSystemInstallationDirectory/conf folder, add the following lines:

    Server-Plugin-Alias:
    AREA AREA 127.0.0.1:9999
    External-Authentication-RPC-Socket:390695
    Authentication-Chaining-Mode:2
    Use-Password-File:T
    Crossref-Blank-Password:F
    Allow-Guest-Users: F
  3. In the rsso.cfg file, located in the RSSODistr/BMCRemedySSO/Disk1/files/rsso-area-plugin/rsso.cfg folder, perform the following steps:
    1. Define the BMC Helix Single Sign-On server URL. Add the domain name registered with the BMC Helix Single Sign-On server along with the server name. 
      SSO-SERVICE-URL: http://RSSOServerName:Port/rsso
      For example, RSSOServerName.domain.com 
    2. Copy the modified rsso.cfg file to the ARSystemInstallationDirectory/conf folder.
  4. Add the rsso-agent.properties  file, file and move the rsso-agent.properties file to the ARSystem/Conf folder.
    1. Set the BMC Helix Single Sign-On properties as shown in the following example.
      Before setting the properties, ensure that the domain name you are using in the URL is registered with the BMC Helix Single Sign-On server.

      agent-id=midtier_agent
      sso-external-url=http://<RSSOServerName.domain name>:<RSSOServerPort>/rsso
      sso-service-url=http://<RSSOServerName.domain name>:<RSSOServerPort>/rsso
      logout-urls=/api/rsso-logout
  5. Perform the following steps to add the rsso-log.cfg  file and move it to the AR_SERVER_HOME/conf folder:
    1. In the rsso-log.cfg file, update the required information (for example, log directory and log level).
    2. Copy the modified rsso-log.cfg  file  to the AR_SERVER_HOME/conf folder.
  6. Perform the following steps to update the pluginsvr_config.xml file located in the AR_SERVER_HOME/pluginsvr folder:
    1. Comment the following plug-ins (if they exist):

      ARSYS.ARF.ATSSOCONFIRMPWD
      ARSYS.AREA.ATRIUMSSO
    2. Add the following plug-ins:

      <plugin>   
      <name>ARSYS.AREA.RSSO</name>
         <classname>com.bmc.rsso.plugin.area.RSSOPlugin</classname>
         <pathelement
      type="location"><AR_SERVER_HOME>/pluginsvr/rsso-area-plugin-all.jar</pathelement>
         <pathelement
      type="location"><AR_SERVER_HOME>/pluginsvr/gson-2.3.1.jar</pathelement>
         <userDefined>       
      <configFile><AR_SERVER_HOME>/conf/rsso.cfg</configFile>   
      </userDefined>
      </plugin>

      Make sure that the version of the gson-2.3.1.jar file is compatible with the BMC Helix Single Sign-On version installed.

  7.  To update the arserverd.config file located in the ARSystemInstallationDirectory\bin folder, add the following line after  JVM.Option.NN parameters, where NN is the next number in the file. 
    For example, if the file contains the last number as 22, NN is 23. 

    jvm.option.23=-Drsso.log.cfg.file=<AR_SERVER_HOME>/conf/rsso-log.cfg
  8. Copy the following JAR files:

    File name

    From location

    To location

    rsso-area-plugin-all.jar

    RSSODistr/BMCRemedySSO/Disk1/files/rsso-area-plugin/rsso-area-plugin-all.jar

    AR_SERVER_HOME/pluginsvr

    gson-2.3.1.jar

    RSSODistr/BMCRemedySSO/Disk1/files/lib/gson-2.3.1.jar

    AR_SERVER_HOME/pluginsvr

    rsso-agent-osgi.jar

    RSSODistr/BMCRemedySSO/Disk1/files/rsso-agent/rsso-agent-osgi.jar

    AR_SERVER_HOME/deploy

  9. Start the Action Request System.
    BMC Helix Single Sign-On
    is integrated with the Jetty server.

When the manual integration is complete, on the BMC Helix Single Sign-On server, add a new realm for every tenant. See the following screenshot to learn where to configure a realm:

22_1_single_sign_on_realm.png
For more information, see Action Request System in BMC Helix Single Sign-On online documentation.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*