Integrating BMC Helix Service Management with the CyberArk vault


The deployment of BMC Helix Service Management includes service and internal accounts other than the end-user accounts, each configured in different locations. To enhance security, you can integrate BMC Service Management with a CyberArk vault. The vault serves as a secure digital repository for storing sensitive information, particularly privileged account credentials and secrets.

You can manage the passwords for the following account types by using the CyberArk vault:

  • Service accounts—These accounts are used for integration between the components, such as hannah_admin user.
  • Internal accounts—These accounts are used to connect to the external systems, such as database users, Elasticsearch users, and Openfire users.

By maintaining these account passwords in the vault, you can easily update or rotate them. Whenever you make changes to the passwords in the vault, your on-premises environment will automatically use the new passwords.

BMC Helix Service Management creates a master secret file ar_global_secret to set up the global secret. The global secret contains all the secrets utilized during the BMC Helix Service Management deployment. The HELIX_ONPREM_DEPLOYMENT pipeline retrieves these secrets from the global secret. Additionally, the pipeline deploys a controller responsible for updating the global secret when any changes occur in the CyberArk vault.

Only password updates performed in the vault are synchronized with the BMC Helix Service Management environment. Modifications to usernames are not supported and will not be reflected.

Before you begin

Install a CyberArk vault to manage the service account and internal account user passwords.

To integrate BMC Helix Service Management with the CyberArk vault

  1. To integrate BMC Helix Service Management with the CyberArk vault, see Integrations in the CyberArk documentation.
  2. While installing or upgrading BMC Helix Service Management, in the the HELIX_ONPREM_DEPLOYMENT pipeline, select the EXTERNAL_VAULT check box.
    See Performing the BMC Helix Service Management installation.

Considerations for updating passwords in the CyberArk vault

While updating the passwords in the CyberArk vault, consider the following points:

  • Do not update the passwords in the CyberArk vault during pod restarts.
  • When you update a password for any account, make sure that you update the corresponding application password.
    For example, if you update the password for the Mid Tier service, make sure you update the password for the Mid Tier application.

Components that require a restart after a password change

The following table list the BMC Helix Service Management components that require a restart after you change or rotate the component password in the CyberArk vault:

Component passwordParameterPods/Plug-ins to restart
BMC Helix Innovation Suite user passwordAR_DB_PASSWORDPlatform, Smart IT, DWP
Smart Reporting database passwordAR_SR_DB_PASSWORD Platform Smart Reporting, Smart Reporting
Atrium administrator passwordATWS_AR_PASSWORDAtrium plug-in
UDDI database administrator user passwordATWS_UDDI_ADMIN_PASSWORDAtrium plug-in
UDDI database user passwordATWS_UDDI_DB_PASSWORDAtrium plug-in
BMC Digital Workplace tenant administrator passwordDWP_TENANT_ADMIN_PASSWORDBMC Digital Workplace, BMC HelixGPT
BMC Digital Workplace Catalog tenant administrator passwordDWPC_TENANT_ADMIN_PASSWORDBMC Digital Workplace
BMC Helix Digital Workplace user passwordDWP_AR_PASSWORDBMC Digital Workplace
BMC Helix Digital Workplace subtenant administrator user passwordDWP_SUBTENANT_ADMIN_PASSWORDBMC Digital Workplace
BMC Digital Workplace API keyDWP_API_KEYBMC Digital Workplace
BMC Digital Workplace API secretDWP_API_SECRETBMC Digital Workplace
Application service passwordAR_RAS_PASSWORDSmart IT, Mid Tier, plug-ins, platform, Secret Controller
DSO user passwordAR_DSO_PASSWORDMid Tier, Platform
Mid Tier service passwordAR_MIDTIER_SERVICE_PASSWORDMid Tier, Platform
CACERTS SSL trust store passwordCACERTS_PASSWORDRestart all pods except the BMC HelixGPT pods
Smart IT chat server administrator passwordSMARIT_CHAT_ADMIN_PASSWORDSmart IT
Openfire administrator passwordOPENFIRE_ADMIN_PASSWORDOpenfire, Smart IT
OpenSearch user passwordGPT_OS_PASSWORDBMC HelixGPT
Elasticsearch user passwordAR_FTS_ES_PASSWORDPlatform
BMC Live Chat user passwordVC_AR_PASSWORDBMC Live Chat plug-in server
BMC Live Chat RKM user passwordVC_RKM_PASSWORDBMC Live Chat plug-in server
DataConnect Engine source rest passwordDCE_REST_PASSWORDDataConnect Engine

Use the HELIX_RESTART pipeline to restart the components. The pipeline restarts the platform first, followed by the applications such as Mid Tier, Smart IT, and so on. For information about how to restart components, see the To restart application pods section in Performing the BMC Helix Service Management installation topic.

Components that do not require a restart after a password change

The following table list the BMC Helix Service Management components that do not require a restart after you change or rotate the component password in the CyberArk vault:

Component passwordParameterPods/Plug-ins to restart
BMC Helix Innovation Suite database administrator passwordDB_ADMIN_PASSWORDNA
AR System server administrator user passwordSCCM_AR_PASSWORDNA
BMC Helix Client Management and CMDB integration user passwordBCM_AR_PASSWORDNA
BMC Helix Client Management and CMDB database integration user passwordBCM_DB_PASSWORDNA
ODBC passwordODBC_PASSWORDNA
BMC Helix Digital Workplace Config Business Workflows system user passwordDWP_BWF_SYSTEM_PASSWORDNA
BMC Digital Workplace Catalog connector passwordDWPC_PLATFORM_CONNECTOR_PASSWORDNA
SBE system user passwordDWP_SBE_SYSTEM_PASSWORDNA
HKM activation user passwordHKM_ACTIVATION_PASSWORDNA
KAFKA user passwordAR_MESSAGING_PASSWORDNA
KAFKA administrator user passwordAR_MESSAGING_ADMIN_PASSWORDNA
Integration service user passwordINTS_PASSWORDNA
Integration server database user passwordSCCM_DB_PASSWORDNA
Summarization service user passwordSUMMARIZATION_SERVICE_PASSWORDNA
Data streaming super user passwordDATA_STREAMING_SU_PASSWORDNA
Telemetry administrator user passwordTELEMETRY_ADMIN_PASSWORDNA

To verify the password updates

  1. Verify that the platform and application component pods are running by using the following command:
    kubectl get pod -n <BMC Helix Innovation Suite namespace>
  2. In the AR System:ESO_Audit audit form, verify that the component password update is reflected.
    For information about how to preview the form, see Previewing form updates in BMC Helix Innovation Suite documentation.
  3. To check the global secrets, run the following commands:
    kubectl get secret ar-global-secret  -n <BMC Helix Innovation Suite namespace>

    kubectl describe secret ar-global-secret  -n <BMC Helix Innovation Suite namespace>
  4. To view controller logs, perform the following steps:
    1. Check for the controller pod name by using the following command:kubectl get pods -n <BMC Helix Innovation Suite namespace>

       

    2. Connect to the controller pod by using the following command:
      kubectl exec -it <controller pod name> -n <BMC Helix Innovation Suite namespace>

      Example:

       kubectl exec -it secret-controller-85bdbfdcb4-nqj86 -n <BMC Helix Innovation Suite namespace>
    3. Navigate to the logs folder by using the following command:cd bin/logs

       

    4. View the logs by using the following command:vi secretcontroller.log

       

Where to go from here

Performing the BMC Helix Service Management installation

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*