Administer > System Security > SAML Single Sign-On > SAML Single Sign-On setup > Configure IdM authentication in SRC

Configure IdM authentication in SRC

You only need to update the WEB-INF/classes/applicationContext.properties file to enable HPE Identity Manager (IdM) authentication in Service Request Catalog (SRC).

To enable IdM authentication in SRC, follow these steps:

  1. Stop the Tomcat instance on which SRC is deployed.
  2. Open the WEB-INF/web.xml file in a text editor, and make sure the LW-SSO filter mapping and filter are commented out as shown below.

    Note You must not enable both SAML SSO and LW-SSO for Service Manager. This step will disable LW-SSO for SRC.

    <!--
      <filter-mapping>
        <filter-name>LWSSO</filter-name>
        <url-pattern>/*</url-pattern>
      </filter-mapping>
    -->
    
    
    <!--
      <filter>
        <filter-name>LWSSO</filter-name>
        <filter-class>com.hp.sw.bto.ast.security.lwsso.LWSSOFilter</filter-class>
      </filter>
    -->
  3. Open the WEB-INF/classes/lwssofmconf.xml file in a text editor, and set the enableLWSSOFramework paramter to false (default: true), as shown below:

    <enableLWSSO enableLWSSOFramework="false"
  4. Open the WEB-INF/classes/applicationContext.properties file in a text editor, and specify the following parameters.

    Tip For more information about IdM parameters, see Install and configure the HPE Identity Manager service.

    Parameter Default Description
    src.security.mode default

    Specifies the authentication mode for SRC.

    To enable IdM SSO, set this parameter to idm.

    src.security.ssoEnabled false

    Indicates whether SSO is enabled for SRC. To enable IdM SSO, set this parameter to true.

    Note You need to further configure the idm.* parameters to enable IdM SSO.

    idm.tenant N/A

    The IDM tenant in which all Service Manager user accounts will reside. This parameter value must match the tenant configured on the IdM service side.

    idm.token.signingKey N/A

    This is the key used to sign IdM tokens. This parameter value must match the idm.encryptedSigningKey parameter value in the WEB-INF/spring/applicationContext.properties file of the IdM service.

    idm.endpoint N/A

    This is the absolute URL of the IdM service. For example: https://localhost:8443/idm-service.

    idm.http.user

    idm.http.password

    N/A

    This is the user account used to access the IdM service.

    These parameter values must match the values of the integrationAcctUserName property and integrationAcctPassword property that are specified in the WEB-INF/spring/applicationContext.xml file of the IdM service.

    idm.ssl.trustAll false Indicates whether to verify that the IdM server certificate is trusted. To verify the IdM server certificate, keep the default value (false).

    idm.truststore

    idm.truststore.password

    N/A

    This is the IdM client trust store and password. The IdM client uses this file to validate the IdM server certificate. For more information, see Create an IdM client trust store.

    Note You must specify these two parameters if the idm.ssl.trustAll parameter is set to false.

    The following is an example.

    src.security.mode=idm
    src.security.ssoEnabled=true
    idm.tenant=Provider
    idm.token.signingKey=awscd456!
    idm.endpoint=https://localhost:8443/idm-service
    idm.http.user=idmTransportUser
    idm.http.password=idmTransportUser
    idm.ssl.trustAll=false
    idm.truststore=C:\\cert\\trustStore.keystore
    idm.truststore.password=tomcat1
  5. Restart the SRC Tomcat.

    Note Once the SRC Tomcat is restarted, the idm.http.password and idm.truststore.password parameter values are automatically encrypted. If you need to update these values later, remember to remove the asterisk symbol (*) before the parameter names.