Configure IdM authentication in SRC

You only need to update the WEB-INF/classes/applicationContext.properties file to enable Micro Focus Identity Manager (IdM) authentication in Service Request Catalog (SRC).

To enable IdM authentication in SRC, follow these steps:

  1. Stop the Tomcat instance on which SRC is deployed.
  2. Open the WEB-INF/web.xml file in a text editor, and make sure the LW-SSO filter mapping and filter are commented out as shown below.

    Note You must not enable both SAML SSO and LW-SSO for Service Manager. This step will disable LW-SSO for SRC.

    <!--
      <filter-mapping>
        <filter-name>LWSSO</filter-name>
        <url-pattern>/*</url-pattern>
      </filter-mapping>
    -->
    
    
    <!--
      <filter>
        <filter-name>LWSSO</filter-name>
        <filter-class>com.hp.sw.bto.ast.security.lwsso.LWSSOFilter</filter-class>
      </filter>
    -->
  3. Open the WEB-INF/classes/lwssofmconf.xml file in a text editor, and set the enableLWSSOFramework paramter to false (default: true), as shown below:

    <enableLWSSO enableLWSSOFramework="false"
  4. Open the WEB-INF/classes/applicationContext.properties file in a text editor, and specify the following parameters.

    Tip For more information about IdM parameters, see Install and configure the standalone IdM service.

    Parameter Default Description
    src.security.mode default

    Specifies the authentication mode for SRC.

    To enable IdM SSO, set this parameter to idm.

    src.security.ssoEnabled false

    Indicates whether SSO is enabled for SRC. To enable IdM SSO, set this parameter to true.

    Note You need to further configure the idm.* parameters to enable IdM SSO.

    idm.tenant N/A

    The IDM tenant in which all Service Manager user accounts will reside. This parameter value must match the tenant configured on the IdM service side:

    • For the standalone IdM, you can find the tenant configuration in Install and configure the standalone IdM service;
    • For the Service Manager Service Portal IdM, the tenant is the name of the organization configured for Service Manager (which you can find from the Identity application).
    idm.token.signingKey N/A

    This is the key used to sign IdM tokens. This parameter value must match the idm.encryptedSigningKey parameter value in the WEB-INF/spring/applicationContext.properties file of the IdM service.

    idm.endpoint N/A

    This is the absolute URL of the IdM service. For example: https://localhost:8443/idm-service.

    idm.http.user

    idm.http.password

    N/A

    This is the user account used to access the IdM service.

    These parameter values must match the values of the integrationAcctUserName property and integrationAcctPassword property that are specified in the WEB-INF/spring/applicationContext.xml file of the IdM service.

    idm.ssl.trustAll false Indicates whether to verify that the IdM server certificate is trusted. To verify the IdM server certificate, keep the default value (false).

    idm.truststore

    idm.truststore.password

    N/A

    This is the IdM client trust store and password. The IdM client uses this file to validate the IdM server certificate. For more information, see (Optional) Create an IdM client trust store.

    Note You must specify these two parameters if the idm.ssl.trustAll parameter is set to false.

    idm.returnUri N/A

    The absolute URL of the SRC client to which the IdM service will return after successful authentication. It must not contain the servlet path (*.do).

    Example: https://www.example.com/src-9.x

    Note Normally, this parameter is not required. Only when the SRC application server is deployed behind a web server or proxy, if SRC cannot get the host name and port of the web server or proxy, or if the SRC context path is mapped to a different URI in the web server or proxy, you must set this parameter.

    The following is an example.

    src.security.mode=idm
    src.security.ssoEnabled=true
    idm.tenant=Provider
    idm.token.signingKey=awscd456!
    idm.endpoint=https://localhost:8443/idm-service
    idm.http.user=idmTransportUser
    idm.http.password=idmTransportUser
    idm.ssl.trustAll=false
    idm.truststore=C:\\cert\\trustStore.keystore
    idm.truststore.password=tomcat1
  5. Restart the SRC Tomcat.

    Note Once the SRC Tomcat is restarted, the idm.http.password and idm.truststore.password parameter values are automatically encrypted. If you need to update these values later, remember to remove the asterisk symbol (*) before the parameter names.

Related topics

SAML Single Sign-On