Adding OpenID Connect and SAML providers
To allow users to authenticate with Helix ALM applications using your organization's identity provider, you need to add an OpenID Connect or SAML provider. The provider information tells the license server how to connect to the Helix Authentication Service, which handles authentication between the identity provider and license server. The provider information also contains the provider user fields to map to license server user fields. Information from the provider fields is returned to the mapped license server user fields when a user successfully authenticates.
1. Click Server Options.
The Server Options dialog box opens.
2. Select OpenID Connect/SAML from the Authentication category.
3. Click Add.
The Add Authentication Provider dialog box opens.
4. Enter a Name for the provider. You can enter up to 64 characters.
5. Enter the URL for the Helix Authentication Service. The URL must start with http:// or https://. You can enter up to 2048 characters.
If you enter an HTTPS URL, you must specify the Client certificate file and Client private key file locations in the Server Options dialog box. See Configuring OpenID Connect and SAML providers. If you do not know the URL, contact your security administrator who configured the authentication service.
6. Select the provider Type.
7. Click Edit to map license server user fields to the authentication provider fields. See Mapping Active Directory and LDAP attributes.
The Username field must be mapped. When a user authenticates, the Username field in the user record on the license server is compared to the value in the mapped authentication provider field. If the values do not match, authentication fails.
8. Click Test Connection to test the connection to the authentication provider.
If the connection is not successful, correct any errors and retest it.
9. Click
The provider is added.