You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md
+52-1Lines changed: 52 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ To configure automatic user provisioning for ServiceNow in Azure AD:
84
84
85
85
1. Set **Provisioning Mode** to **Automatic**.
86
86
87
-
1. In the **Admin Credentials** section, enter your ServiceNow admin credentials and username. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. If the connection fails, ensure that your ServiceNow account has admin permissions and try again.
87
+
1. In the **Admin Credentials** section, enter your ServiceNow tenant URL, Client ID, Client Secret and Authorization Endpoint. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
88
88
89
89

90
90
@@ -151,6 +151,57 @@ After you've configured provisioning, use the following resources to monitor you
151
151
152
152
- When an update to the *active* attribute in ServiceNow is provisioned, the attribute *locked_out* is also updated accordingly, even if *locked_out* is not mapped in the Azure provisioning service.
153
153
154
+
## Update a ServiceNow application to use the ServiceNow SCIM 2.0 endpoint
155
+
In March 2023, ServiceNow released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the non-SCIM endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the ServiceNow application, including:
156
+
* Authentication details
157
+
* Scoping filters
158
+
* Custom attribute mappings
159
+
160
+
> [!NOTE]
161
+
> Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
162
+
163
+
1. Sign into the Azure portal at https://portal.azure.com
164
+
2. Navigate to your current ServiceNow app under Azure Active Directory > Enterprise Applications
165
+
3. In the Properties section of your new custom app, copy the Object ID.
166
+
167
+

168
+
169
+
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
170
+
171
+

172
+
173
+
5. Check to make sure the account being used has the correct permissions. The permission “Directory.ReadWrite.All” is required to make this change.
174
+
175
+

176
+
177
+

178
+
179
+
6. Using the ObjectID selected from the app previously, run the following command:
180
+
181
+
```
182
+
GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/
183
+
```
184
+
185
+
7. Taking the "id" value from the response body of the GET request from above, run the command below, replacing "[job-id]" with the id value from the GET request. The value should have the format of "ServiceNowOutDelta.xxxxxxxxxxxxxxx.xxxxxxxxxxxxxxx":
8. In the Graph Explorer, run the command below. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
190
+
```
191
+
POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs { "templateId": "serviceNowScim" }
192
+
```
193
+
194
+

195
+
196
+
9. Return to the first web browser window and select the Provisioning tab for your application. Your configuration will have been reset. You can confirm the upgrade has taken place by confirming the Job ID starts with “serviceNowScim”.
197
+
198
+
10. The new SCIM app uses OAuth2 to authenticate with the SCIM endpoint. Enter the required fields and authenticate with the new SCIM endpoint. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
199
+
200
+
11. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning.
201
+
202
+
> [!NOTE]
203
+
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in Workplace unexpectedly. Be sure to check the configuration before enabling provisioning
204
+
154
205
## Additional resources
155
206
156
207
-[Managing user account provisioning for enterprise apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
0 commit comments