Skip to content

Commit 1f4a717

Browse files
Merge pull request #230120 from twimmers/patch-49
Update servicenow-provisioning-tutorial.md
2 parents e6ff791 + ead14fe commit 1f4a717

File tree

1 file changed

+52
-1
lines changed

1 file changed

+52
-1
lines changed

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ To configure automatic user provisioning for ServiceNow in Azure AD:
8484

8585
1. Set **Provisioning Mode** to **Automatic**.
8686

87-
1. In the **Admin Credentials** section, enter your ServiceNow admin credentials and username. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. If the connection fails, ensure that your ServiceNow account has admin permissions and try again.
87+
1. In the **Admin Credentials** section, enter your ServiceNow tenant URL, Client ID, Client Secret and Authorization Endpoint. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
8888

8989
![Screenshot that shows the Service Provisioning page, where you can enter admin credentials.](./media/servicenow-provisioning-tutorial/servicenow-provisioning.png)
9090

@@ -151,6 +151,57 @@ After you've configured provisioning, use the following resources to monitor you
151151

152152
- When an update to the *active* attribute in ServiceNow is provisioned, the attribute *locked_out* is also updated accordingly, even if *locked_out* is not mapped in the Azure provisioning service.
153153

154+
## Update a ServiceNow application to use the ServiceNow SCIM 2.0 endpoint
155+
In March 2023, ServiceNow released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the non-SCIM endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the ServiceNow application, including:
156+
* Authentication details
157+
* Scoping filters
158+
* Custom attribute mappings
159+
160+
> [!NOTE]
161+
> Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
162+
163+
1. Sign into the Azure portal at https://portal.azure.com
164+
2. Navigate to your current ServiceNow app under Azure Active Directory > Enterprise Applications
165+
3. In the Properties section of your new custom app, copy the Object ID.
166+
167+
![Screenshot of ServiceNow app in the Azure portal.](./media/servicenow-provisioning-tutorial/app-properties.png)
168+
169+
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
170+
171+
![Screenshot of Microsoft Graph explorer sign in page.](./media/workplace-by-facebook-provisioning-tutorial/permissions.png)
172+
173+
5. Check to make sure the account being used has the correct permissions. The permission “Directory.ReadWrite.All” is required to make this change.
174+
175+
![Screenshot of Microsoft Graph settings option.](./media/workplace-by-facebook-provisioning-tutorial/permissions-2.png)
176+
177+
![Screenshot of Microsoft Graph permissions.](./media/workplace-by-facebook-provisioning-tutorial/permissions-3.png)
178+
179+
6. Using the ObjectID selected from the app previously, run the following command:
180+
181+
```
182+
GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/
183+
```
184+
185+
7. Taking the "id" value from the response body of the GET request from above, run the command below, replacing "[job-id]" with the id value from the GET request. The value should have the format of "ServiceNowOutDelta.xxxxxxxxxxxxxxx.xxxxxxxxxxxxxxx":
186+
```
187+
DELETE https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[job-id]
188+
```
189+
8. In the Graph Explorer, run the command below. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
190+
```
191+
POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs { "templateId": "serviceNowScim" }
192+
```
193+
194+
![Screenshot of Microsoft Graph request.](./media/servicenow-provisioning-tutorial/graph-request.png)
195+
196+
9. Return to the first web browser window and select the Provisioning tab for your application. Your configuration will have been reset. You can confirm the upgrade has taken place by confirming the Job ID starts with “serviceNowScim”.
197+
198+
10. The new SCIM app uses OAuth2 to authenticate with the SCIM endpoint. Enter the required fields and authenticate with the new SCIM endpoint. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
199+
200+
11. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning.
201+
202+
> [!NOTE]
203+
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in Workplace unexpectedly. Be sure to check the configuration before enabling provisioning
204+
154205
## Additional resources
155206

156207
- [Managing user account provisioning for enterprise apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)

0 commit comments

Comments
 (0)