You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,13 @@ title: Configure ServiceNow for automatic user provisioning with Azure Active Di
3
3
description: Learn how to automatically provision and deprovision user accounts from Azure AD to ServiceNow.
4
4
services: active-directory
5
5
author: twimmers
6
-
manager: CelesteDG
7
-
ms.reviewer: celested
6
+
writer: twimmers
7
+
manager: beatrizd
8
+
ms.assetid: 5f03d8b7-c3a0-443e-91af-99cc3956fa18
8
9
ms.service: active-directory
9
10
ms.subservice: saas-app-tutorial
10
11
ms.workload: identity
11
-
ms.topic: how-to
12
+
ms.topic: tutorial
12
13
ms.date: 3/10/2023
13
14
ms.author: thwimmer
14
15
---
@@ -87,13 +88,13 @@ To configure automatic user provisioning for ServiceNow in Azure AD:
87
88
1. Set **Provisioning Mode** to **Automatic**.
88
89
89
90
1. In the **Admin Credentials** section, enter your ServiceNow tenant URL, Client ID, Client Secret and Authorization Endpoint. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
91
+


1. In the **Notification Email** box, enter the email address of a person or group that should receive the provisioning error notifications. Then select the **Send an email notification when a failure occurs** check box.
0 commit comments