You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md
-54Lines changed: 0 additions & 54 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,9 +52,6 @@ For more information on the Azure AD automatic user provisioning service, see [A
52
52
1. Obtain credentials for an admin in ServiceNow. Go to the user profile in ServiceNow and verify that the user has the admin role.
53
53
54
54

55
-
56
-
1. Enable the SCIM v2 Plugin using the steps outlined by this [ServiceNow doc](https://docs.servicenow.com/en-US/bundle/utah-platform-security/page/integrate/authentication/task/activate-scim-plugin.html)
57
-
58
55
59
56
## Step 3: Add ServiceNow from the Azure AD application gallery
60
57
@@ -152,57 +149,6 @@ After you've configured provisioning, use the following resources to monitor you
152
149
153
150
- When an update to the *active* attribute in ServiceNow is provisioned, the attribute *locked_out* is also updated accordingly, even if *locked_out* is not mapped in the Azure provisioning service.
154
151
155
-
## Update a ServiceNow application to use the ServiceNow SCIM 2.0 endpoint
156
-
In March 2023, ServiceNow released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the non-SCIM endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the ServiceNow application, including:
157
-
* Authentication details
158
-
* Scoping filters
159
-
* Custom attribute mappings
160
-
161
-
> [!NOTE]
162
-
> Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
163
-
164
-
1. Sign into the Azure portal at https://portal.azure.com
165
-
2. Navigate to your current ServiceNow app under Azure Active Directory > Enterprise Applications
166
-
3. In the Properties section of your new custom app, copy the Object ID.
167
-
168
-

169
-
170
-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
171
-
172
-

173
-
174
-
5. Check to make sure the account being used has the correct permissions. The permission “Directory.ReadWrite.All” is required to make this change.
175
-
176
-

177
-
178
-

179
-
180
-
6. Using the ObjectID selected from the app previously, run the following command:
181
-
182
-
```
183
-
GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/
184
-
```
185
-
186
-
7. Taking the "id" value from the response body of the GET request from above, run the command below, replacing "[job-id]" with the id value from the GET request. The value should have the format of "ServiceNowOutDelta.xxxxxxxxxxxxxxx.xxxxxxxxxxxxxxx":
8. In the Graph Explorer, run the command below. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
191
-
```
192
-
POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs { "templateId": "serviceNowScim" }
193
-
```
194
-
195
-

196
-
197
-
9. Return to the first web browser window and select the Provisioning tab for your application. Your configuration will have been reset. You can confirm the upgrade has taken place by confirming the Job ID starts with “serviceNowScim”.
198
-
199
-
10. The new SCIM app uses OAuth2 to authenticate with the SCIM endpoint. Enter the required fields and authenticate with the new SCIM endpoint. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
200
-
201
-
11. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning.
202
-
203
-
> [!NOTE]
204
-
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in ServiceNow unexpectedly. Be sure to check the configuration before enabling provisioning
205
-
206
152
## Additional resources
207
153
208
154
-[Managing user account provisioning for enterprise apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
0 commit comments