Skip to content

Commit c4d4369

Browse files
authored
Merge pull request #232428 from twimmers/patch-55
Update servicenow-provisioning-tutorial.md
2 parents 64c9213 + bc9fc07 commit c4d4369

File tree

1 file changed

+0
-54
lines changed

1 file changed

+0
-54
lines changed

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 0 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,6 @@ For more information on the Azure AD automatic user provisioning service, see [A
5252
1. Obtain credentials for an admin in ServiceNow. Go to the user profile in ServiceNow and verify that the user has the admin role.
5353

5454
![Screenshot that shows a ServiceNow admin role.](media/servicenow-provisioning-tutorial/servicenow-admin-role.png)
55-
56-
1. Enable the SCIM v2 Plugin using the steps outlined by this [ServiceNow doc](https://docs.servicenow.com/en-US/bundle/utah-platform-security/page/integrate/authentication/task/activate-scim-plugin.html)
57-
5855

5956
## Step 3: Add ServiceNow from the Azure AD application gallery
6057

@@ -152,57 +149,6 @@ After you've configured provisioning, use the following resources to monitor you
152149

153150
- When an update to the *active* attribute in ServiceNow is provisioned, the attribute *locked_out* is also updated accordingly, even if *locked_out* is not mapped in the Azure provisioning service.
154151

155-
## Update a ServiceNow application to use the ServiceNow SCIM 2.0 endpoint
156-
In March 2023, ServiceNow released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the non-SCIM endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the ServiceNow application, including:
157-
* Authentication details
158-
* Scoping filters
159-
* Custom attribute mappings
160-
161-
> [!NOTE]
162-
> Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
163-
164-
1. Sign into the Azure portal at https://portal.azure.com
165-
2. Navigate to your current ServiceNow app under Azure Active Directory > Enterprise Applications
166-
3. In the Properties section of your new custom app, copy the Object ID.
167-
168-
![Screenshot of ServiceNow app in the Azure portal.](./media/servicenow-provisioning-tutorial/app-properties.png)
169-
170-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
171-
172-
![Screenshot of Microsoft Graph explorer sign in page.](./media/workplace-by-facebook-provisioning-tutorial/permissions.png)
173-
174-
5. Check to make sure the account being used has the correct permissions. The permission “Directory.ReadWrite.All” is required to make this change.
175-
176-
![Screenshot of Microsoft Graph settings option.](./media/workplace-by-facebook-provisioning-tutorial/permissions-2.png)
177-
178-
![Screenshot of Microsoft Graph permissions.](./media/workplace-by-facebook-provisioning-tutorial/permissions-3.png)
179-
180-
6. Using the ObjectID selected from the app previously, run the following command:
181-
182-
```
183-
GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/
184-
```
185-
186-
7. Taking the "id" value from the response body of the GET request from above, run the command below, replacing "[job-id]" with the id value from the GET request. The value should have the format of "ServiceNowOutDelta.xxxxxxxxxxxxxxx.xxxxxxxxxxxxxxx":
187-
```
188-
DELETE https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[job-id]
189-
```
190-
8. In the Graph Explorer, run the command below. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
191-
```
192-
POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs { "templateId": "serviceNowScim" }
193-
```
194-
195-
![Screenshot of Microsoft Graph request.](./media/servicenow-provisioning-tutorial/graph-request.png)
196-
197-
9. Return to the first web browser window and select the Provisioning tab for your application. Your configuration will have been reset. You can confirm the upgrade has taken place by confirming the Job ID starts with “serviceNowScim”.
198-
199-
10. The new SCIM app uses OAuth2 to authenticate with the SCIM endpoint. Enter the required fields and authenticate with the new SCIM endpoint. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
200-
201-
11. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning.
202-
203-
> [!NOTE]
204-
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in ServiceNow unexpectedly. Be sure to check the configuration before enabling provisioning
205-
206152
## Additional resources
207153

208154
- [Managing user account provisioning for enterprise apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)

0 commit comments

Comments
 (0)