Skip to content

Commit daec4f1

Browse files
authored
Merge pull request #108957 from v-nagta/servicenowv1
Product Backlog Item 901469: SaaS App Tutorial: ServiceNow Update
2 parents da252ab + 47cb44f commit daec4f1

File tree

3 files changed

+40
-16
lines changed

3 files changed

+40
-16
lines changed
11.4 KB
Loading
67.8 KB
Loading

articles/active-directory/saas-apps/servicenow-tutorial.md

Lines changed: 40 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/31/2020
16+
ms.date: 03/25/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -49,7 +49,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4949

5050
* ServiceNow supports [Automated user provisioning](servicenow-provisioning-tutorial.md).
5151

52-
* Once you configure ServiceNow you can enforce Session Control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session Control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
52+
* Once you configure the ServiceNow you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
5353

5454
* You can configure the ServiceNow Classic (Mobile) application with Azure AD for enabling SSO. It supports both Android and iOS users. In this tutorial, you configure and test Azure AD SSO in a test environment.
5555

@@ -90,14 +90,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9090

9191
![Screenshot of Set up Single Sign-On with SAML page, with pen icon highlighted](common/edit-urls.png)
9292

93-
4. In the **Basic SAML Configuration** section, perform the following steps:
93+
1. In the **Basic SAML Configuration** section, perform the following steps:
9494

9595
a. In **Sign on URL**, enter a URL that uses the following pattern:
96-
`https://<instance-name>.service-now.com/navpage.do`
96+
`https://instance.service-now.com/login_with_sso.do?glide_sso_id=<sys_id of the sso configuration>`
9797

9898
b. In **Identifier (Entity ID)**, enter a URL that uses the following pattern:
9999
`https://<instance-name>.service-now.com`
100100

101+
c. For **Reply URL**, enter one of the following URL:
102+
103+
|||
104+
|-|-|
105+
| `https://instancename.service-now.com/navpage.do` |
106+
| `https://instancename.service-now.com/customer.do` |
107+
101108
> [!NOTE]
102109
> These values aren't real. You need to update these values with the actual sign-on URL and identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
103110

@@ -160,11 +167,18 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
160167
4. In the **Basic SAML Configuration** section, perform the following steps:
161168

162169
a. For **Sign on URL**, enter a URL that uses the following pattern:
163-
`https://<instance-name>.service-now.com/navpage.do`
170+
`https://instance.service-now.com/login_with_sso.do?glide_sso_id=<sys_id of the sso configuration>`
164171

165172
b. For **Identifier (Entity ID)**, enter a URL that uses the following pattern:
166173
`https://<instance-name>.service-now.com`
167174

175+
c. For **Reply URL**, enter one of the following URL:
176+
177+
|||
178+
|-|-|
179+
| `https://instancename.service-now.com/navpage.do` |
180+
| `https://instancename.service-now.com/customer.do` |
181+
168182
> [!NOTE]
169183
> These values aren't real. You need to update these values with the actual sign-on URL and identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
170184

@@ -184,7 +198,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184198

185199
1. Sign on to your ServiceNow application as an administrator.
186200

187-
2. Activate the **Integration - Multiple Provider single sign-on Installer** plug-in by following these steps:
201+
1. Activate the **Integration - Multiple Provider single sign-on Installer** plug-in by following these steps:
188202

189203
a. In the left pane, search for the **System Definition** section from the search box, and then select **Plugins**.
190204

@@ -202,11 +216,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
202216

203217
![Screenshot of Activate Plugin dialog box, with Activate highlighted](./media/servicenow-tutorial/tutorial_activate1.png "Activate plugin")
204218

205-
3. In the left pane, search for the **Multi-Provider SSO** section from the search bar, and then select **Properties**.
219+
1. In the left pane, search for the **Multi-Provider SSO** section from the search bar, and then select **Properties**.
206220

207221
![Screenshot of Multi-Provider SSO section, with Multi-Provider SSO and Properties highlighted](./media/servicenow-tutorial/tutorial_servicenow_06.png "Configure app URL")
208222

209-
4. In the **Multiple Provider SSO Properties** dialog box, perform the following steps:
223+
1. In the **Multiple Provider SSO Properties** dialog box, perform the following steps:
210224

211225
![Screenshot of Multiple Provider SSO Properties dialog box](./media/servicenow-tutorial/ic7694981.png "Configure app URL")
212226

@@ -216,11 +230,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
216230

217231
* For **Enable debug logging for the multiple provider SSO integration**, select **Yes**.
218232

219-
* For **The field on the user table that...**, enter **user_name**.
233+
* For **The field on the user table that...**, enter **email**.
220234

221235
* Select **Save**.
222236

223-
6. You can configure ServiceNow automatically or manually. To configure ServiceNow automatically, follow these steps:
237+
1. You can configure ServiceNow automatically or manually. To configure ServiceNow automatically, follow these steps:
224238

225239
1. Return to the **ServiceNow** single sign-on page in the Azure portal.
226240

@@ -275,11 +289,16 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
275289

276290
![Screenshot of page, with Test Connection highlighted](./media/servicenow-tutorial/tutorial_activate2.png "Activate plugin")
277291

292+
> [!NOTE]
293+
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
294+
295+
> ![Screenshot of Test Results page](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
296+
278297
1. When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
279298

280299
![Screenshot of Test Results page](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
281300

282-
6. To configure **ServiceNow** manually, follow these steps:
301+
1. To configure **ServiceNow** manually, follow these steps:
283302

284303
1. Sign on to your ServiceNow application as an administrator.
285304

@@ -320,13 +339,18 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
320339

321340
* Confirm that **NameID Policy** is set to `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` value.
322341

323-
* Select **Advanced**. In **User Field**, enter **email** or **user_name**, depending on which field is used to uniquely identify users in your ServiceNow deployment.
342+
* Select **Advanced**. In **User Field**, enter **email**.
324343

325344
> [!NOTE]
326345
> You can configure Azure AD to emit either the Azure AD user ID (user principal name) or the email address as the unique identifier in the SAML token. Do this by going to the **ServiceNow** > **Attributes** > **Single sign-on** section of the Azure portal, and mapping the desired field to the **nameidentifier** attribute. The value stored for the selected attribute in Azure AD (for example, user principal name) must match the value stored in ServiceNow for the entered field (for example, user_name).
327346

328347
* Select **Test Connection** at the upper-right corner of the page.
329348

349+
> [!NOTE]
350+
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
351+
352+
> ![Screenshot of Test Results page](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
353+
330354
* When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
331355

332356
![Screenshot of Test Results page](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
@@ -421,7 +445,7 @@ The objective of this section is to create a user called B.Simon in ServiceNow.
421445

422446
d. For **Clock Skew**, enter **60**.
423447

424-
e. For **User Field**, enter **email** or **user_name**, depending on which field is used to uniquely identify users in your ServiceNow deployment.
448+
e. For **User Field**, enter **email**.
425449

426450
> [!NOTE]
427451
> You can configure Azure AD to emit either the Azure AD user ID (user principal name) or the email address as the unique identifier in the SAML token. Do this by going to the **ServiceNow** > **Attributes** > **Single sign-on** section of the Azure portal, and mapping the desired field to the **nameidentifier** attribute. The value stored for the selected attribute in Azure AD (for example, user principal name) must match the value stored in ServiceNow for the entered field (for example, user_name).
@@ -451,7 +475,7 @@ When you select the ServiceNow tile in the Access Panel, you should be automatic
451475
* Enter **Username**, like [email protected].
452476

453477
* Select **USE EXTERNAL LOGIN**. You're redirected to the Azure AD page for sign-in.
454-
478+
455479
* Enter your credentials. If there is any third-party authentication, or any other security feature enabled, the user must respond accordingly. The application **Home page** appears.
456480

457481
![Screenshot of the application home page](./media/servicenow-tutorial/test02.png)
@@ -468,6 +492,6 @@ When you select the ServiceNow tile in the Access Panel, you should be automatic
468492

469493
- [Try ServiceNow with Azure AD](https://aad.portal.azure.com)
470494

471-
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
495+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/protect-servicenow)
472496

473-
- [How to protect ServiceNow with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/protect-servicenow)
497+
- [How to protect ServiceNow with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)