You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -49,7 +49,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
49
49
50
50
* ServiceNow supports [Automated user provisioning](servicenow-provisioning-tutorial.md).
51
51
52
-
* Once you configure ServiceNow you can enforce Session Control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session Control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
52
+
* Once you configure the ServiceNow you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
53
53
54
54
* You can configure the ServiceNow Classic (Mobile) application with Azure AD for enabling SSO. It supports both Android and iOS users. In this tutorial, you configure and test Azure AD SSO in a test environment.
55
55
@@ -90,14 +90,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
90
90
91
91

92
92
93
-
4. In the **Basic SAML Configuration** section, perform the following steps:
93
+
1. In the **Basic SAML Configuration** section, perform the following steps:
94
94
95
95
a. In **Sign on URL**, enter a URL that uses the following pattern:
> These values aren't real. You need to update these values with the actual sign-on URL and identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
103
110
@@ -160,11 +167,18 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
160
167
4. In the **Basic SAML Configuration** section, perform the following steps:
161
168
162
169
a. For **Sign on URL**, enter a URL that uses the following pattern:
> These values aren't real. You need to update these values with the actual sign-on URL and identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
170
184
@@ -184,7 +198,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184
198
185
199
1. Sign on to your ServiceNow application as an administrator.
186
200
187
-
2. Activate the **Integration - Multiple Provider single sign-on Installer** plug-in by following these steps:
201
+
1. Activate the **Integration - Multiple Provider single sign-on Installer** plug-in by following these steps:
188
202
189
203
a. In the left pane, search for the **System Definition** section from the search box, and then select **Plugins**.
190
204
@@ -202,11 +216,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
202
216
203
217

204
218
205
-
3. In the left pane, search for the **Multi-Provider SSO** section from the search bar, and then select **Properties**.
219
+
1. In the left pane, search for the **Multi-Provider SSO** section from the search bar, and then select **Properties**.
206
220
207
221

208
222
209
-
4. In the **Multiple Provider SSO Properties** dialog box, perform the following steps:
223
+
1. In the **Multiple Provider SSO Properties** dialog box, perform the following steps:
@@ -216,11 +230,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
216
230
217
231
* For **Enable debug logging for the multiple provider SSO integration**, select **Yes**.
218
232
219
-
* For **The field on the user table that...**, enter **user_name**.
233
+
* For **The field on the user table that...**, enter **email**.
220
234
221
235
* Select **Save**.
222
236
223
-
6. You can configure ServiceNow automatically or manually. To configure ServiceNow automatically, follow these steps:
237
+
1. You can configure ServiceNow automatically or manually. To configure ServiceNow automatically, follow these steps:
224
238
225
239
1. Return to the **ServiceNow** single sign-on page in the Azure portal.
226
240
@@ -275,11 +289,16 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
275
289
276
290

277
291
292
+
> [!NOTE]
293
+
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
294
+
295
+
> 
296
+
278
297
1. When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
279
298
280
299

281
300
282
-
6. To configure **ServiceNow** manually, follow these steps:
301
+
1. To configure **ServiceNow** manually, follow these steps:
283
302
284
303
1. Sign on to your ServiceNow application as an administrator.
285
304
@@ -320,13 +339,18 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
320
339
321
340
* Confirm that **NameID Policy** is set to `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` value.
322
341
323
-
* Select **Advanced**. In **User Field**, enter **email** or **user_name**, depending on which field is used to uniquely identify users in your ServiceNow deployment.
342
+
* Select **Advanced**. In **User Field**, enter **email**.
324
343
325
344
> [!NOTE]
326
345
> You can configure Azure AD to emit either the Azure AD user ID (user principal name) or the email address as the unique identifier in the SAML token. Do this by going to the **ServiceNow** > **Attributes** > **Single sign-on** section of the Azure portal, and mapping the desired field to the **nameidentifier** attribute. The value stored for the selected attribute in Azure AD (for example, user principal name) must match the value stored in ServiceNow for the entered field (for example, user_name).
327
346
328
347
* Select **Test Connection** at the upper-right corner of the page.
329
348
349
+
> [!NOTE]
350
+
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
351
+
352
+
> 
353
+
330
354
* When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
331
355
332
356

@@ -421,7 +445,7 @@ The objective of this section is to create a user called B.Simon in ServiceNow.
421
445
422
446
d. For **Clock Skew**, enter **60**.
423
447
424
-
e. For **User Field**, enter **email** or **user_name**, depending on which field is used to uniquely identify users in your ServiceNow deployment.
448
+
e. For **User Field**, enter **email**.
425
449
426
450
> [!NOTE]
427
451
> You can configure Azure AD to emit either the Azure AD user ID (user principal name) or the email address as the unique identifier in the SAML token. Do this by going to the **ServiceNow** > **Attributes** > **Single sign-on** section of the Azure portal, and mapping the desired field to the **nameidentifier** attribute. The value stored for the selected attribute in Azure AD (for example, user principal name) must match the value stored in ServiceNow for the entered field (for example, user_name).
@@ -451,7 +475,7 @@ When you select the ServiceNow tile in the Access Panel, you should be automatic
* Select **USE EXTERNAL LOGIN**. You're redirected to the Azure AD page for sign-in.
454
-
478
+
455
479
* Enter your credentials. If there is any third-party authentication, or any other security feature enabled, the user must respond accordingly. The application **Home page** appears.
456
480
457
481

@@ -468,6 +492,6 @@ When you select the ServiceNow tile in the Access Panel, you should be automatic
468
492
469
493
-[Try ServiceNow with Azure AD](https://aad.portal.azure.com)
470
494
471
-
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
495
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/protect-servicenow)
472
496
473
-
-[How to protect ServiceNow with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/protect-servicenow)
497
+
-[How to protect ServiceNow with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments