PingOne for Enterprise

Adding ServiceNow to Your PingOne for Enterprise Dock

Add the ServiceNow application to your PingOne for Enterprise Dock from the application catalog.

Before you begin

To configure single sign-on (SSO) for ServiceNow, you must have the SAML 2.0 Single Sign-On plugin installed in your ServiceNow account. If this plugin is not yet installed, contact ServiceNow customer support.

Steps

  1. In the PingOne for Enterprise admin console, go to Applications → Application Catalog.

  2. Optional: In the Search field, search for the application.

  3. Click the ServiceNow application line to expand it and click Setup.

  4. In a separate tab or window, sign on to your ServiceNow account as an administrative user.

  5. In ServiceNow, go to SAML 2.0 Single Sign-On → Properties.

  6. On the Enable External Authentication line, click Yes.

  7. In the Identity Provider URL which will issue the SAML2 Security token with user info field, enter the Issuer value from PingOne for Enterprise.

  8. In the The base URL to the Identity Provider’s AuthnRequest service. The AuthnRequest will be posted to this URL as the SAMLRequest parameter field, enter https://sso.connect.pingidentity.com/sso/idp/SSO.saml2?idpid=<IdP ID>, replacing <IdP ID> with the IdP ID value from PingOne.

Next steps

In PingOne for Enterprise, click Continue to Next Step.

ServiceNow Connection Configuration

Steps

  1. Import the metadata for ServiceNow:

    Choose from:

    • Click Select File to upload the metadata file.

    • Click Or use URL to enter the URL of the metadata.

  2. In the ACS URL field, enter the The URL to the ServiceNow instance homepage value from ServiceNow.

  3. In the Entity ID field, enter the The entity identification, or the issuer value from ServiceNow.

  4. In the Target Resource field, enter a URL to redirect the user to after IdP-initiated single SSO.

  5. In the Single Logout Endpoint field, enter a URL for PingOne to send single logout (SLO) requests to.

  6. In the Single Logout Response Endpoint field, enter a URL for PingOne to send SLO responses to.

  7. To add a Primary Verification Certificate, click Browse to locate and upload a local certificate file used to verify SLO requests and responses coming from ServiceNow.

  8. To add a Secondary Verification Certificate, click Browse to locate and upload a local certificate used to verify SLO requests and responses if the primary certificate fails.

  9. Select the Force Re-authentication check box to require your identity bridge to re-authenticate users with an active SSO session.

  10. Select the Encrypt Assertion check box to encrypt outgoing SAML assertions.

  11. On the Signing line:

    Choose from:

    • Click Sign Assertion to have PingOne sign outgoing SAML assertions. This is the default option.

    • Click Sign Response to have PingOne sign responses to incoming SAML assertions.

  12. From the Signing Algorithm list, select an algorithm with which to sign SAML assertions.

  13. Select the Use Custom URL check box to enter a customer URL to launch ServiceNow from the dock.

  14. Select the Set Up Provisioning check box to configure user provisioning to ServiceNow.

Next steps

In PingOne, click Continue to Next Step.

ServiceNow Provisioning

Before you begin

Ensure that popups are permitted in your browser.

About this task

If you don’t need to set up user provisioning, proceed to ServiceNow Attribute Mapping.

If you selected Set Up Provisioning on the Connection configuration tab:

Steps

  1. In PingOne, clickContinue to Next Step to proceed to the Application Configuration tab.

  2. Install the Ping Identity Provisioning Solution application.

  3. Create a provisioning user.

    For more information, see Creating a provisioning user in ServiceNow.

  4. In PingOne, in the Administrator_Username field, enter the username for the provisioning user.

  5. In the Administrator_Password field, enter the password for the provisioning user.

  6. In the ServiceNow_URL field, enter the full URL of your ServiceNow instance.

    Example:https://<yourinstance>.servicenow.com

Next steps

Click Continue to Next Step.

ServiceNow Attribute Mapping

About this task

PingOne will automatically populate required SAML attributes.

For ServiceNow, the required attribute is SAML_SUBJECT.

If you enabled provisioning, the required provisioning attribute is Username. All other provisioning attributes are optional.

Steps

  1. To add an additional optional attribute, click Add new attribute.

  2. In the Application Attribute field, enter the attribute name as it appears in the application.

  3. In the Identity Bridge Attribute or Literal Value field, choose one of the following:

    Choose from:

    • To map to the application attribute: Enter or select a directory attribute.

    • To assign to the application attribute: Select As Literal, then enter a literal value.

  4. To create advanced attribute mappings, click Advanced.

    For more information, see Create advanced attribute mappings.

Next steps

Click Continue to Next Step.

ServiceNow Customization

Steps

  • To change the application icon, click Select image and upload a local image file.

    The image file must be:

    • PNG, GIF, or JPG format

    • 312 x 52 pixels maximum

    • 2 MB maximum file size

      Images are scaled to 64 x 64 pixels for display.

  • To change the name of the application displayed on the dock, in the Name field, enter a new name.

  • To change the description of the application, in the Description field, enter the new description text.

  • To change the category to which the application is assigned on the dock, in the Category list, select a category.

    For information about creating custom application categories, see Creating a custom application category.

Next steps

Click Continue to Next Step.

ServiceNow Group Access

About this task

The Group Access tab shows every user group that you have created.

For more information about creating user groups, see Add user groups.

Steps

  • To add a group’s access to the application, on the line for that group, click Add.

  • To remove a group’s access, on the line for that group, click Remove.

  • When you’re finished assigning groups, click Continue to Next Step.

Next steps

On the Review Setup tab, review your configuration, and click Finish to add the application to your PingOne Dock.

ServiceNow SAML Connection

Steps

  1. On the Review Setup tab, go to the SAML Metadata line and click Download to download the PingOne metadata.

  2. Click Finish to complete your configuration and add ServiceNow to your PingOne Dock.

  3. In ServiceNow, go to SAML 2.0 Single Sign-On → Certificate.

  4. In the Name field, enter or select SAML 2.0.

  5. From the Format list, select PEM.

  6. In a plain text editor, open the PingOne metadata file.

  7. Copy the contents of the metadata file and paste them into the PEM Certificate field.

  8. Click Save.