Skip to content

Commit 0d71c13

Browse files
committed
Update servicenow-hrsd-itsm.md
1 parent df4b906 commit 0d71c13

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

copilot/employee-self-service/servicenow-hrsd-itsm.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -129,11 +129,11 @@ This flow completes the Microsoft Entra piece of configuration.
129129

130130
#### Task 2: Register OIDC provider in ServiceNow
131131

132-
1. Login to the ServiceNow instance that needs to be integrated with ESS Agent.
132+
1. Sign in to the ServiceNow instance that needs to be integrated with ESS Agent.
133133

134134
1. Elevate access permissions using **Elevate role**. Refer to the section **Error! Reference source not found.** – only the first part and not the tasks.
135135

136-
1. Click **All** in the top navigation bar.
136+
1. Select **All** in the top navigation bar.
137137

138138
1. Search for “OAuth” in the search box within dropdown navigation menu.
139139

@@ -149,12 +149,12 @@ This flow completes the Microsoft Entra piece of configuration.
149149
|--------------|------------|
150150
|Name |a meaningful name to identify that this OIDC provider was created for ESS Agent |
151151
|Client ID |The client ID of Microsoft Entra Application created in Task 1 above |
152-
|Client secret |This value will not be used; can be any value |
152+
|Client secret |This value isn't used; can be any value |
153153
|OAuth OIDC provider configuration |Add a new OIDC provider configuration by selecting the search icon and choosing **New** in the search popup. Fill in the fields as follows:</br> **OIDC Provider:** A name that represents the Microsoft Entra tenant from task 1 above.</br> **OIDC Metadata URL:** `login.microsoftonline.com/<tenant ID>/.well-known/openid-configuration`</br> Replace < tenant ID > with the Microsoft Entra tenant ID from task 1 above.</br> **OIDC Configuration Cache Life Span:** 120</br> **Application:** Global</br> **User Claim:** oid</br> **User Field:** User ID</br> **Enable JTI claim verification:** disabled</br> Select **Submit** and update the OIDC Entity form. |
154154

155155
#### Task 3: Register an Application in Microsoft Entra ID for connector usage
156156

157-
This is the application which plays the role of a user with elevated permissions in the ServiceNow instance.
157+
This is the application that plays the role of a user with elevated permissions in the ServiceNow instance.
158158

159159
1. Sign into the Microsoft Entra admin center as a Global Administrator or Cloud App Administrator.
160160

@@ -169,7 +169,7 @@ This is the application which plays the role of a user with elevated permissions
169169

170170
1. Select **Register** to complete the creation of new app registration.
171171

172-
1. Select **Certificates & secrets** then upload the `.cer` file of the certificate. In case of SNI certificate, just add `trustedCertificateSubjects` in the manifest of the application with the relevant `authorityId` and `subjectName`.
172+
1. Select **Certificates & secrets** then upload the `.cer` file of the certificate. If there's an SNI certificate, just add `trustedCertificateSubjects` in the manifest of the application with the relevant `authorityId` and `subjectName`.
173173

174174
#### Task 4: Create a System User in ServiceNow
175175

0 commit comments

Comments
 (0)