You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: copilot/employee-self-service/servicenow-hrsd-itsm.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,11 +129,11 @@ This flow completes the Microsoft Entra piece of configuration.
129
129
130
130
#### Task 2: Register OIDC provider in ServiceNow
131
131
132
-
1.Login to the ServiceNow instance that needs to be integrated with ESS Agent.
132
+
1.Sign in to the ServiceNow instance that needs to be integrated with ESS Agent.
133
133
134
134
1. Elevate access permissions using **Elevate role**. Refer to the section **Error! Reference source not found.** – only the first part and not the tasks.
135
135
136
-
1.Click**All** in the top navigation bar.
136
+
1.Select**All** in the top navigation bar.
137
137
138
138
1. Search for “OAuth” in the search box within dropdown navigation menu.
139
139
@@ -149,12 +149,12 @@ This flow completes the Microsoft Entra piece of configuration.
149
149
|--------------|------------|
150
150
|Name |a meaningful name to identify that this OIDC provider was created for ESS Agent |
151
151
|Client ID |The client ID of Microsoft Entra Application created in Task 1 above |
152
-
|Client secret |This value will not be used; can be any value |
152
+
|Client secret |This value isn't used; can be any value |
153
153
|OAuth OIDC provider configuration |Add a new OIDC provider configuration by selecting the search icon and choosing **New** in the search popup. Fill in the fields as follows:</br> **OIDC Provider:** A name that represents the Microsoft Entra tenant from task 1 above.</br> **OIDC Metadata URL:**`login.microsoftonline.com/<tenant ID>/.well-known/openid-configuration`</br> Replace < tenant ID > with the Microsoft Entra tenant ID from task 1 above.</br> **OIDC Configuration Cache Life Span:** 120</br> **Application:** Global</br> **User Claim:** oid</br> **User Field:** User ID</br> **Enable JTI claim verification:** disabled</br> Select **Submit** and update the OIDC Entity form. |
154
154
155
155
#### Task 3: Register an Application in Microsoft Entra ID for connector usage
156
156
157
-
This is the application which plays the role of a user with elevated permissions in the ServiceNow instance.
157
+
This is the application that plays the role of a user with elevated permissions in the ServiceNow instance.
158
158
159
159
1. Sign into the Microsoft Entra admin center as a Global Administrator or Cloud App Administrator.
160
160
@@ -169,7 +169,7 @@ This is the application which plays the role of a user with elevated permissions
169
169
170
170
1. Select **Register** to complete the creation of new app registration.
171
171
172
-
1. Select **Certificates & secrets** then upload the `.cer` file of the certificate. In case of SNI certificate, just add `trustedCertificateSubjects` in the manifest of the application with the relevant `authorityId` and `subjectName`.
172
+
1. Select **Certificates & secrets** then upload the `.cer` file of the certificate. If there's an SNI certificate, just add `trustedCertificateSubjects` in the manifest of the application with the relevant `authorityId` and `subjectName`.
0 commit comments