You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: copilot/employee-self-service/servicenow-hrsd-itsm.md
+13-7Lines changed: 13 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,7 +181,7 @@ In this task, you add a user to the Application created in task 3 (earlier in th
181
181
182
182
3. Check **Web service access only**.
183
183
184
-
### Microsoft Entra ID OAuth User Login
184
+
### Microsoft Entra ID OAuth User sign in
185
185
186
186
This is user-token based authentication where the end user can sign into Microsoft Entra ID using the ServiceNow connector, and get an access token with scope for the ServiceNow representative Microsoft Entra ID app.
187
187
@@ -193,7 +193,7 @@ In task 2, you update the user claim to upn or any other custom claim property f
193
193
194
194
### Using OAuth2 authentication - Create an OAuth Application Registry
195
195
196
-
1.Log in to the ServiceNow instance that needs to be integrated with ESS Agent.
196
+
1.Sign in to the ServiceNow instance that needs to be integrated with ESS Agent.
197
197
198
198
2. Elevate access permissions using **Elevate role**.
199
199
@@ -214,7 +214,7 @@ In task 2, you update the user claim to upn or any other custom claim property f
214
214
|**Name**| a meaningful name to identify that this application registry is created for ESS Agent |
215
215
|**Client ID**| autogenerated code <br><divclass="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
216
216
|**Client Secret**| leave it blank to automatically generate a string <br><divclass="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
217
-
|**Redirect URL**| a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback` Refer to the note after the table for more information.|
217
+
|**Redirect URL**| a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback` Refer to the note after this table for more information.|
218
218
|**Logo URL**| A URL that contains the image for the application logo |
219
219
|**Active**| Set to active |
220
220
|**Refresh token lifespan**| The number of seconds that a refresh token is valid. </br>By default, refresh tokens expire in 100 days (8,640,000 seconds). Recommended value is 31,536,000 (one year) |
@@ -223,8 +223,14 @@ In task 2, you update the user claim to upn or any other custom claim property f
223
223
|**Accessible from**| All application scopes |
224
224
|**Client Type**| Integration as a Service |
225
225
226
-
>[!NOTE]
227
-
>[Please use the actual callback URL from the sign-in popup window during connection configuration by following the steps below, when the URL redirection fails with the error **Invalid redirect_uri**:</br> Copy/paste the complete URL from the authorization popup window</br> Extract redirect_uri parameter.</br> Example: `redirect_uri=https%3a%2f%2ftip1-shared.consent.azure-apim.net%2fredirect`</br> After decoding the URL – replacing %3a with : and %2f with /</br> Update the Redirect URL field.]
226
+
> [!NOTE]
227
+
> For the Redirect URL, use the actual callback URL from the sign-in popup window during connection configuration by following these steps:
228
+
>
229
+
> 1. When the URL redirection fails with the error **Invalid redirect_uri**, copy complete URL from the authorization popup window and paste it into an app, such as Notepad.
230
+
>
231
+
> 2. Extract the `redirect_uri parameter`. Here's an example: `redirect_uri=https%3a%2f%2ftip1-shared.consent.azure-apim.net%2fredirect`.
232
+
>
233
+
> 3. After decoding the URL, by replacing `%3a` with `:` and `%2f` with `/`, update the Redirect URL field.
228
234
229
235
9. Select **Submit** or **Update** button to save the changes.
230
236
@@ -237,8 +243,8 @@ The following steps are required to install & enable the ServiceNow HRSD extensi
237
243
238
244
Work with your ESS Agent private preview product managers for the entitlement process. Once the entitlement process is complete for your tenant, the ServiceNow HRSD extension pack shows up under "Customize" section of ESS Agent.
239
245
240
-
> [!NOTE]
241
-
> "Entitlement" process is a preview workaround until the extension pack installation is streamlined in Microsoft Copilot Studio.
246
+
> [!NOTE]
247
+
> "Entitlement" process is a preview workaround until the extension pack installation is streamlined in Microsoft Copilot Studio.
0 commit comments