You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: copilot/copilot-agent-install.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ f1.keywords:
4
4
ms.author: erikre
5
5
author: ErikRe
6
6
manager: dansimp
7
-
ms.date: 06/25/2025
7
+
ms.date: 07/10/2025
8
8
audience: Admin
9
9
ms.topic: concept-article
10
10
ms.service: microsoft-365-copilot
@@ -54,6 +54,10 @@ Users can install agents that are available in Agent Store based on the policies
54
54
55
55
Organizations can govern these agents in the Copilot Control System section of the Microsoft 365 admin center. Administrators have a full set of lifecycle management tools for these agents. Microsoft offers granular controls that enable administrators to install and block agents. Additionally, administrators can remove shared and custom agents for some or all of the users in their tenant.
56
56
57
+
### Microsoft-built agent licensing
58
+
59
+
Some agents built by Microsoft, including Researcher and Analyst, are governed by [Supplementary Terms of Service](https://support.microsoft.com/office/supplementary-terms-of-service-for-teams-apps-powered-by-microsoft-365-services-and-applications-bc6027fe-68c3-4758-a70d-cfe97c43b4e2) which refers to the Microsoft 365 [Product Terms](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/all), and by reference, includes the Data Protection Addendum (DPA). The same Product Terms and DPA also govern the Microsoft 365 Copilot service.
60
+
57
61
## Related content
58
62
59
63
-[Manage agents for Microsoft 365 Copilot in the Microsoft 365 admin center](/microsoft-365/admin/manage/manage-copilot-agents-integrated-apps)
|Environment Maker </br>Service owner of ESS agent |- Set up user context </br>- Customize ESS agent |Microsoft Copilot Studio |
29
+
|Environment Maker </br>Owner of ESS agent |- Set up user context </br>- Customize ESS agent |Microsoft Copilot Studio |
30
30
|ISV Administrators </br>Service owners of specific applications |Provide configuration inputs such as URLs, OAUTH tokens, and more |ISV configuration |
Before continuing with configuring the ESS Agent, the service owner who will manage the ESS agent going forward must have a thorough understanding of its architecture.
35
+
Before continuing with configuring the ESS Agent, the agent owner who will manage the ESS agent going forward must have a thorough understanding of its architecture.
36
36
The ESS agent is built with the following components:
|Domain support |Limited to a single domain per environment (either HR or IT). |Multi-domain support within the same environment is planned for release in the second half of CY2025. |Begin with the domain that will deliver the most immediate value to your organization—either HR or IT. If you need both, consider creating separate Power Platform environments: one for HR and another for IT. |
56
56
|Third-party connector setup |Power Platform connectors can’t be used with on-premises gateway connections at this time. |There are no plans to include this in the future roadmap. |If needed, consider moving your key content to a cloud platform like SharePoint or ServiceNow. |
57
-
|Third-party connector setup |Hierarchical Permissions in ServiceNow Graph Connector doesn't work currently. |Support for hierarchical permissions is planned for release in the second half of CY2025. |If you need support for Hierarchical Permissions in ServiceNow Knowledge for ESS Agent, fill [this form](https://forms.office.com/r/BVvQktxXw1). This feature isn't Generally Available, and we're allowlisting tenants on request basis. |
57
+
|Third-party connector setup |Hierarchical Permissions in ServiceNow Graph Connector doesn't work currently. |Support for hierarchical permissions is planned for release in the second half of CY2025. |If you need support for Hierarchical Permissions in ServiceNow Knowledge for ESS Agent, fill [this form](https://forms.office.com/r/Cu7DTDg0uz). This feature isn't Generally Available, and we're allowlisting tenants on request basis. |
58
58
|Third-party connector setup |Third-party connector setup (like Workday, ServiceNow, or SuccessFactors) takes time, can be complex, and typically needs someone with deep technical expertise. |By design - there are no plans to include it in the future roadmap. |To work around this, carefully follow the setup documentation and involve someone with subject matter expertise in configuring third-party systems. Alternatively, consider starting with SharePoint as your initial knowledge source. You can add ISV connectors once your IT team has the necessary expertise and capacity to manage the integration effectively. |
59
59
|Third-party connector setup |The ESS Agent only includes prebuilt 'read' scenarios for supported connectors. If you want to enable actions like time-off requests or approvals, wait for those to be supported |Support for more read/write scenarios is planned for release in the second half of CY2025. |Start with agent’s knowledge retrieval scenarios first. For advanced task completion scenarios, wait for those to be supported or set-up custom Topic workflows. |
60
60
|Third-party connector setup |Only supports User Principal Name (UPN) based user mapping for third party integrations |Support for non-UPN based mapping is under evaluation and targeting for post-July 2025 |Work with the third party provider to have UPN based user-mapping for integrations |
Copy file name to clipboardExpand all lines: copilot/employee-self-service/prepare.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Preparation is the first step to deploying the Employee Self-Service (ESS) agent
36
36
1. Sign in as a Global admin to your [admin center](https://admin.microsoft.com).
37
37
1. Select **Roles**, then choose **Role assignments**.
38
38
1. In the **Microsoft Entra ID** section, find the **Power Platform Administrator** role.
39
-
1. Add the users you've chosen as service owners for the ESS agent in the **Assigned** section.
39
+
1. Add identified users in the **Assigned** section.
40
40
41
41
## Set up your Power Platform environment and assign the Environment Maker role
42
42
@@ -48,7 +48,7 @@ Preparation is the first step to deploying the Employee Self-Service (ESS) agent
48
48
1. Add a **Dataverse data store**.
49
49
1. Under **Access**, select **Security roles**.
50
50
1. From the list of security roles, select **Environment Maker**. Choose **Members** in the top ribbon.
51
-
1. Select **Add people** in the ribbon to add the designated person who can configure and publish the ESS agent. This person is typically the service owner in your organization.
51
+
1. Select **Add people** in the ribbon to add the designated person who can configure and publish the ESS agent. This person is typically the agent owner in your organization.
52
52
53
53
>[!NOTE]
54
54
>Environment Makers can't install new agents. Only the environment administrators can install new agents.
|Global admin |User who has permissions to configure and delegate other roles |Assign user roles |Microsoft admin center |
134
134
|Power Platform administrator |User who has power to configure Power Platform environments and assign roles within Power Platform |- Create environments </br> - Assign user roles </br> - Install ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
135
-
|Power Platform maker |User who has permission to make changes in a specific Power Platform environment. It’s recommended to have the service owner for this agent perform this role. |Configure ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
135
+
|Power Platform maker |User who has permission to make changes in a specific Power Platform environment. It’s recommended to have the agent owner for this agent perform this role. |Configure ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
136
136
|ISV administrators |Users who manage third-party solutions |Provide configuration inputs for ISV applications |ISV application's administration and configuration interface |
137
137
|Information security |Infrastructure team who manage and control enterprise application security policies |- Allowlist inbound requests for ISV endpoints </br> - Manage single sign-on configurations |- Network firewall policies </br> - Signle sign-on applications |
138
138
|Change control board |Team that manages changes in an organization relating to deploying an enterprise application |- Approve technical architecture </br> - Approve data security, compliance, and governance policies </br> - Approve responsible AI polices |N/A |
|Environment Maker/ Service owner of the ESS agent |- Deploy customization solution to target environment</br> - Set up authentication</br> - Publish ESS agent |Microsoft Copilot Studio |
29
+
|Environment Maker/ Owner of the ESS agent |- Deploy customization solution to target environment</br> - Set up authentication</br> - Publish ESS agent |Microsoft Copilot Studio |
30
30
|Administrator |- Approve the ESS publish request</br> - Deploy it to selected users |Microsoft admin center |
31
31
|Business stakeholders/ champions |Identify test users |N/A |
Copy file name to clipboardExpand all lines: copilot/employee-self-service/servicenow-hrsd-itsm.md
+85-3Lines changed: 85 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ Refer to the ESS Agent deployment guide for installation of the agent and subscr
73
73
|**Application Developer** (*minimum privileged role*) | User who can register an application | Create an App registration - *if using Microsoft Entra OAuth for ServiceNow connector*| Microsoft 365 Admin Center |
74
74
|**Environment Maker**| User who can customize ESS Agent | Configure & Customize ESS Agent | Microsoft Copilot Studio |
75
75
76
-
###ServiceNow configuration
76
+
## ServiceNow configuration
77
77
78
78
This section outlines the tasks required to be configured in ServiceNow by an administrator. ServiceNow integration supports three types of authentications as follows:
79
79
@@ -88,7 +88,86 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
88
88
> [!TIP]
89
89
> Without elevating access, the new security objects can't be created. If **New** button in the top right of configuration pane is missing, then the role isn't elevated to "`security_admin`”.
90
90
91
-
#### Option 1: Using OAuth2 authentication - Create an OAuth Application Registry
91
+
### Basic authentication
92
+
93
+
This method of authentication involves a ServiceNow username and password to authenticate API requests. This method is simple to use and is primarily suggested for testing purposes, as it offers lower security compared to other authentication methods.
94
+
95
+
### Microsoft EntraID OAuth using Certificate
96
+
97
+
This authentication uses app tokens, allowing a registered Entra ID application to access ServiceNow with a token specifying the ServiceNow Entra ID app as the resource.
98
+
99
+
#### Task 1: Register an application in Microsoft Entra ID for OIDC integration with ServiceNow
100
+
101
+
[Learn how to register an app in Microsoft Entra ID.](/entra/identity-platform/quickstart-register-app)
102
+
103
+
1. Sign into the Microsoft Entra admin portal as a global administrator or cloud app administrator.
104
+
1. Go to **Applications** then **App registrations**.
105
+
1. Select **New registration.**
106
+
1. In the new registration form, fill in the following fields:
107
+
1.**Name:** Any name that represents the purpose of app registratio
108
+
1.**Redirect URL:** Not needed
109
+
1. Choose **Register** to complete the creation of the new app registration.
110
+
1. Select **Token configuration** then **Add optional claim** for adding claims setting.
111
+
1. Select **Token type** as **Access** and choose the following claims:
112
+
1.*aud* - for audience validation
113
+
1.*email* - addressable email for user
114
+
1.*upn* - an identifier for the user
115
+
1. Select **Add** to complete adding the claims.
116
+
1. If this is the first time OpenId Connect being setup using claims like email, upn, there’ll be a confirmation to turn on the Microsoft Graph permissions, please check the box and select **Add**.
117
+
1. This flow completes the Microsoft Entra piece of configuration.
118
+
119
+
#### Task 2: Register OIDC provider in ServiceNow
120
+
121
+
1. Login to the ServiceNow instance that needs to be integrated with ESS Agent.
122
+
1. Elevate access permissions using **Elevate role**. Refer to the section **Error! Reference source not found.** – only the first part and not the tasks.
123
+
1. Click **All** in the top navigation bar.
124
+
1. Search for “OAuth” in the search box within dropdown navigation menu.
125
+
1. Select **System OAuth à Application Registry** from the search results (if you don’t see this option, then you don’t have sufficient privileges).
126
+
1. Select **New** in the configuration section pane.
127
+
1. Select **Configure an OIDC provider to verify ID tokens**.
128
+
1. Fill in the following information for the new application registry:
129
+
130
+
|Configuration |Description |
131
+
|--------------|------------|
132
+
|Name |a meaningful name to identify that this OIDC provider was created for ESS Agent |
133
+
|Client ID |The client ID of Entra Application created in Task 1 above |
134
+
|Client secret |This value will not be used; can be any value |
135
+
|OAuth OIDC provider configuration |Add a new OIDC provider configuration by selecting the search icon and choosing **New** in the search popup. Fill in the fields as follows:</br> **OIDC Provider:** A name that represents the Microsoft Entra tenant from task 1 above.</br> **OIDC Metadata URL:**`login.microsoftonline.com/<tenant ID>/.well-known/openid-configuration`</br> Replace < tenant ID > with the Entra tenant ID from task 1 above.</br> **OIDC Configuration Cache Life Span:** 120</br> **Application:** Global</br> **User Claim:** oid</br> **User Field:** User ID</br> **Enable JTI claim verification:** disabled</br> Select **Submit** and update the OIDC Entity form. |
136
+
137
+
#### Task 3: Register an Application in Microsoft Entra ID for connector usage
138
+
139
+
This is the application which plays the role of a user with elevated permissions in the ServiceNow instance.
140
+
141
+
1. Login to Entra administration portal as global administrator (or) cloud app administrator.
142
+
1. Go to **Applications** > **App registrations**.
143
+
1. Select **New registration**.
144
+
1. In the new registration form, fill in the following fields:.
145
+
1.**Name:** any name that represents the purpose of app registration.
146
+
2.**Redirect URI:** Not needed.
147
+
1. Click **Register** to complete the creation of new app registration.
148
+
1. Select **Certificates & secrets** then upload the .cer file of the certificate. In case of SNI certificate, just add trustedCertificateSubjects in the manifest of the application with the relevant authorityId and subjectName.
149
+
150
+
#### Task 4: Create a System User in ServiceNow
151
+
152
+
This is the Application created in the above task 3 which is a user in ServiceNow instance.
153
+
154
+
Go to **User Administration** > **Users** to create a new user.
155
+
156
+
**User ID:** The object ID of the service principal of Application created in Task 3 above.
157
+
158
+
Check **Web service access only**.
159
+
160
+
### Microsoft Entra ID OAuth User Login
161
+
162
+
This is user-token based authentication where the end user can sign into Entra ID 1st party application i.e. ServiceNow connector 1st party app and get an access token with scope for the ServiceNow representative Entra ID app.
163
+
164
+
Perform Task 1 & Task 2 from the previous section Microsoft Entra ID OAuth using Certificate.
165
+
166
+
In the Task 1 – add the 1st party application i.e., ServiceNow connector to the permission scope – Client ID = c26b24aa-7874-4e06-ad55-7d06b1f79b63.
167
+
168
+
In the Task 2 – update the user claim to upn or any other custom claim property from the token in ServiceNow. The user field should match the ServiceNow system user table field containing the upn or user ID.
169
+
170
+
### Using OAuth2 authentication - Create an OAuth Application Registry
92
171
93
172
1. Log in to the ServiceNow instance that needs to be integrated with ESS Agent.
94
173
2. Elevate access permissions using **Elevate role**.
@@ -104,7 +183,7 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
104
183
|**Name**| a meaningful name to identify that this application registry is created for ESS Agent |
105
184
|**Client ID**| autogenerated code <br><divclass="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
106
185
|**Client Secret**| leave it blank to automatically generate a string <br><divclass="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
107
-
|**Redirect URL**| a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback`|
186
+
|**Redirect URL**| a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback` Refer to the note after the table for more information.|
108
187
|**Logo URL**| A URL that contains the image for the application logo |
109
188
|**Active**| Set to active |
110
189
|**Refresh token lifespan**| The number of seconds that a refresh token is valid. </br>By default, refresh tokens expire in 100 days (8,640,000 seconds). Recommended value is 31,536,000 (one year) |
@@ -113,6 +192,9 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
113
192
|**Accessible from**| All application scopes |
114
193
|**Client Type**| Integration as a Service |
115
194
195
+
>[!NOTE]
196
+
>[Please use the actual callback URL from the sign-in popup window during connection configuration by following the steps below, when the URL redirection fails with the error **Invalid redirect_uri**:</br> Copy/paste the complete URL from the authorization popup window</br> Extract redirect_uri parameter.</br> Example: `redirect_uri=https%3a%2f%2ftip1-shared.consent.azure-apim.net%2fredirect`</br> After decoding the URL – replacing %3a with : and %2f with /</br> Update the Redirect URL field.]
197
+
116
198
9. Select **Submit** or **Update** button to save the changes.
0 commit comments