Skip to content

Commit 735542c

Browse files
authored
Merge branch 'main' into docs-editor/manage-saas-apps-1752066086
2 parents b94482a + 1fb3d17 commit 735542c

42 files changed

Lines changed: 494 additions & 192 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.copilot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path": "copilot/microsoft-365-copilot-search-privacy.md",
1010
"redirect_url": "/copilot/microsoft-365-copilot-search",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "copilot/pin-copilot.md",
15+
"redirect_url": "/copilot/microsoft-365/pin-copilot-chat-navbar",
16+
"redirect_document_id": false
1217
}
1318
]
1419
}

copilot/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,10 @@ items:
6565
href: microsoft-365-copilot-app-admin-settings.md
6666
- name: Set up Organizational Asset Library
6767
href: enterprise-brand-manager.md
68+
- name: Pin the Copilot app to the Windows taskbar
69+
href: pin-copilot-taskbar.md
6870
- name: Pin Copilot Chat to the navigation bar
69-
href: pin-copilot.md
71+
href: pin-copilot-chat-navbar.md
7072
- name: Copilot in Microsoft 365 admin centers
7173
href: copilot-for-microsoft-365-admin.md
7274
- name: Multiple account access for work and school documents

copilot/copilot-agent-install.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ f1.keywords:
44
ms.author: erikre
55
author: ErikRe
66
manager: dansimp
7-
ms.date: 06/25/2025
7+
ms.date: 07/10/2025
88
audience: Admin
99
ms.topic: concept-article
1010
ms.service: microsoft-365-copilot
@@ -54,6 +54,10 @@ Users can install agents that are available in Agent Store based on the policies
5454

5555
Organizations can govern these agents in the Copilot Control System section of the Microsoft 365 admin center. Administrators have a full set of lifecycle management tools for these agents. Microsoft offers granular controls that enable administrators to install and block agents. Additionally, administrators can remove shared and custom agents for some or all of the users in their tenant.
5656

57+
### Microsoft-built agent licensing
58+
59+
Some agents built by Microsoft, including Researcher and Analyst, are governed by [Supplementary Terms of Service](https://support.microsoft.com/office/supplementary-terms-of-service-for-teams-apps-powered-by-microsoft-365-services-and-applications-bc6027fe-68c3-4758-a70d-cfe97c43b4e2) which refers to the Microsoft 365 [Product Terms](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/all), and by reference, includes the Data Protection Addendum (DPA). The same Product Terms and DPA also govern the Microsoft 365 Copilot service.
60+
5761
## Related content
5862

5963
- [Manage agents for Microsoft 365 Copilot in the Microsoft 365 admin center](/microsoft-365/admin/manage/manage-copilot-agents-integrated-apps)

copilot/employee-self-service/customize.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Customization is how you make the Employee Self-Service (ESS) agent work in the
2626

2727
|Role |Activities to perform |Configuration area |
2828
|-----|----------------------|-------------------|
29-
|Environment Maker </br>Service owner of ESS agent |- Set up user context </br>- Customize ESS agent |Microsoft Copilot Studio |
29+
|Environment Maker </br>Owner of ESS agent |- Set up user context </br>- Customize ESS agent |Microsoft Copilot Studio |
3030
|ISV Administrators </br>Service owners of specific applications |Provide configuration inputs such as URLs, OAUTH tokens, and more |ISV configuration |
3131
|HR </br>IT </br>Legal </br>Privacy |-Identify knowledge sources </br>-Provide frequent queries </Identify sensitive queries> | N/A |
3232

3333
## Understanding components
3434

35-
Before continuing with configuring the ESS Agent, the service owner who will manage the ESS agent going forward must have a thorough understanding of its architecture.
35+
Before continuing with configuring the ESS Agent, the agent owner who will manage the ESS agent going forward must have a thorough understanding of its architecture.
3636
The ESS agent is built with the following components:
3737

3838
### Topics

copilot/employee-self-service/deploy-overview-alm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ You need to work with your organization’s Power Platform administrator to esta
8080

8181
The ESS Agent has three distinct persona experiences:
8282

83-
1. Administrator: Prepare the tenant to deploy, configure, and operate the ESS agent with the correct roles assigned to identified service owners.
83+
1. Administrator: Prepare the tenant to deploy, configure, and operate the ESS agent with the correct roles assigned to identified administrators.
8484

8585
2. Environment maker: Install, configure, and publish the agent, including third-party ISV packages.
8686

copilot/employee-self-service/known-issues-limitations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Applies to:
5454
|-----|-----------|------------|----------------------|
5555
|Domain support |Limited to a single domain per environment (either HR or IT). |Multi-domain support within the same environment is planned for release in the second half of CY2025. |Begin with the domain that will deliver the most immediate value to your organization—either HR or IT. If you need both, consider creating separate Power Platform environments: one for HR and another for IT. |
5656
|Third-party connector setup |Power Platform connectors can’t be used with on-premises gateway connections at this time. |There are no plans to include this in the future roadmap. |If needed, consider moving your key content to a cloud platform like SharePoint or ServiceNow. |
57-
|Third-party connector setup |Hierarchical Permissions in ServiceNow Graph Connector doesn't work currently. |Support for hierarchical permissions is planned for release in the second half of CY2025. |If you need support for Hierarchical Permissions in ServiceNow Knowledge for ESS Agent, fill [this form](https://forms.office.com/r/BVvQktxXw1). This feature isn't Generally Available, and we're allowlisting tenants on request basis. |
57+
|Third-party connector setup |Hierarchical Permissions in ServiceNow Graph Connector doesn't work currently. |Support for hierarchical permissions is planned for release in the second half of CY2025. |If you need support for Hierarchical Permissions in ServiceNow Knowledge for ESS Agent, fill [this form](https://forms.office.com/r/Cu7DTDg0uz). This feature isn't Generally Available, and we're allowlisting tenants on request basis. |
5858
|Third-party connector setup |Third-party connector setup (like Workday, ServiceNow, or SuccessFactors) takes time, can be complex, and typically needs someone with deep technical expertise. |By design - there are no plans to include it in the future roadmap. |To work around this, carefully follow the setup documentation and involve someone with subject matter expertise in configuring third-party systems. Alternatively, consider starting with SharePoint as your initial knowledge source. You can add ISV connectors once your IT team has the necessary expertise and capacity to manage the integration effectively. |
5959
|Third-party connector setup |The ESS Agent only includes prebuilt 'read' scenarios for supported connectors. If you want to enable actions like time-off requests or approvals, wait for those to be supported |Support for more read/write scenarios is planned for release in the second half of CY2025. |Start with agent’s knowledge retrieval scenarios first. For advanced task completion scenarios, wait for those to be supported or set-up custom Topic workflows. |
6060
|Third-party connector setup |Only supports User Principal Name (UPN) based user mapping for third party integrations |Support for non-UPN based mapping is under evaluation and targeting for post-July 2025 |Work with the third party provider to have UPN based user-mapping for integrations |

copilot/employee-self-service/prepare.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Preparation is the first step to deploying the Employee Self-Service (ESS) agent
3636
1. Sign in as a Global admin to your [admin center](https://admin.microsoft.com).
3737
1. Select **Roles**, then choose **Role assignments**.
3838
1. In the **Microsoft Entra ID** section, find the **Power Platform Administrator** role.
39-
1. Add the users you've chosen as service owners for the ESS agent in the **Assigned** section.
39+
1. Add identified users in the **Assigned** section.
4040

4141
## Set up your Power Platform environment and assign the Environment Maker role
4242

@@ -48,7 +48,7 @@ Preparation is the first step to deploying the Employee Self-Service (ESS) agent
4848
1. Add a **Dataverse data store**.
4949
1. Under **Access**, select **Security roles**.
5050
1. From the list of security roles, select **Environment Maker**. Choose **Members** in the top ribbon.
51-
1. Select **Add people** in the ribbon to add the designated person who can configure and publish the ESS agent. This person is typically the service owner in your organization.
51+
1. Select **Add people** in the ribbon to add the designated person who can configure and publish the ESS agent. This person is typically the agent owner in your organization.
5252

5353
>[!NOTE]
5454
>Environment Makers can't install new agents. Only the environment administrators can install new agents.

copilot/employee-self-service/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ The ESS Agent includes several different technical components and configuration
132132
|-----|------------|---------------------|-------------------|
133133
|Global admin |User who has permissions to configure and delegate other roles |Assign user roles |Microsoft admin center |
134134
|Power Platform administrator |User who has power to configure Power Platform environments and assign roles within Power Platform |- Create environments </br> - Assign user roles </br> - Install ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
135-
|Power Platform maker |User who has permission to make changes in a specific Power Platform environment. It’s recommended to have the service owner for this agent perform this role. |Configure ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
135+
|Power Platform maker |User who has permission to make changes in a specific Power Platform environment. It’s recommended to have the agent owner for this agent perform this role. |Configure ESS agent |- Power Platform </br> - Microsoft Copilot Studio |
136136
|ISV administrators |Users who manage third-party solutions |Provide configuration inputs for ISV applications |ISV application's administration and configuration interface |
137137
|Information security |Infrastructure team who manage and control enterprise application security policies |- Allowlist inbound requests for ISV endpoints </br> - Manage single sign-on configurations |- Network firewall policies </br> - Signle sign-on applications |
138138
|Change control board |Team that manages changes in an organization relating to deploying an enterprise application |- Approve technical architecture </br> - Approve data security, compliance, and governance policies </br> - Approve responsible AI polices |N/A |

copilot/employee-self-service/publish.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Publishing the Employee Self-Service (ESS) agent makes it available to your user
2626

2727
|Role |Activities to perform |Configuration area |
2828
|-----|----------------------|-------------------|
29-
|Environment Maker/ Service owner of the ESS agent |- Deploy customization solution to target environment</br> - Set up authentication</br> - Publish ESS agent |Microsoft Copilot Studio |
29+
|Environment Maker/ Owner of the ESS agent |- Deploy customization solution to target environment</br> - Set up authentication</br> - Publish ESS agent |Microsoft Copilot Studio |
3030
|Administrator |- Approve the ESS publish request</br> - Deploy it to selected users |Microsoft admin center |
3131
|Business stakeholders/ champions |Identify test users |N/A |
3232

copilot/employee-self-service/servicenow-hrsd-itsm.md

Lines changed: 85 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Refer to the ESS Agent deployment guide for installation of the agent and subscr
7373
| **Application Developer** (*minimum privileged role*) | User who can register an application | Create an App registration - *if using Microsoft Entra OAuth for ServiceNow connector* | Microsoft 365 Admin Center |
7474
| **Environment Maker** | User who can customize ESS Agent | Configure & Customize ESS Agent | Microsoft Copilot Studio |
7575

76-
### ServiceNow configuration
76+
## ServiceNow configuration
7777

7878
This section outlines the tasks required to be configured in ServiceNow by an administrator. ServiceNow integration supports three types of authentications as follows:
7979

@@ -88,7 +88,86 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
8888
> [!TIP]
8989
> Without elevating access, the new security objects can't be created. If **New** button in the top right of configuration pane is missing, then the role isn't elevated to "`security_admin`”.
9090
91-
#### Option 1: Using OAuth2 authentication - Create an OAuth Application Registry
91+
### Basic authentication
92+
93+
This method of authentication involves a ServiceNow username and password to authenticate API requests. This method is simple to use and is primarily suggested for testing purposes, as it offers lower security compared to other authentication methods.
94+
95+
### Microsoft EntraID OAuth using Certificate
96+
97+
This authentication uses app tokens, allowing a registered Entra ID application to access ServiceNow with a token specifying the ServiceNow Entra ID app as the resource.
98+
99+
#### Task 1: Register an application in Microsoft Entra ID for OIDC integration with ServiceNow
100+
101+
[Learn how to register an app in Microsoft Entra ID.](/entra/identity-platform/quickstart-register-app)
102+
103+
1. Sign into the Microsoft Entra admin portal as a global administrator or cloud app administrator.
104+
1. Go to **Applications** then **App registrations**.
105+
1. Select **New registration.**
106+
1. In the new registration form, fill in the following fields:
107+
1. **Name:** Any name that represents the purpose of app registratio
108+
1. **Redirect URL:** Not needed
109+
1. Choose **Register** to complete the creation of the new app registration.
110+
1. Select **Token configuration** then **Add optional claim** for adding claims setting.
111+
1. Select **Token type** as **Access** and choose the following claims:
112+
1. *aud* - for audience validation
113+
1. *email* - addressable email for user
114+
1. *upn* - an identifier for the user
115+
1. Select **Add** to complete adding the claims.
116+
1. If this is the first time OpenId Connect being setup using claims like email, upn, there’ll be a confirmation to turn on the Microsoft Graph permissions, please check the box and select **Add**.
117+
1. This flow completes the Microsoft Entra piece of configuration.
118+
119+
#### Task 2: Register OIDC provider in ServiceNow
120+
121+
1. Login to the ServiceNow instance that needs to be integrated with ESS Agent.
122+
1. Elevate access permissions using **Elevate role**. Refer to the section **Error! Reference source not found.** – only the first part and not the tasks.
123+
1. Click **All** in the top navigation bar.
124+
1. Search for “OAuth” in the search box within dropdown navigation menu.
125+
1. Select **System OAuth à Application Registry** from the search results (if you don’t see this option, then you don’t have sufficient privileges).
126+
1. Select **New** in the configuration section pane.
127+
1. Select **Configure an OIDC provider to verify ID tokens**.
128+
1. Fill in the following information for the new application registry:
129+
130+
|Configuration |Description |
131+
|--------------|------------|
132+
|Name |a meaningful name to identify that this OIDC provider was created for ESS Agent |
133+
|Client ID |The client ID of Entra Application created in Task 1 above |
134+
|Client secret |This value will not be used; can be any value |
135+
|OAuth OIDC provider configuration |Add a new OIDC provider configuration by selecting the search icon and choosing **New** in the search popup. Fill in the fields as follows:</br> **OIDC Provider:** A name that represents the Microsoft Entra tenant from task 1 above.</br> **OIDC Metadata URL:** `login.microsoftonline.com/<tenant ID>/.well-known/openid-configuration`</br> Replace < tenant ID > with the Entra tenant ID from task 1 above.</br> **OIDC Configuration Cache Life Span:** 120</br> **Application:** Global</br> **User Claim:** oid</br> **User Field:** User ID</br> **Enable JTI claim verification:** disabled</br> Select **Submit** and update the OIDC Entity form. |
136+
137+
#### Task 3: Register an Application in Microsoft Entra ID for connector usage
138+
139+
This is the application which plays the role of a user with elevated permissions in the ServiceNow instance.
140+
141+
1. Login to Entra administration portal as global administrator (or) cloud app administrator.
142+
1. Go to **Applications** > **App registrations**.
143+
1. Select **New registration**.
144+
1. In the new registration form, fill in the following fields:.
145+
1. **Name:** any name that represents the purpose of app registration.
146+
2. **Redirect URI:** Not needed.
147+
1. Click **Register** to complete the creation of new app registration.
148+
1. Select **Certificates & secrets** then upload the .cer file of the certificate. In case of SNI certificate, just add trustedCertificateSubjects in the manifest of the application with the relevant authorityId and subjectName.
149+
150+
#### Task 4: Create a System User in ServiceNow
151+
152+
This is the Application created in the above task 3 which is a user in ServiceNow instance.
153+
154+
Go to **User Administration** > **Users** to create a new user.
155+
156+
**User ID:** The object ID of the service principal of Application created in Task 3 above.
157+
158+
Check **Web service access only**.
159+
160+
### Microsoft Entra ID OAuth User Login
161+
162+
This is user-token based authentication where the end user can sign into Entra ID 1st party application i.e. ServiceNow connector 1st party app and get an access token with scope for the ServiceNow representative Entra ID app.
163+
164+
Perform Task 1 & Task 2 from the previous section Microsoft Entra ID OAuth using Certificate.
165+
166+
In the Task 1 – add the 1st party application i.e., ServiceNow connector to the permission scope – Client ID = c26b24aa-7874-4e06-ad55-7d06b1f79b63.
167+
168+
In the Task 2 – update the user claim to upn or any other custom claim property from the token in ServiceNow. The user field should match the ServiceNow system user table field containing the upn or user ID.
169+
170+
### Using OAuth2 authentication - Create an OAuth Application Registry
92171

93172
1. Log in to the ServiceNow instance that needs to be integrated with ESS Agent.
94173
2. Elevate access permissions using **Elevate role**.
@@ -104,7 +183,7 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
104183
| **Name** | a meaningful name to identify that this application registry is created for ESS Agent |
105184
| **Client ID** | autogenerated code <br><div class="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
106185
| **Client Secret** | leave it blank to automatically generate a string <br><div class="alert">**Note**</br>This value is used in Microsoft 365 Copilot Connector configuration, if no Advanced Scripting is used. |
107-
| **Redirect URL** | a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback`|
186+
| **Redirect URL** | a required callback URL that the authorization server redirects to </br>For Microsoft 365 Enterprise:</br>`https://gcs.office.com/v1.0/admin/oauth/callback`</br>For Microsoft 365 Government:</br>`https://gcsgcc.office.com/v1.0/admin/oauth/callback` Refer to the note after the table for more information.|
108187
| **Logo URL** | A URL that contains the image for the application logo |
109188
| **Active** | Set to active |
110189
| **Refresh token lifespan** | The number of seconds that a refresh token is valid. </br>By default, refresh tokens expire in 100 days (8,640,000 seconds). Recommended value is 31,536,000 (one year) |
@@ -113,6 +192,9 @@ This section outlines the tasks required to be configured in ServiceNow by an ad
113192
| **Accessible from** | All application scopes |
114193
| **Client Type** | Integration as a Service |
115194

195+
>[!NOTE]
196+
>[Please use the actual callback URL from the sign-in popup window during connection configuration by following the steps below, when the URL redirection fails with the error **Invalid redirect_uri**:</br> Copy/paste the complete URL from the authorization popup window</br> Extract redirect_uri parameter.</br> Example: `redirect_uri=https%3a%2f%2ftip1-shared.consent.azure-apim.net%2fredirect`</br> After decoding the URL – replacing %3a with : and %2f with /</br> Update the Redirect URL field.]
197+
116198
9. Select **Submit** or **Update** button to save the changes.
117199

118200
### Install ServiceNow HRSD extension pack

0 commit comments

Comments
 (0)