This page describes how to connect ServiceNow to Agentspace Enterprise.
After you set up your data source and import data the first time, the data store syncs data from that source at a frequency that you select during setup.
Before you begin
Before setting up your connection, ensure you have the following in place:
- ServiceNow instance: Create a ServiceNow instance by following the instructions on the ServiceNow Developer documentation.
Google Cloud project: Set up a Google Cloud project with an administrator account capable of managing organization-level configurations, ensuring the organization can set up a workforce pool.
Workforce pool: Make sure your organization is set up to manage a workforce pool.
Set up ServiceNow
ServiceNow offers two primary sites:
Main ServiceNow site: The site for your ServiceNow instance.
- Manages users, groups, and system administration tasks.
- URL: The URL for your ServiceNow instance.
- Sign in using your administrator credentials.
-
- Configures the knowledge base, sets up workflows, and develops custom applications.
- URL:
https://developer.service-now.com
. - Sign in using your ServiceNow ID.
To create an OAuth endpoint, do the following:
- Sign into the main ServiceNow instance with an administrator role.
Navigate to All > System OAuth > Application registry.
Select application registry Click New.
Click the New button Click Create an OAuth API endpoint for external clients.
Select the option to create an OAuth API endpoint for external clients Fill in the required fields:
- Name: Enter a Unique name.
- Redirect URL: Enter the redirect URL.
Click Submit to create the credential.
Enter the redirect URL After submission, click the name to view the Client ID.
View the client ID The secret is masked. Click the lock icon next to it to unmask and view client secret.
Click the lock icon Save the Client ID and Client secret for later use.
Copy the client ID and client secret
To retrieve ServiceNow instance credentials, do the following:
Go to developer.service-now.com and click Manage instance password.
Click the Manage instance password button Keep a copy of the instance URL, username, and password to use when required.
At this stage, all five pieces of information needed to set up a ServiceNow data store are available. If there are no concerns with using the administrator role to pull data, proceed to creating a data store.
Set up roles and permissions
Elevate the administrator role to security_admin
to manage users and roles.
Click your profile icon and then select Elevate role.
Click the Elevate role button Select
security_admin
and then click Update. Thesecurity_admin
role helps to create roles and manage users.Select the security_admin
role and then click the Update button
Use administrator role: You can use an administrator role to pull data. You can either use the default administrator role configured with the instance, or create a new user with an administrator role using the following instructions.
Go to All > User administration > Users.
Select users Create a new user with a name.
Select username Enable Web service access only. When you select Web service access only, you create a non-interactive user.
Interactive users vs. non-interactive users: Interactive users can sign in to the ServiceNow UI or service portal using their username and password. They can access an instance through a URL that points to a UI page, form, or list. They can also connect using single sign-on methods such as digest authentication or security assertion markup language (SAML). Additionally, they can use their credentials to authorize SOAP connections if permitted by strict security settings, and they have unrestricted access to other API connections such as WSDL, JSON, XML, or XSD.
Whereas, non-interactive users can only use their credentials to authorize API connections like JSON, SOAP, and WSDL. They cannot sign in to the ServiceNow UI and can only access the instance through API protocols.
After user creation, select the user from the users list.
Pick a user Click Roles > Edit.
Edit roles Add Admin.
Click Save to add a list of roles to the user.
Add list of roles to the user Click Set password, auto-generate, and save it.
Set password
Custom role (Recommended): Using the administrator role may not suit teams or organizations that want to avoid assigning overly powerful permissions. This option provides a role with three specific permissions that grant the required access.
Go to All > System security > Users and groups > Roles.
Add roles Select New, enter a name.
Click the New button Click Submit.
Click the Submit button Find the created role in the list.
Search using the role name and click the role Navigate to Contains roles > Edit.
Click the Edit button Add the following roles to the newly created role, and then click Save.
catalog_admin
knowledge_admin
incident_manager
Add roles and click the Save button Confirm updates.
Confirm roles The following figure shows the custom role that include three roles:
Custom roles
Custom role with ACL rules: This option requires
category_admin
andknowledge_admin
roles. It provides the minimal set of permissions.Go to All > User administration > Roles.
Select roles Click New.
Click the New button Provide a name and Submit.
Select a name and submit Go to System security > Access control (ACL).
Select access control (ACL) Click New to create a new ACL rule.
Click the New button Repeat the following two steps until you grant access to all required tables.
Use
sys_user_role
as an example to see how table access is granted.Select sys_user_role
Click Submit and select the role.
The connector needs access to these tables for each entity to run successfully.
Table name | Description |
---|---|
incident | Show incidents in search results. |
sc_cat_item | Show catalog items in search results. |
sc_cat_item_user_criteria_mtom | Enforce ACL by accessing catalog item user criteria. |
sc_cat_item_user_criteria_no_mtom | Enforce ACL by accessing catalog item user criteria. |
sc_cat_item_user_mtom | Enforce ACL by accessing catalog item user criteria. |
sc_cat_item_user_no_mtom | Enforce ACL by accessing catalog item user criteria. |
kb_knowledge | Show knowledge items in search results. |
kb_knowledge_base | Show knowledge base in search results. |
kb_uc_can_contribute_mtom | Enforce ACL by accessing who can contribute to knowledge base. |
kb_uc_can_read_mtom | Enforce ACL by accessing knowledge user criteria. |
sys_user_role | Enforce ACL by accessing user roles. |
sys_user_has_role | Enforce ACL by accessing role information of users. |
sys_user_group | Enforce ACL by accessing user group segments. |
sys_user_grmember | Enforce ACL by accessing group membership of users. |
sys_user | Enforce ACL by accessing user table. |
core_company | Enforce ACL by accessing company attributes. |
cmn_location | Enforce ACL by accessing location attribute. |
cmn_department | Enforce ACL by accessing department attributes. |
user_criteria | Enforce ACL by accessing user criteria. |
To run successfully, the catalog item entity connector also requires
explicit access to all fields of the sc_cat_item
table.
To grant and verify the ACL access, do the following:
Grant explicit access by creating a new ACL rule and manually entering
sc_cat_item.*
in the Name field of the form.Enter sc_cat_item.*
Verify that all the ACLs are updated.
Go to
sys_security_acl_role_list.do
in the search bar.Enter sys_security_acl_role_list.do
Select Role with the role that you want to verify.
Select role to verify Verify that all the required ACLs are assigned to the role.
Grant role to a user
Go to All > User administration > Users.
Select users Find or create a new user.
Find or create a new user If no user is available, go to System security > Users and groups > Users.
Select users Click New.
Click the New button Create a new service account in the user table. Make sure to click Web service access only.
Click the Web service access only option Scroll to Roles.
Navigate to Roles Click Edit.
Edit Roles Grant the role you created and assign it to the user. Based on the type of role you created in the previous step, select the appropriate one and assign it to the user. Click Save.
Select and assign the role OR
Assign the role and save View the custom role with ACL.
Custom role with ACL Obtain the username and password for the user and click Set password.
Set password Auto-generate a password and keep it for later use.
Auto-generate a password
Create a ServiceNow connector
Console
To use the Google Cloud console to sync data from ServiceNow to Agentspace Enterprise , follow these steps:
In the Google Cloud console, go to the Agentspace page.
In the navigation menu, click Data stores.
Click
Create data store.On the Select a data source page, scroll or search for ServiceNow to connect your third-party source.
Enter your ServiceNow authentication information.
- Instance URI
- Client ID
- Client secret
- User account
- Password
ServiceNow authentication information Fill in a unique name for your data store and click Create.
Select which entities to sync and click Continue.
Select a region for your data connector.
Select a synchronization frequency (daily / every 3 / 5 days).
Click Create. Agentspace Enterprise creates your data store and displays your data stores on the Data stores page.
To check the status of your ingestion, go to the Data stores page and click your data connector name to see details about it on its Data page. The Connector state changes from Creating to Running when it starts synchronizing data. When ingestion is complete, the state changes to Active to indicate that the connection to your data source is set up and awaiting the next scheduled synchronization.
Depending on the size of your data, ingestion can take several minutes or several hours.
Configure the workforce pool
The workforce pool lets you to manage and authenticate users from external identity providers, such as Azure or Okta, within Google Cloud console. To configure your workforce pool and enable the web app for seamless user access, do the following:
Create workforce pool at the organization level in Google Cloud by following the appropriate setup manual:
Configure the workforce pool in Agentspace > Settings for the region where you create your app.
Next steps
To attach your data store to an app, create an app and select your data store following the steps in Create an app.
To preview how your search results appear after your app and data store are set up, see Preview search results. If you used third-party access control, see Preview results for apps with third-party access control.
To enable alerts for the data store, see Configure alerts for third-party data stores.