Table of Contents
Single Sign On (SSO)?
Is a property of access control of multiple related, but independent software systems With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
Salesforce and ServiceNow uses industry standard SSO, i.e. SAML (Security assertion markup language)
SAML 2.0
Security Assertion Markup Language?
Key Features:
SAML ROLES
Note: SAML 2 Single sign on plugin is an on demand service , we have to put a request via " ServiceNow Hi" portal to enable it.


Above highlighted Federation Service Identifier is used in SAML 2.0 Identity Provider Properties
We need to export the above token signature (PEM Cert), Which is required to import into Certificates in SAML 2.0 Configurations in Service-Now.
Follow the below steps to configure SAML 2.0 in your setup to communicate with your Identity Provider (IdP).




IDENTITY PROVIDER PROPERTIES
SERVICE PROVIDER (Service-Now) PROPERTIES
Now Click on Certificates Properties as shown below:
SSL Shopper:
Copy the PEM Cert from Text editor and paste in below PEM text box which is under certificate → SAML 2.0 ( Trust Store Cert as type)

Please check the below snap shots of each step mentioned above






Once we Enable External Authentication and Configuration of SAML 2 Single sign on plugin as shown above, Users will not be able to login to the ServiceNow instance by usual login URL(https://demo.service-now.com). Single sign on settings prevent users from logging into ServiceNow instance instance directly without ADFS login.
To overcome from the above issue, we have a below workaround.We have to use the below mentioned URL:
http://.service-now.com/side_door.do
Administrators can use the following URL to bypass external authentication and log in with a local ServiceNow user
- Introduction
- SAML
- Benefits of SAML
- Flow Diagram
- Prerequisites for SSO Configuration for ServiceNow
- Request SAML 2.0 plug-in
- Servicenow SAML 2.0 Configuration for SSO
- ADFS Relying Party Trusts Configuration
- ADFS Claim Rules Configuration
- Adding User in Active Directory Users and Computers
- Adding User in ServiceNow Instance
- Testing
- Workaround for login to the Servicenow instance directly
Introduction
Single Sign On (SSO)?
Is a property of access control of multiple related, but independent software systems With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
- Single password used across multiple systems.
- Ability to log in once, then access many systems.
- One secure store of credentials to administer
Salesforce and ServiceNow uses industry standard SSO, i.e. SAML (Security assertion markup language)
SAML 2.0
SAML
Security Assertion Markup Language?
- Is a secured XML based communication mechanism for communicating the identities between the organizations.
- SAML is an acronym from Security Assertion Markup Language.
- The key thing of SAML is to eliminate the need of maintaining the multiple authentication credentials, such as passwords in multiple locations.
Key Features:
- Security
It increases the security by eliminating the additional credentials and number of authentications. - Admin
SAML eliminates the administrative time and cost, duplicate passwords, reset of password and forget passwords.
SAML ROLES
- Identity provider (IDP) /Asserting Party (Authentication Mechanism)
- Service Provider (SP) / Relying Party (Target Application that provide service)
- User ( Will access the service using IDP)
Benefits of SAML
- User passwords never cross the firewall, since user authentication occurs inside of the firewall and multiple Web application passwords are no longer required
- Web applications with no passwords are virtually impossible to hack, as the user must authenticate against an enterprise-class IdM first, which can include strong authentication mechanisms
- Centralized federation provides a single point of Web application access, control and auditing, which has security, risk and compliance benefits
Flow Diagram
Prerequisites for SSO Configuration for ServiceNow
- ServiceNow Instance
- SAML 2 Single sign on plugin
- Microsoft's active directory federation server (ADFS)
Note: SAML 2 Single sign on plugin is an on demand service , we have to put a request via " ServiceNow Hi" portal to enable it.
- Issuer (Entity ID of IDP-ADFS), Which is also called as Federation Service Identifier.


Above highlighted Federation Service Identifier is used in SAML 2.0 Identity Provider Properties
- Token Signing Certificate from ADFS-IDP
We need to export the above token signature (PEM Cert), Which is required to import into Certificates in SAML 2.0 Configurations in Service-Now.
Request SAML 2.0 plug-in
Follow the below steps to configure SAML 2.0 in your setup to communicate with your Identity Provider (IdP).
- Install the latest plug-in SAML 2 Single Sign-On.
- After successful installation go to your ServiceNow instance and type SAML in the search bar in the navigation page.
- All the SAML Single Sign-On modules are shown. Refer to the display below.



- Go to the Properties module. The SAML Single Sign-On properties window is displayed

Servicenow SAML 2.0 Configuration for SSO
- To enable external authentication, We have check the box as shown in below, It’ll prompt us to use of ADFS user details
- Once we enable the above property, we can’t login to the servicenow directly, we have a workaround mentioned at last
IDENTITY PROVIDER PROPERTIES
- The below highlighted URL is issuer (Federation Service Identifier) from ADFS
- Identity provider Login URL
- No changes required for the below property (Leave Default)
- Identity Logout URL, Which is same as IDP login URL ( As per requirement, we can change this)
- HTTP Binding Option, By default it should be “Redirect”
- No changes required for the below 3 properties (Leave Default)
SERVICE PROVIDER (Service-Now) PROPERTIES
- Service provider Login URL ( Which is an Service-Now Login URL)
- Issuer from Service-Now ( which is an Service-Now Instance URI)
- Audience Token URI (which is an Service-Now Instance URI)
- This specifies the field in users table, that will be used to match the subject NameID in SAML assertion from IDP with ServiceNow user table
- No changes required for the below 7 properties (Leave Default)
- Click Save
Now Click on Certificates Properties as shown below:

- Service-now requires certificate to be in PEM format. You can convert the imported certificate (As mentioned in Prerequisites) using client tools or even online tools such as: SSL Shopper. Use the DER/Binary certificate we just created and export it to “Standard PEM” format.
SSL Shopper:
- Login to https://www.sslshopper.com/ssl-converter.html
- Choose DER encoded binary X.509 (.cer)
- Select DER/Binary for Type of current certificate
- Select Standard PEM for Type To Convert To
- Copy the PEM to Text editor
Copy the PEM Cert from Text editor and paste in below PEM text box which is under certificate → SAML 2.0 ( Trust Store Cert as type)

ADFS Relying Party Trusts Configuration
- Login to ADFS and Click on Relying Party Trusts and right click and click on Add Relying Party Trusts as shown below
ADFS Claim Rules Configuration
- Select the Relying Party and right click to edit claim rules
- Click on Add rule button on Issuance Transform Rules tab
- Select Claim Rule template as “Send LDAP Attributes as Claims”
- Specify the “Claim Rule name” and select Active Directory as Attribute Store
- Select Email-Address as LDAP Attribute and NAME ID as Outgoing Claim Type
- Click Finish, Apply and OK
Please check the below snap shots of each step mentioned above





Adding User in Active Directory Users and Computers
- Click start and Select Active Directory Users and Computers
- Navigate to Users tab and Right click-->New-->User
- Input FirstName and LastName and User Logon Name(salugu@domain.com)
- Click Next and Input Password and Select Password never expires
- Copy the user logon address
- Click finish and Double click on User
- Past the copied Login email address in email field
- Apply and Click OK
Adding User in ServiceNow Instance
- Log on to your ServiceNow instance
- Application Navigation->Systems and Security->Click Users
- Click on New button and Create a new user and Input email address copied earlier(salugu@domain.com)
- Save
Testing
IDP Initiated Authentication:
- Hit ADFS logon URL(https://your adfs domain/adfs/ls/idpinitiatedsignon.aspx)
- Select your Relying party and Proceed
- Input ADFS user credentials and Proceed
- You should be able to logon to ServiceNow
- SP Initiated Authentication:
- Hit ServiceNow Instance logon URL(https//<Your Instance>.service-now.com/navpage.do)
- Select your Relying party and Proceed
- Input ADFS user credentials and Proceed
- You should be able to logon to ServiceNow
Workaround for login to the Servicenow instance directly
- Bypassing external authentication-ADFS

Once we Enable External Authentication and Configuration of SAML 2 Single sign on plugin as shown above, Users will not be able to login to the ServiceNow instance by usual login URL(https://demo.service-now.com). Single sign on settings prevent users from logging into ServiceNow instance instance directly without ADFS login.
To overcome from the above issue, we have a below workaround.We have to use the below mentioned URL:
http://.service-now.com/side_door.do
Administrators can use the following URL to bypass external authentication and log in with a local ServiceNow user
No comments:
Post a Comment