ServiceNow - SAML IDR SSO Configuration RSA Ready Implementation Guide
Originally Published: 2023-09-14
This section describes how to integrate ServiceNow with RSA Cloud Authentication Service using IDR SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using IDR SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Search for ServiceNow and click Add.
- Enter a name for the application in the Name field on the Basic Information page.
- Choose Identity Router in the Basic Information section and click Next Step.
- Navigate to the Initiate SAML Workflow section.
In the Connection URL field, verify the default setting.
-
Choose IDP-initiated or SP-Initiated as applicable.
- Scroll down to the Identity Provider section.
- Under the Identity Provider Entity ID section, click the Override option and paste the connection URL from RSA.
- Identity Provider URL is automatically generated.
- Identity Provider Entity ID is automatically generated.
- Click Generate Cert Bundle.
- Provide a common name for your company certificate and click Generate and Download.
- Click Choose File and upload the private key from the generated certificate bundle.
- Click Choose File and upload the certificate from the generated certificate bundle.
The public certificate in the bundle is used for the ServiceNow configuration.
- Scroll down to the Service Provider section and enter the following details:
- Assertion Consumer Service (ACS) – https://<Service provider domain>.service-now.com/navpage.do.
- Audience (Service Provider Issuer ID) – https://< Service provider domain >.service-now.com.
- Scroll down to the User Identity section.
- Verify that the settings are correct for your environment.
For example, the username is presented in email format and the user account will be validated against the User Store selected. - Click Next Step.
- On the User Access page, select the access policy that the identity router will use to determine which users can access the application.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes.
- Perform the following steps if export metadata is required:
- Navigate to Applications > My Applications.
- Locate your ServiceNow application instance in the list.
- In the Edit option, select Export Metadata.
Configure ServiceNow
Perform these steps to configure ServiceNow.
Procedure
- Log on to ServiceNow admin console https://developer.servicenow.com
- Click Start Building if you are using ServiceNow classic.
The ServiceNow Home page appears. - Verify if the Multiple Provider single sign-on Installer plugin is installed and activated by performing the following step:
- Under All, search for Multi-Provider SSO in the search bar.
If the plugin is properly installed and activated, it appears in the list.
- Under All, search for Multi-Provider SSO in the search bar.
- If the plugin is unavailable in the list, install and activate it by performing the following steps:
- In the left pane, search for the System Definition in the search box, and then click Plugins.
- Search for Integration - Multiple Provider single sign-on Installer.
- Install and activate the plugin.
- In the left pane, search for the System Definition in the search box, and then click Plugins.
- Navigate to Multi-Provider SSO > Federations > Administration > Properties.
- Select Enable multiple provider SSO.
- Type the text 'email' in the User identification field.
- Navigate to Multi-Provider SSO > x509 Certificate.
- Click New.
- Enter a Name.
- Copy the public certificate generated from the RSA to the PEM Certificate field.
- Click Submit.
- Navigate to Multi-Provider SSO > Identity Providers and click New > SAML.
- In the Import Identity Provider dialog box, click XML.
- In the Enter the XML text box, paste the metadata copied from RSA and click Import.
- Enter a name for the Identity Provider.
- Select the Default check box if required for your configuration.
- In the Identity Provider URL and Identity Provider’s AuthRequest fields, enter the portal URL from RSA.
- In the ServiceNow Homepage field, enter the ACS URL.
https://<your_instance>.service-now.com/navpage.do
- In the Entity ID/Issuer and Audience URI field, enter https://<your_instance>.service-now.com.
- In the NameID Policy field, enter urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
- In the Advanced tab, enter the following if not auto-populated:
- User Field - email
- NameID Attribute - blank
- Protocol Binding for the IDP's AuthnRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutResponse - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- AuthnContextClassRef Method - urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
- In the User Provisioning tab, click Update User Record Upon Each Login.
- Scroll down to the X.509 Certificates section.
- Click Edit and select the certificate added in Step 6 from the collection.
- Save the selection.
- Click Update.
- Navigate to Multi-Provider SSO > Identity Providers and right-click the Identity Provider name.
- Select Copy sys_id.
- Go to All > User Administration >Users.
- Search for your user and select the user.
- If a column named SSO Source is unavailable, add it by performing the following steps:
- Right-click the hamburger icon on the top-left corner of the page and go to Configure > Form Layout.
- Add SSO Source to the Selected list.
- Click Save.
- Right-click the hamburger icon on the top-left corner of the page and go to Configure > Form Layout.
- Edit the user and add sso: followed by sys_id of the identity provider’s record.
- Click Update to complete the changes made to the user.
- Navigate to All > Identity Providers and select your identity Provider record.
- Make sure that the browser pop-up is allowed and click Test Connection.
- On successful connection, select Activate to activate the configuration and click Set Auto Redirect IdP.
Configuration is complete.
Return to main page.
Related Articles
ServiceNow - RSA Ready Implementation Guide 56Number of Views ServiceNow - SAML My Page SSO Configuration - RSA Ready Implementation Guide 19Number of Views ServiceNow - SAML Relying Party Configuration - RSA Ready Implementation Guide 19Number of Views RSA Identity Governance and Lifecycle ServiceNow Connector Page error 16Number of Views RSA Governance & Lifecycle Integration: ServiceNow Summary 34Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?