ServiceNow - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2023-09-14
This article describes how to integrate ServiceNow with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console.
- Enable My Page SSO by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO).
- On the Applications > Application Catalog page, search for ServiceNow and click Add to add the connector.
- On the Basic Information page, choose Cloud.
- Enter a name for the configuration in the Name field and click Next Step.
- On the Connection Profile page, click the IdP-initiated option.
- Fill in the Service Provider details in the following format:
- ACS URL: https://<Service Provider Domain>.service-now.com/navpage.do
- Service Provider Entity ID: https:// <Service Provider Domain>.service-now.com
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Select the Override default signing key and certificate and click Generate Cert Bundle.
- Click Show Advanced Configuration and under the User Identity section, select the Property type and Property value.
- Click Next Step.
- Choose your desired Access Policy for this application.
- On the Portal Display page, select Display in Portal.
- Click Publish Changes.
- Click Next Step and click Save and Finish.
- Click Publish Changes. Your application is now enabled for SSO.
Configure ServiceNow
Perform these steps to configure ServiceNow.Procedure
- Log in to ServiceNow admin console - https://developer.servicenow.com.
- Select Start Building if you are using ServiceNow classic.
The ServiceNow home page appears.
The Integration - Multiple Provider single sign-on Enhanced UI plugin needs to be installed and activated for setting up SSO. To confirm that the plugin is installed and activated, perform the following steps:
-
- Select All.
- Search for Multi-Provider SSO in the search bar. This option appears in the list if the plugin is properly installed and activated.
If the plugin is not installed and activated, do so by performing the following steps:
-
- In the left pane, search for the System Definition section in the search box, and then select Plugins.
- Search for Integration - Multiple Provider single sign-on Enhanced UI, and then Install and activate it.
- In the left pane, search for the System Definition section in the search box, and then select Plugins.
- Navigate to Multi-Provider SSO > Federations > Administration > Properties.
- Select Enable multiple provider SSO.
- Enter email in the User identification field.
- Navigate to Multi-Provider SSO >Federations> x509 Certificate.
- Click New, enter a Name, and copy-paste the public certificate generated from RSA in the PEM field.
- Click Submit.
- Navigate to Multi-Provider SSO > Identity Providers and click New > SAML.
- Choose the XML option in the Import Identity Provider dialog box.
- Paste the metadata copied from RSA into the Enter the XML section and click Import.
- Enter the following details if not auto-populated.
- Enter a name for the Identity Provider.
- Select the Default checkbox if desired for your configuration.
- In the Identity Provider URL and Identity Provider’s AuthRequest fields, enter the Identity Provider entity ID if not already populated.
- In the ServiceNow Homepage field, enter the ACS URL if not already populated - https://<your_instance>.service-now.com/navpage.do
- In the Entity ID/Issuer and Audience URI field, enter https://<your_instance>.service-now.com.
- In the NameID Policy field, enter urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
- In the Advanced section, enter the following if not auto-populated:
- User Field - email
- NameID Attribute - blank
- Protocol Binding for the IDP's AuthnRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutResponse - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport in the AuthnContextClassRef Method field
- In the User Provisioning section, select Update User Record Upon Each Login.
- Scroll down to the X.509 Certificates section.
- Select Edit and select the certificate added previously and save the selection.
- Click Update.
- Navigate to Multi-Provider SSO > Identity Providers and right-click the Identity Provider name.
- Select Copy sys_id.
- Navigate to All > User Administration > Users.
- Search for your user and select the user.
- If a column named source is unavailable, add it using the following steps:
- Click the hamburger icon in the upper-left corner of the page and go to Configure > Form Layout.
- Add SSO Source to the Selected column.
- Click Save.
- Click the hamburger icon in the upper-left corner of the page and go to Configure > Form Layout.
- Edit the user and add sso: followed by sys_id of the identity provider’s record to source attribute.
- Click Update to complete the changes made to the user.
- Select All > Identity Providers.
- Select your identity provider record.
- Make sure the browser pop-up is allowed and click Test Connection.
- On successful test connection result, select Activate to activate the configuration and select Set Auto Redirect IdP.
The configuration is complete.
Return to ServiceNow - RSA Ready Implementation Guide.
Related Articles
ServiceNow - RSA Ready Implementation Guide 56Number of Views ServiceNow - SAML Relying Party Configuration - RSA Ready Implementation Guide 19Number of Views RSA Identity Governance and Lifecycle ServiceNow Connector Page error 16Number of Views ServiceNow - SAML IDR SSO Configuration RSA Ready Implementation Guide 17Number of Views RSA Governance & Lifecycle Integration: ServiceNow Summary 34Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?