This article describes how to integrate RSA with ServiceNow using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to ServiceNow.
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- In the Primary Authentication Method list, select your desired login method.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Choose Enter Manually.
- Scroll down to the Service Provider Metadata section.
- Assertion Consumer Service (ACS) – https://<Service provider domain>.service-now.com/navpage.do.
- Audience (Service Provider Issuer ID) – https://< Service provider domain >.service-now.com.
- Choose Default Service Provide Entity ID.
- Click Download Certificate and choose IdP signs assertion within response.
- Click Show Advanced Configuration.
- In the NameID section, use the Identifier Type list to select Email Address and the Property list to select AutoDetect.
- Click Save and Finish.
- On the My Relying Parties page, click the Edit drop-down icon and select View or Download IdP Metadata.
- Click Publish Changes.
Configure ServiceNow
Perform these steps to configure ServiceNow.Procedure
- Log in to ServiceNow admin console - https://developer.servicenow.com.
- Select Start Building if you are using ServiceNow classic.
The ServiceNow home page appears.
The Integration - Multiple Provider single sign-on Enhanced UI plugin needs to be installed and activated for setting up SSO. To confirm that the plugin is installed and activated, perform the following steps:
-
- Select All.
- Search for Multi-Provider SSO in the search bar. This option appears in the list if the plugin is properly installed and activated.
If the plugin is not installed and activated, do so by performing the following steps:
-
- In the left pane, search for the System Definition section in the search box, and then select Plugins.
- Search for Integration - Multiple Provider single sign-on Enhanced UI, and then Install and activate it.
- In the left pane, search for the System Definition section in the search box, and then select Plugins.
- Navigate to Multi-Provider SSO > Federations > Administration > Properties.
- Select Enable multiple provider SSO.
- Enter email in the User identification field.
- Navigate to Multi-Provider SSO >Federations> x509 Certificate.
- Click New, enter a Name, and copy-paste the public certificate generated from RSA in the PEM field.
- Click Submit.
- Navigate to Multi-Provider SSO > Identity Providers and click New > SAML.
- Choose the XML option in the Import Identity Provider dialog box.
- Paste the metadata copied from RSA into the Enter the XML section and click Import.
- Enter the following details if not auto-populated.
- Enter a name for the Identity Provider.
- Select the Default checkbox if desired for your configuration.
- In the Identity Provider URL and Identity Provider’s AuthRequest fields, enter the Identity Provider entity ID if not already populated.
- In the ServiceNow Homepage field, enter the ACS URL if not already populated - https://<your_instance>.service-now.com/navpage.do
- In the Entity ID/Issuer and Audience URI field, enter https://<your_instance>.service-now.com.
- In the NameID Policy field, enter urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
- In the Advanced section, enter the following if not auto-populated:
- User Field - email
- NameID Attribute - blank
- Protocol Binding for the IDP's AuthnRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutRequest - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- Protocol Binding for the IDP's SingleLogoutResponse - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
- urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport in the AuthnContextClassRef Method field
- In the User Provisioning section, select Update User Record Upon Each Login.
- Scroll down to the X.509 Certificates section.
- Select Edit and select the certificate added previously and save the selection.
- Click Update.
- Navigate to Multi-Provider SSO > Identity Providers and right-click the Identity Provider name.
- Select Copy sys_id.
- Navigate to All > User Administration > Users.
- Search for your user and select the user.
- If a column named source is unavailable, add it using the following steps:
- Click the hamburger icon in the upper-left corner of the page and go to Configure > Form Layout.
- Add SSO Source to the Selected column.
- Click Save.
- Click the hamburger icon in the upper-left corner of the page and go to Configure > Form Layout.
- Edit the user and add sso: followed by sys_id of the identity provider’s record to source attribute.
- Click Update to complete the changes made to the user.
- Select All > Identity Providers.
- Select your identity provider record.
- Make sure the browser pop-up is allowed and click Test Connection.
- On successful test connection result, select Activate to activate the configuration and select Set Auto Redirect IdP.
The configuration is complete.
Return to ServiceNow - RSA Ready Implementation Guide.
Related Articles
ServiceNow - RSA Ready Implementation Guide 56Number of Views ServiceNow - SAML My Page SSO Configuration - RSA Ready Implementation Guide 19Number of Views ServiceNow - SAML IDR SSO Configuration RSA Ready Implementation Guide 17Number of Views RSA Identity Governance and Lifecycle ServiceNow Connector Page error 16Number of Views RSA Governance & Lifecycle Integration: ServiceNow Summary 34Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide