Connection using Authorization Code

To configure the connection using authorization code, perform the following:

  1. Sign in to Identity Security Cloud and create a new OAuth client. Go to Admin > Global > API Management > New.

  2. Type a name in the Description and select the options for Refresh token and Authorization Code.

  3. Enter the Redirect URL, and type the word Scope into the Scopes field. Enable the option for sp:scopes:all to turn it ON.

  4. Select Create, and save the Client ID and Client Secret for configuration on the ServiceNow side.

  5. In ServiceNow, go to System OAuth > Application Registry, and then select New.

  6. On the interceptor page, select Connect to a third-party OAuth provider, and then fill in the form fields.

    • Name: The name you want to give the OAuth client. For example, IDN.

    • Client ID: The client ID of the application registered in Identity Security Cloud; created in step 4.

    • Client Secret: The client secret of the application registered in Identity Security Cloud; created in step 4.

    • Default Grant type: Authorization code.

    • Refresh Token Lifespan: Auto populates the seconds. You may customize the value as needed.

    • Active: Checked.

    • Authorization URL: https://{{ORG_NAME}}.identitynow.com/oauth/authorize

      • {{ORG_NAME}}: The name of the Identity Security Cloud organization.

        • You can check the relevant configuration of your Identity Security Cloud organization at the following link. Replace {{ORG_NAME}} with the name of your organization: https://{{ORG_NAME}}.api.identitynow.com/oauth/info

    • Token URL: https://{{ORG_NAME}}.api.identitynow.com/oauth/token

      • {{ORG_NAME}}: The name of the Identity Security Cloud organization.

    • Redirect URL: https://{{SERVICE_NOW_INSTANCE_HOST}}/oauth_redirect.do

      • {{SERVICE_NOW_INSTANCE_HOST}}: The hostname of the ServiceNow instance.

  7. Generate a Personal Access Token on Identity Security Cloud.

  8. Go to SailPoint Identity Security Cloud for Service Catalog > Setup.

  9. Enter the fully-qualified domain name of your Identity Security Cloud instance in Identity Security Cloud URL. For example, https://<company>.api.identitynow.com

  10. Enter the values of the Client ID and Client Secret that you generated in the above step #7 in Identity Security Cloud Personal Access Token Client ID and Identity Security Cloud Personal Access Token Client Secret.

  11. Select authorization_flow as the OAuth Authorization flow method to be used to obtain the access token to call the REST API.

    • Access request segmentation will not be applied when searching for access in the catalog, however, if a user requests access in a segment (that they are not a part of) an error in ServiceNow appears and explains that the request is not allowed after submission.

  12. In OAuth app name for Authorization code flow, enter the description name that you created in step 2. For example, IDN.

  13. Assign the appropriate role on ServiceNow to a user to access the portal. For more information on the appropriate role, refer to Assigning Roles to the Portal Integration.

  14. Sign in with the Identity Security Cloud user that has the required privileges for intended operations.