Skip to main content
McAfee Enterprise MVISION Cloud

Configure an IdP in ServiceNow

Use the following steps to configure identity providers such as ADFS and Okta in ServiceNow.

NOTE:  This topic is covered for the Kingston release. You might see some changes in the later releases of ServiceNow.

Step 1: Create a ServiceNow Instance

Before you create a ServiceNow instance, register and create a ServiceNow Developer account using the link Once the account is created, perform the following actions:

  1. Log in to the ServiceNow Developer account and go to Manage > Instance.
  2. Click Request Instance.
  3. Enter the reason for using the ServiceNow personal developer instance and click I understand.
  4. Click the ServiceNow version as Kingston.
  5. Your ServiceNow instance is created. Make sure to take a note of the ServiceNow URL and it is used to Configure the ServiceNow via MVISION Cloud Proxy

NOTE: When you first log in to your ServiceNow developer instance, you are directed to change the admin password, so take note of the password provided above. Then change the admin password before continuing.

Step 2: Configure ServiceNow via MVISION Cloud Proxy


  • You need a configured ServiceNow proxy to support MVISION Cloud Gateway. If you do not have configured proxy, a contact MVISION Cloud Support to allocate your IP address with your tenant.
  • You have a configured ServiceNow proxy but you are using a different ServiceNow instance, then unmanage this service and manage again using the new ServiceNow URL.
  • The ACS can be modified to use the manage device check. So it is not necessary to set up SAML proxy for ServiceNow.

To configure ServiceNow instance via MVISION Cloud proxy:

  1. Login to MVISION Cloud with your tenant.
  2. Go to Settings > Service Management.
  3. Under the Services list, click ServiceNow and select your instance.
  4. Click the Setup tab, and under Proxy, click Get Started
  5. Under Configure proxy, click Configure
  6. For Select Proxy Location, select MVISION Cloud. Click Next.
  7. Enter the ServiceNow URL received from Step 1 in the Host Name and click Done
  8. Once the proxy is configured, you are redirected to the Setup page. Under Configure proxy, click Show Details and copy the Proxy URL.

    Click the Proxy URL link to open in the new browser window or paste the Proxy URL in the new browser window. If you can access the ServiceNow Proxy URL through MVISION Cloud, you have successfully configured ServiceNow via MVISION Cloud Proxy.

NOTE: Make sure to take a note of the Proxy URL (including the prefix www) to complete the IdP integration with ADFS. For example,

Step 3: Activate and Configure SAML for ServiceNow

SAML activates through the Integration - Multiple Provider Single Sign-On Installer plug-in.

To enable the Multiple Provider Single Sign-On in ServiceNow:

  1. Open the ServiceNow URL in the direct browser.
  2. Go to Plugins and search for single sign.
  3. Click the Integration - Multiple Provider Single Sign-On Installer link.
  4. Click Activate / Upgrade.
  5. You are redirected to Activate Plugin dialog. Click Activate.
  6. Now, you can see the progress bar in the Plugin Activation window.
  7. On the successful completion of Plugin Activation, click Close & Reload Form.
  8. You can see the status as Active in the reloaded form.

Step 4: Configure System Property in ServiceNow

McAfee Enterprise MVISION Cloud supports IdP configuration in ServiceNow only when the following configurations are met.

Before you configure IdP in ServiceNow, make sure to configure the system property in ServiceNow:

  1. In the Filter navigator, enter and click enter.
  2. Create a System Property and configure the following parameters:
    • Name. Enter the name as glide.authenticate.multisso.test.connection.mandatory.
    • Type. Select the type as true|false from the menu.
    • Value. Set the value as false.
  3. Click Submit.

Step 5: Modify the SAML Script in ServiceNow

To support the SP initiated login for ServiceNow, modify the SAML Script file.

  1. Go to Multi Provider SSO and click Single Sign-On Scripts.
  2. Deselect the existing filter Name starts with MultiSSO and search for SAML 2.
  3. Click SAML2_update1 and scroll down to line 915 of the script. This line is for the Kingston version. It can be modified to use for other ServiceNow versions.
  4. Update line 915 of the script with the following code:
    if (inResponseTo && this.inResponseTo && !
    (this.inResponseTo.equals(inResponseTo) ||

  5. Click Update.

Now, the ServiceNow is successfully configured to use the IdPs. To configure ADFS  and Okta, see ServiceNow SSO Integration with ADFS using SAML and ServiceNow SSO Integration with Okta using SAML.

  • Was this article helpful?