Skip to main content
McAfee MVISION Cloud

Integrate MVISION Cloud for ServiceNow with PingFederate SSO

ServiceNow doesn't need a SAML proxy enabled because the ACS URL can be edited. (However, you still need to add shnsaml to the URL to extract the username.)

The changes needed to be made in the IdP and ServiceNow are described here. 

Configure PingFederate SSO IdP

In PingFederate, change the ACS URL to https://www<managed service name>.<primary domain>.<shnpoc/myshn>.net/

For example:

Enable Multi-Provider SSO in ServiceNow

  1. In ServiceNow, go to SAML settings change the Homepage URL to 
    https://www<managed service name>.<primary domain>.<shnpoc/myshn>.net/ 
    For example,
  2. SP-initiated from outside the proxy will not work by default because the request id is saved into a cookie. You need to edit the script to allow this. In the SAML2_update1 script, search for inResponseTo, and modify this line:
if (inResponseTo && !(this.inResponseTo.equals(inResponseTo) ||


if (inResponseTo && this.inResponseTo && !(this.inResponseTo.equals(inResponseTo) ||

For Apache Jakarta and Later

Apache Jakarta and later have a mandatory connection check before saving the SSO configuration, which fails with proxy URLs.

You can disable the "Test connection" feature by following these steps. For example, if your instance name is

  1. Go to and create a new record with the name glide.authenticate.multisso.test.connection.mandatory. Enter as true|false, with the value as false, and provide a relevant description. 
  2. Go to and search for "glide.authenticate.multisso.test.connection.mandatory". You should see the record.
  3. Go to the Multi-SSO plugin, update it with your IdP and proxy details, and click Activate. It should go through the update without the "Test connection" feature.
  4. Once SSO is configured and verified, update the "glide.authenticate.multisso.test.connection.mandatory" value to true by going to After this, for any update, it will ask for the "Test Connection".

Deep Linking

For Deep linking to work you must update the ServiceNow SAML script to always redirect to the proxy when it receives a SAML request.

  1. In the ServiceNow SAML script, set this property: 

glide.authenticate.auth.validate.url = false
  1. In the MultiSSO_SAML2_Update1 script, change this:
if(!samlResponseObject && !relayState) {
 var redirectURL = this.SAML2.generateAuthnRequestRedirectURL(request, false);


if(!samlResponseObject && !relayState) {
    var qs = request.getQueryString();
    var keyword = "shn-direct";
    if (!qs || qs.indexOf(keyword) === -1) {
    this.redirectURL = 'https://www<Skyhigh ServiceNow Managed URL>' + request.getRequestURI();
    if (qs && qs.length() > 0) {
    this.redirectURL += '?' + qs + '&' + keyword;
    } else {
    this.redirectURL += '?' + keyword;
    return this.redirectURL;
    var redirectURL = this.SAML2.generateAuthnRequestRedirectURL(request, false);


For PingFederate, the SP-initiated flow may not work because the SAML request is validated during the SAML response time. To fix this, you can change the IdP Login URL on the SP side.

Instead of setting the URL to be, it should be:

[a page through your proxy – i.e. (and not just]?

For example,

  • Was this article helpful?