Permissions required in your third-party tool to connect to DevOps Change Velocity.

Azure DevOps permissions

Important: With the access level permissions specified in the following table in Azure DevOps, and the ServiceNow DevOps extension, you can connect to Azure DevOps from ServiceNow. Your Azure DevOps admin does not have to manually configure webhooks and service connections in Azure DevOps.
Important:
  • When onboarding a Project, the Project Administrators privilege requires the owner of the PAT to be a member of the project's Project Administrators group.
  • When onboarding an Organization, the Project Administrators privilege requires the owner of the PAT to be a member of the organization's Project Collection Administrators group.
Limitation of Azure DevOps
If you create an Azure tool with custom defined access level, and you reconfigure such a tool because of change in your Integration user credentials, then the existing service hooks for release created and release deployment are not updated. Instead, two new service hooks are created with new configuration details. To avoid the duplication of these service hooks, you must create the tool with full access level.

Bitbucket

GitHub permissions

The following table lists the GitHub permissions for basic authentication.

The following table lists the GitHub permissions required for OAuth 2.0 authentication.

Note: If you are connecting using a GitHub App and are experiencing issues with the permissions check, ensure that your GitHub App's Client ID prefix is available in the DevOps property: Client ID specifier for GitHub App. For more information, see Add Client ID to DevOps property

GitLab permissions

Object Permissions required Impact
api Read and write Required to discover plans, repos, and pipelines and receive branches, commit, and tags, and pipeline execution details (like stages, artifacts, test results, code security results), work items, tags, branches, and commits either through import, polling, or real time with a configured webhook. Also, to pause or resume the pipelines based on change control step.

Jenkins permissions

Object Permissions required Impact
Overall Read Required to discover the pipelines and receive pipeline execution details like jobs or stages, artifacts, test results, code security results, and so on, either through import, polling, or real time with ServiceNow DevOps Jenkins plugin.
Job Read Required to discover the pipelines and receive pipeline execution details like jobs or stages, artifacts, test results, code security results, and so on, either through import, polling, or real time with ServiceNow DevOps Jenkins plugin.

JFrog permissions

Object Permissions required Impact
Roles Administer Platform Required to access artifact details like artifact name, artifact repo, and artifact version.

Jira permissions

Object Permissions required Impact
Groups jira-software-users Required to discover plans and fetch features, stories, and so on, either through import, polling, or configured webhook.
Permissions Jira Administrators Required to create webhooks automatically for fetching features and stories in real time.