Permissions required for DevOps tools
-
- UpdatedJan 30, 2025
- 4 minutes to read
- Yokohama
- DevOps
Permissions required in your third-party tool to connect to DevOps Change Velocity.
Azure DevOps permissions
Important: With the access level permissions specified in the following table in Azure DevOps, and the ServiceNow
DevOps extension, you can connect to Azure DevOps from ServiceNow. Your Azure DevOps admin does not have to manually configure webhooks and service connections in Azure DevOps.
Important:
- When onboarding a Project, the Project Administrators privilege requires the owner of the PAT to be a member of the project's Project Administrators group.
- When onboarding an Organization, the Project Administrators privilege requires the owner of the PAT to be a member of the organization's Project Collection Administrators group.
- Limitation of Azure DevOps
- If you create an Azure tool with custom defined access level, and you reconfigure such a tool because of change in your Integration user credentials, then the existing service hooks for release created and release deployment are not updated. Instead, two new service hooks are created with new configuration details. To avoid the duplication of these service hooks, you must create the tool with full access level.
Bitbucket
GitHub permissions
The following table lists the GitHub permissions for basic authentication.
The following table lists the GitHub permissions required for OAuth 2.0 authentication.
Note: If you are connecting using a GitHub App and are experiencing issues with the permissions check, ensure that your GitHub App's Client ID prefix is available in the DevOps property: Client ID specifier for GitHub
App. For more information, see Add Client ID to DevOps property
GitLab permissions
Object | Permissions required | Impact |
---|---|---|
api | Read and write | Required to discover plans, repos, and pipelines and receive branches, commit, and tags, and pipeline execution details (like stages, artifacts, test results, code security results), work items, tags, branches, and commits either through import, polling, or real time with a configured webhook. Also, to pause or resume the pipelines based on change control step. |
Jenkins permissions
Object | Permissions required | Impact |
---|---|---|
Overall | Read | Required to discover the pipelines and receive pipeline execution details like jobs or stages, artifacts, test results, code security results, and so on, either through import, polling, or real time with ServiceNow DevOps Jenkins plugin. |
Job | Read | Required to discover the pipelines and receive pipeline execution details like jobs or stages, artifacts, test results, code security results, and so on, either through import, polling, or real time with ServiceNow DevOps Jenkins plugin. |
JFrog permissions
Object | Permissions required | Impact |
---|---|---|
Roles | Administer Platform | Required to access artifact details like artifact name, artifact repo, and artifact version. |
Jira permissions
Object | Permissions required | Impact |
---|---|---|
Groups | jira-software-users | Required to discover plans and fetch features, stories, and so on, either through import, polling, or configured webhook. |
Permissions | Jira Administrators | Required to create webhooks automatically for fetching features and stories in real time. |