Getting started with credentials
-
- UpdatedJan 30, 2025
- 3 minutes to read
- Yokohama
- External Credential Storage
The MID Server uses the credentials you create in the Credentials [discovery_credentials] table to access resources for Discovery, Orchestration, Service Mapping, and Cloud Management.
How MID Servers use credentials
By default, Windows MID Servers use the login credentials of the MID Server service on the host machine to discover Windows devices in the network. You should Configure Windows MID Server service credentials so that they have at least local administrator privileges. For Linux and UNIX machines and network devices, the MID Server uses the SSH and SNMP credentials configured in the instance in .
MID Servers that Orchestration uses must have access to the necessary credentials to execute commands on computers in the network, as specified by the Workflow activities. Orchestration can use the same SSH and SNMP credentials as Discovery, but has two additional credentials designed for specific Workflow activities: Windows (for PowerShell activities) and VMware.
Encryption and decryption
The platform stores credentials in an encrypted field on the Credentials [discovery_credentials] table. Once they are entered, they cannot be viewed.
- The credentials are decrypted on the instance with the password2 fixed key.
- The credentials are re-encrypted on the instance with the MID Server's public key.
- The credentials are encrypted on the load balancer with SSL.
- The credentials are decrypted on the MID Server with SSL.
- The credentials are decrypted on the MID Server with the MID Server's private key.
Credential order
- Orchestration attempts to run a command on an SSH server, such as a Linux or a UNIX machine.
- Discovery attempts to query an SNMP device, such as a printer, router, or UPS.
[dscy_credentials_affinity]
table. All subsequent discoveries or Orchestration
activities attempt to match the credentials in this table with a device for which an affinity
exists. If credentials for a device change, Discovery and Orchestration try all available
credentials again until they create a new affinity.
- The credentials table contains many credentials, with some used more frequently than others. For example, the table contains 150 SSH credentials, and five of those credentials are used to log in to 90% of the devices. It is good practice to configure those five credentials with low-order numbers, which place them at the top of the execution list. Discovery and Orchestration work faster when they try these common credentials first. After the first successful connection, the ServiceNow AI Platform knows which credentials to use the next time for each device.
- The ServiceNow AI Platform has aggressive login security. For example, configure database credentials with a low-order value if Solaris database servers in the network only provide three failed login attempts before locking out the MID Server.
Credential aliases
Credential aliases are available for Discovery and Orchestration.
- Employ a credential filtering behavior with configurable levels of compliance.
- Assign multiple credential aliases to a Discovery schedule.
- Prevent the creation of credential affinities that use inappropriate or sensitive credentials. To learn more, see credential affinities.
- Assign individual credentials to any activity in an Orchestration workflow
- Assign individual credentials to any action in Flow Designer
- Assign different credentials to each occurrence of the same activity type in an Orchestration workflow.
- Assign different credentials to each occurrence of the same action in designer flow.
External credential stores
If you do not want credentials stored in your instance, you can use external credential repositories. External credential stores save the credentials in an external site that your instance can access. CyberArk is the only supported external credential store. However, other external stores can be configured using the ServiceNow API.