Create or update an OpenID Connect (OIDC) configuration by using the Multi-Provider SSO plugin.

Before you begin

If you have a client ID, client secret, and well-known configuration URL of the identity provider, you can directly import the OIDC configuration for SSO.

Note: Login option with OIDC IdP is not supported if the domain separation plugin is installed.

If you do not have the required information about the identity provider, you can manually configure OIDC for SSO. After completing the configuration, users can log in to ServiceNow applications using third-party social identity providers like Google Okta.

Procedure

  1. Navigate to All > Multi-Provider SSO > Identity Providers.
  2. Choose one of the following options.
    • To update an existing configuration, click an OIDC Identity Provider record.
    • To create a new configuration, click New and select OpenID Connect.
  3. For a new configuration, enter the OIDC configuration information in one of the following methods.
    OptionDescription
    Import OpenID Connect Well-Known Configuration If you have the well-known configuration URL along with your associated client credentials, you can directly import an OIDC configuration.
    Note: If you import the OIDC well-known configuration, all related fields are auto-populated.
    Manually configure the OIDC Identity Provider form If you do not have an existing OAuth OIDC Entity, close the Import OpenID Connect Well-Known Configuration pop-up and manually fill the fields in the OIDC Identity Provider form.

    All required fields must be filled in on the OIDC Identity Provider form.

    Before you manually fill the OIDC Identity Provider form, ensure that you already have an OAuth Entity Profile for the OIDC IdP.

    If you do not have a OAuth Entity Profile, you can create it using the default External OIDC Provider templates, like Okta, Azure and others.

    The grant type of the OAuth Entity Profile must be with an authorization code. For more information, see Configure an OAuth OIDC provider on the Now Platform.

    Note: You can use the templates of third-party identity providers, Auth0, Azure AD, Google, and Okta are available in the demo data of the Multiple Provider Single Sign-On Installer plugin.
  4. (Optional) Enable automatic user provisioning in the User Provisioning tab>User Provisioning tab.

    You can choose to enable automatic user provisioning during user login. When automatic user provisioning is enabled, a user record is automatically created in the ServiceNow instance if that user record does not exist.

  5. OIDC Entity tab
    You can view and modify the OIDC client configuration and OIDC connect flow using the entity record.
  6. OIDC Provider Configuration tab
    You can view and modify the well-know configuration URL of the OIDC IdP or ID token claim validation.
  7. (Optional) Advanced tab

    Scripts that are run during single sign-on and logout.

    Table 4. Advanced fields
    Property Description
    Single Sign-On Script Script that executes during Single Sign-On. This field is automatically set to MultiSSO_OIDC_custom.
    Logout Script Script that executes after the user logs out. This field is automatically set to MultiSSO_OIDC_logout_custom.
  8. (Optional) On the eSignature Approval tab, configure the eSignature for the OIDC Idp.
    Note: The eSignature Approval tab appears only when you install the Approval with e-Signature plugin (com.glide.e_signature_approvals).
    Table 5. eSignature Approval fields
    Property Description
    Assertion Consumer URL for eSignature authentication If you employ a customized method of handling the OIDC authentication for eSignature, you can set up your own consumer URL. For example, if you are using Multi-Provider SSO, you do not need to use this property. This format of the URL is https://yourinstance.service-now.com/consumer.do
    Authentication pop-up Dialog Width Width of the authentication pop-up dialog. This field is automatically set to 800.
    Authentication pop-up Dialog Height Height of the authentication pop-up dialog. This field is automatically set to 900.
  9. (Optional) Navigate to the login page of the instance to verify that IdP appears as a login option.
    The URL should be in the following format: https://yourinstance/login_with_sso.do?glide_sso_id=sysId_IdP
    Note: If you have enabled Selected as login Option, you can go to the login URL of the instance.
    Multiple OIDC identity providers on the login page.