Skip to main content

ServiceNow permissions

Roles and permissions

  • Only administrators can configure the ServiceNow integration for their organization

Administrator permissions for configuring the ServiceNow integration

In ServiceNow, you must create at least one administrator account that is used to configure the Hyperproof integration. It should have the following roles:

  • admin

  • snc_read_only

These roles are used to query the sys_ui_* tables so fields are rendered when creating a new task in Hyperproof. No other ServiceNow preset roles or ACLs allow the same access. The snc_read_only role restricts the user to only read access on everything it can see.

User permissions for linking Hyperproof tasks to ServiceNow tasks

In ServiceNow, create a user or service account for each user who will link Hyperproof tasks to ServiceNow tasks. These users must have the ITIL role OR the three following roles assigned:

  • sn_incident_write

  • sn_problem_write

  • sn_request_write

These roles are used to read and write data to the linked ServiceNow object and keep it in sync with the coordinating Hyperproof task. Additionally, the ServiceNow user account should have read permission on the sys_audit table. It's recommended to create a custom role and add it to the existing sys_audit read ACL. Hyperproof uses this while syncing to replay all ServiceNow task activity on the Hyperproof task (comments, field changes, etc).

Note

See the official ServiceNow documentation for more information on base system roles.

Add these users to assignment groups in ServiceNow. Membership in assignment groups determines which ServiceNow tasks and task types the user can create. Users in Hyperproof are matched with users in ServiceNow based on their email address. To ensure that tasks are assigned to the correct person in ServiceNow they must have the same email address in both systems.