Configure ServiceNow for UserLock Single Sign-On (SSO)
Enable ServiceNow Single Sign-On (SSO) with UserLock to centralize authentication, enforce corporate access policies, and simplify user access to the ServiceNow platform.
This guide explains how to integrate ServiceNow with UserLock Single Sign-On (SSO) using the SAML 2.0 protocol.
Once configured, ServiceNow logins are authenticated by UserLock against Active Directory. This provides a seamless login experience and allows administrators to apply UserLock access policies (MFA, time, machine, or location restrictions) on SSO sessions.
🚩️ Before starting:
- You need a ServiceNow administrator account. 
- UserLock SSO must already be installed and configured. 
- In the UserLock console, go to ⚙️ Server settings ▸ Single Sign-On. 
- In the list of applications, select ServiceNow. 
- Fill in the fields with the following values: - Settings - Values - Application Domain - https://<yourInstance>.service-now.com
 (the domain of your ServiceNow instance)- Email domain - Domain used by users to authenticate (e.g. contoso.com) 
- Save the profile. 
- Ensure the Multi-Provider SSO plugin is installed: - In the ServiceNow search box, type Multi-Provider SSO. 
- If it’s not listed, go to System Definition ▸Plugins. 
- Search for Integration - Multiple Provider Single Sign-On Installer and install or activate it. 
 
- Log in to ServiceNow with an administrator account. 
- Navigate to Multi-Provider SSO â–¸Identity Providers, then click New. 
- When prompted for the SSO type, select SAML. 
- In the Import Identity Provider Metadata dialog box, choose URL and enter: - https://<SSO_domain>/metadata 
- Click Import. - If an error occurs during import: - In the UserLock console, go to ⚙️ Server settings ▸ Single Sign-On. 
- Click on Download â–¸ Metadata file 
- Open the downloaded file with a text editor (e.g. Notepad) and copy its contents. 
- Return to the ServiceNow console, select XML in the import dialog, and paste the content. 
 
 
- Once imported, verify that all fields are populated correctly.  
- Click Test Connection. - If the test is successful, click Activate. 
- If activation fails: - Clear the SingleLogoutRequest field in the Identity Provider settings. 
- Run the Test Connection and Activate process again. 
- Once successful, you can re-enter the SingleLogoutRequest URL: - https://<SSO_domain>/connect/endsession
 - Note- The SingleLogoutRequest field is optional. Keeping it blank during setup helps display more detailed error messages. 
 
- In the Identity Provider record, under Related Links, click Set as Auto Redirect IDP to redirect to UserLock SSO the users accessing your instance homepage. 
- Activate the SSO - Navigate to Multi-Provider SSO â–¸Administration â–¸Properties. 
- Click Enable multi provider SSO. 
 
For common issues, see Troubleshooting SSO.
If the problem persists, please contact IS Decisions Support.
- To disable SSO temporarily: - Open the Identity Provider configuration in ServiceNow. 
- Click Deactivate. 
 
- To bypass SSO and log in with standard credentials: - Go to - https://<yourInstance>.service-now.com/side_door.do
- You’ll be redirected to the default ServiceNow login page where you can sign in using ServiceNow credentials. 
 
- The user account may not exist in ServiceNow. 
- Alternatively, the SAML certificate may be outdated. 
This can occur when testing with a non-existent user.
To update a configuration after a successful test:
- Deactivate the identity provider. 
- Update the configuration. 
- Run Test Connection. 
- Click Activate again. 
You can extend the security of SSO sessions by applying UserLock access policies in addition to authentication.
- Apply MFA on SaaS connections to require stronger authentication. 
- Hour restrictions: define when users are allowed to connect. 
- Geolocation rules: enforce access policies based on user location. 
- Session limits: allow or deny SaaS logins entirely for specific users.