Ebonding: Authorization & Security architecture
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-16-2023 02:55 AM
We are working in ServiceNow to ServiceNow Ebonding and need suggestions on overall architecture & best practices for authorization & Security.
1. In ebonding, main network connectivity will be happening between two ServiceNow instances. How this connectivity will happen. Does it happen within ServiceNow cloud or it has internet exposure?
2. Any pros/Cons OR suggestions on setting up authorization especially for ebonding solution (Basic, OAuth, Certificate)?
- Labels:
-
Architect
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-17-2023 01:28 PM - edited ‎04-28-2025 09:44 PM
In ebonding, main network connectivity will be happening between two ServiceNow instances Chicago limo service. How this connectivity will happen. Does it happen within ServiceNow cloud or it has internet exposure?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-19-2023 02:30 PM
Hi, connectivity - you answered above. If cloud tools integration example servicenow to servicenow no additonal effort. Its secured connection it will allow. If error persist your network team can answer it.
Authentication and Authorization - based on the tool. But the recommendation is oAuth. Cons can be classified by which tool you are integrating.
Suresh.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-27-2023 12:37 AM
For Connectivity, I see following scenario - considering two companies A & B having two ServiceNow instances.
Here is how the network communication will flow:
1. USER A => ServiceNow Instance A ========> ServiceNow Instance B
2. USER B => ServiceNow Instance B ========> ServiceNow Instance A
Does this communication between two ServiceNow instance happen within ServiceNow Data center only OR the network goes through internet - which may need additional security considerations based on client requirements.