- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
New tool in ServiceNow Security Center (SSC)
Identity and Access Management (IAM)
The IAM tools in the SSC can verify that the data in a ServiceNow instance is accessible only to users and processes that need it. IAM consists of three tools for managing access to instance data: Machine identity management, Access Analyzer, and Scripting Governance for the default group.
Machine identity management
Machine identities are digital credentials such as certificates, keys, and tokens. Servers, applications, containers, and cloud services use these identities to authenticate with each other.
Access analyzer
This tool can analyze and view permissions for a selected user, role, or group. Access analyzer also allows comparison of access between two users.
Scripting governance for default group
This console allows customer admins to configure the preferences for the Conditional Script Writer group, which, by default, gets assigned the snc_required_script_writer_permission role. This role will enable users to access scripts and script-like fields across the platform. Customer admins can use this console to turn on or off auto-assignment for this role and manually assign users to this group. The scripting governance can also display users assigned to this group and scan the ServiceNow instance to find users who scripted during a specific time frame.
Machine Identity Console
The ServiceNow Machine Identity Console enables customers to manage inbound integrations with non-human identities (NHIs). NHIs aren’t governed in the same way as human users and aren’t directly associated with a human user; therefore, standard human security measures don’t apply to them.
Machine identities include applications, workloads, APIs, bots, and automated systems. The Machine Identity Console provides a simplified configuration experience for managing applications integrated into ServiceNow. Using this console, customers can identify, authenticate, and authorize different software entities to access secured resources and see a security score along with recommendations.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
