The CreatorCon Call for Content is officially open! Get started here.

Add User To Group Across Domains via Microsoft AD Spoke

Stephen Skaggs
Kilo Sage

I am trying to figure out how to successfully add users from one domain to another domain in Active Directory.

example:

Root Domain is the parent domain

  • Domain A contains User A
  • Domain B contains Group A

I am trying to add User A in Domain A to Group A in Domain B but I receive an error since integration hub/flow designer can only support multiple connections by adding the child domains to the parent domain in the AD connection alias. And because of that for some reason when trying to run power shell against one domain connection using a different domain connection it says it is not able to find the cross domain resource.

 

https://community.servicenow.com/community?id=community_question&sys_id=625db24edbb1a450b3c099ead396...

I tried to do it the way it shows in the link, but it didn’t work. The query was messed up and didn’t work properly. I might be doing something wrong. I am still new at power shell so any help is appreciated!

 

1 ACCEPTED SOLUTION
10 REPLIES 10

phoenix516
Tera Contributor

A trust would need to exist between the domains (A && B), the security group would need to be a Domain Local group to allow cross domain objects in it.

I appreciate the input, however there was already a trust between the domains. The issue lies mostly on the ServiceNow MID server script files. Those scripts didn't really account for the multi domain structure when attempting to run PoweShell from the MID server via iHub flow.

I posted an article based on the solution that was able to work and resolve the errors we were receiving from iHub.

_benow
Giga Expert

Hi Stephen

 

I couldn't see the link to the fix, sorry if I'm being dumb!

We are facing the same issue would be great to know how to fix it.

 

Thanks

 

Ben

Sorry I finally was able to post the solution here:

https://community.servicenow.com/community?id=community_article&sys_id=bb95add71b4e01d40b8a9979b04bc...

I hope it helps!

Thanks Stephen

Legendary!