Copilot integration with Servcenow
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-05-2026 11:09 AM
I am trying to integrate copilot with ServiceNow using below MS documents but getting access/permission issue while indexing on the copilot end. We have created ALC for a customs role for below tables however still having issues. I even tried with some other OOTB roles and when i impersonate or logged in with that users i can see all the tables data listed below but still fails with access/permission issues. Anyone have any suggestion on this topic?
task
sys_user
sys_user_has_role
sys_user_grmember
sys_user_group
sys_user_role
cmn_location
cmn_department
core_company
https://learn.microsoft.com/en-us/microsoftsearch/servicenow-tickets-admin-setup
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-05-2026 07:36 PM
Please refer this links, see if it helps you:
https://learn.microsoft.com/en-us/microsoft-copilot-service/servicenow-desktop-connect
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2 weeks ago
Microsoft Copilot integration with ServiceNow — access/permission issues during indexing.
Problem: Copilot connector fails with permission errors when indexing ServiceNow tables (task, sys_user,
sys_user_has_role, sys_user_grmember, sys_user_group, sys_user_role, cmn_location, cmn_department, core_company), even though the integration user can see the data when impersonating.
Root Cause Analysis
The Microsoft Graph connector for ServiceNow uses the REST API (Table API), not the UI. The user seeing data in
the UI doesn't mean the REST API has access. Common causes:
1. ACLs block REST but allow UI — The rest_service access type must be explicitly allowed. Check ACLs on each
table for type = rest_service or type = *.
2. Missing web_service_admin or rest_api_explorer role — The integration user needs roles that grant REST Table
API access, not just ITIL/reader roles.
3. Cross-scope ACLs — If tables are in Global scope, the connector's OAuth app must have Global scope access.
4. OAuth token scope too narrow — The ServiceNow OAuth application must grant useraccount scope at minimum. Check
sys_oauth_entity for the registered app.
5. IP access control — ServiceNow may restrict API access by IP range (glide.rest.ip_restriction).
Recommended Fix Steps
1. Grant the integration user: snc_read_only + web_service_admin
2. Verify ACLs: sys_security_acl.list → filter each table → ensure a REST-type read ACL exists
3. Check OAuth: sys_oauth_entity.list → verify token has correct scope and isn't expired
4. Test directly: hit /api/now/table/task?sysparm_limit=1 with the integration user's credentials to isolate
ServiceNow vs Copilot
