How to change passwords for users imported via LDAP?

jordimsant
Tera Guru

Hi everyone,

 

We have a number of users who have been imported into ServiceNow via LDAP. I would like to know if there is any way to change or reset the password of these LDAP users from within ServiceNow and only for ServiceNow— either manually or programmatically. We are waiting for SSO to be implemented and meanwhile we would like some users to access to start UAT, but I have tried to give them password with the "Set Password" UI Action but I had not been capable of doing it.

 

Is this possible at all, or does the password always need to be managed on the LDAP side? If this is the case, one user has tried to use his password of the LDAP directly but he could not access. What would be need in order to use that password? The SSO?

 

Any clarification or best practices would be much appreciated.

 

Thanks in advance!

1 REPLY 1

Dr Atul G- LNG
Tera Patron
Tera Patron

Hi @jordimsant 

When you say users are imported, I assume SSO is also enabled. If not, users can log in with their local accounts and change their passwords. To log in, use instance.service-now.com/login.do.

What you can try: In the list view, you can reset the password by default (similar to how we do bulk updates using Ctrl + Down Arrow).

Also, make sure to mark the “Password Reset Required” field as true and ensure the SSO field is empty for those users.

 

DrAtulGLNG_0-1748945592131.png

 

*************************************************************************************************************
If my response proves useful, please indicate its helpfulness by selecting " Accept as Solution" and " Helpful." This action benefits both the community and me.

Regards
Dr. Atul G. - Learn N Grow Together
ServiceNow Techno - Functional Trainer
LinkedIn: https://www.linkedin.com/in/dratulgrover
YouTube: https://www.youtube.com/@LearnNGrowTogetherwithAtulG
Topmate: https://topmate.io/atul_grover_lng [ Connect for 1-1 Session]

****************************************************************************************************************