- Post History
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
2 hours ago - edited 2 hours ago
ServiceNow + Microsoft 365 IntegrationWhich Path to Choose? Pre-published vs Self-configured |
The choice between Pre-published and Self-configured connection methods is one of the most important architectural decisions when integrating ServiceNow with Microsoft Teams and Microsoft 365. This guide provides a comprehensive comparison to help you make the right choice for your organisation.
At a Glance
|
Pre-published App ServiceNow-Managed A simple, out-of-the-box solution managed by ServiceNow. Ideal for organisations with a single instance and limited Azure expertise. |
Self-configured App Customer-Managed A flexible, powerful solution managed entirely by you. Requires Azure expertise but offers complete control and scalability. |
Pros & Cons
|
Pre-published App
✓ Pros
✗ Cons
|
Self-configured App
✓ Pros
✗ Cons
|
Detailed Comparison
| Feature / Aspect | Pre-published App (ServiceNow-Managed) |
Self-configured App (Customer-Managed) |
| Instance Mapping | Strict 1:1 (one ServiceNow instance per Azure tenant) | Flexible 1:N or N:1 (multiple instances per tenant) |
| Security Control | Fixed permissions set by ServiceNow; changes may require re-consent | Full customer control with granular API permissions |
| Connectivity | Uses ServiceNow collaboration proxy | Direct connection to Microsoft Azure |
| Best For | Simple setups with low Azure expertise; single environment testing | Complex environments needing full SDLC and security compliance |
| Regulated Markets | ✗ Not supported (e.g., GCC-H, DoD) | ✓ Mandatory for regulated environments |
| Administrative Control | ServiceNow manages the Azure application | Customer creates and maintains in their tenant |
| Role Separation | Azure Admin must access ServiceNow to grant consent | Azure Admin works entirely in Azure portal; credentials handed to ServiceNow team |
Which Path Should You Choose?
To help determine the most suitable path for your organisation, consider the following scenarios:
|
🚀 Choose Pre-published if:
|
🛡️ Choose Self-configured if:
|
Critical Customer Learnings
One of the most significant real-world challenges with the pre-published approach is the limitation on testing and iteration.
- Testing Constraint: Because the proxy table only holds unique Azure tenant IDs, you cannot have your Production, Staging, and QA instances connected to your corporate Microsoft tenant simultaneously.
- Operational Risk: To test a fix or upgrade in a lower environment, you would have to uninstall your Production connection first, leading to unacceptable downtime.
- The Solution: The self-configured approach allows a realistic SDLC. You can create a distinct Azure app for each ServiceNow instance within the same tenant.
💡 Multi-Tenant Strategy for Enterprise Customers
Enterprise organisations with multiple Azure tenants/domains within their Entra ID environment can leverage a multi-tenant strategy with Pre-published:
- Production instance → Connect to your primary/main Azure tenant
- Dev/QA/Staging instances → Connect to secondary Azure tenant(s)
This approach allows customers to maintain the simplicity of Pre-published while still supporting a full SDLC across environments. Note: This option is available to organisations that have multiple Azure tenants/domains configured in their environment.
Security teams often require precise oversight of what data an integration can access.
- Fixed Permissions: The pre-published app uses bundled permissions maintained by ServiceNow. Adding new features may require an Azure Global Admin to re-consent to the entire app.
- Regulated Markets: If your organisation operates in GCC-H or DoD, the self-configured approach is mandatory. Microsoft policies in these sectors often prohibit proxy-based communication.
- Customization: Self-configuration allows your security team to grant least-privileged access required for your specific use cases.
The administrative effort for these integrations often falls across two different teams: ServiceNow Admins and Azure (Entra ID) Admins.
- Workflow Friction: In the pre-published model, the Azure Admin must often log into the ServiceNow instance to consent to the app—a platform they typically don't use, creating security concerns.
- Azure-Native Workflow: The self-configured approach aligns better with standard IT operations. The Azure Admin can perform all tasks within the Microsoft Azure portal, simply providing credentials to the ServiceNow team.
For organisations with strict governance policies, the choice of connection method can significantly impact operational workflows.
- The Challenge: Some organisations enforce policies where Azure Admins must never access external platforms—even for one-time setup activities. The pre-published approach requires the Azure Admin to log into ServiceNow to grant consent, which violates this separation of duties.
- The Solution: With self-configured, the Azure Admin works entirely within the Azure portal—creating the app registration, configuring permissions, and generating credentials. These credentials are then securely handed off to the ServiceNow team to complete the integration. Neither team needs access to the other's platform.
Think of it this way: The pre-published app is like a pre-configured appliance—it works instantly out of the box with minimal effort but cannot be modified or used in complex ways. The self-configured approach is more like custom-built infrastructure—it requires a skilled team to design and assemble it, but it provides the power and flexibility to handle a massive enterprise with diverse security and testing needs.
Related Resources
- ServiceNow Documentation: Pre-published App Configuration
- ServiceNow Documentation: Self-configured App Configuration
- Best Practices: ServiceNow for Microsoft Teams (FAQs)
Have questions? Leave a comment below or check out the full FAQ article for more details.