I understand that ServiceNow has a side door function/feature that can bypass SSO. Does anyone know how we can activate the side_door.do feature with a local account?

Gregory
Tera Contributor

I understand that ServiceNow has a side door function/feature that can bypass SSO. Does anyone know how we can activate the side_door.do feature with a local account? The user/tester will have the ability to login through entering the “TestUser” user name and password.   

  1. Currently - we cannot sign on in our Dev instance and QA instance with local accounts (TestUser) because of SSO.
  2. We tried the Side_Door.do. 
    1. Doesn’t work.
  3. What configurations might be stopping it?   
  4. Does anyone have any ideas on how we can bypass SSO in in our Dev and QA instance? 
1 ACCEPTED SOLUTION

Brandon Warren
Kilo Guru

As stated above, you should be able to use https://instancename.service-now.com/login.do

*Note, you may have to set a password on the user account you plan to sign in with beforehand. See image below.

find_real_file.png

View solution in original post

7 REPLIES 7

AbhishekGardade
Giga Sage

We do have SSO but we are login using 

https://instancename.service-now.com/login.do

Please mark as Correct Answer and Helpful, if applicable.
Thank You!
Abhishek Gardade

Thank you,
Abhishek Gardade

Ashutosh Munot1
Kilo Patron
Kilo Patron
Hi, Check this you might disabled this page. https://community.servicenow.com/community?id=community_question&sys_id=8cdd4f6ddb9cdbc01dcaf3231f961929 Thanks, ASHUTOSH

Priyanka Gupta
Mega Guru

Ok, so we have SSO set up too. We login with our usual credentials first. Then we navigate to <https://instancename.service-now.com/login.do>and enter our creds again there to login. You have to set password on your profile to make sure you can login with that password.

Brandon Warren
Kilo Guru

As stated above, you should be able to use https://instancename.service-now.com/login.do

*Note, you may have to set a password on the user account you plan to sign in with beforehand. See image below.

find_real_file.png