Skip to content

Commit dac38c1

Browse files
backport of commit 38ad49d (#28830)
Co-authored-by: Sarah Chavis <[email protected]>
1 parent 27ffe7a commit dac38c1

File tree

2 files changed

+20
-10
lines changed

2 files changed

+20
-10
lines changed

website/content/docs/platform/servicenow/configuration.mdx

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -88,15 +88,25 @@ authPriv | MD5 or SHA | DES | Auth based on HMAC-MD5 or HMAC-SHA
8888

8989
### Configuring the resolver to use a secret
9090

91+
<ImageConfig hideBorder caption="Vault credential resolver">
92+
93+
![Partial screenshot of the ServiceNow UI showing the search dialog for adding a Vault configuration by name](/img/service-now/vault-credential-resolver-fqcn.png)
94+
95+
</ImageConfig>
96+
9197
In the ServiceNow UI:
9298

93-
* Navigate to "Discovery - Credentials" -> New
94-
* Select a type from the list
95-
* Tick "External credential store"
96-
* Fill in a meaningful name
97-
* Set "Credential ID" to the path in Vault where your secret is located, e.g.
98-
for a KV v2 secret engine mounted at "secret", you might have a secret stored
99-
under "ssh": `secret/data/ssh`. Check the [API docs](/vault/api-docs/secret/) for
100-
your secret engine if you are unsure of the path to use
101-
* **Optional:** Click "Test credential" and select a MID server and a target
102-
to test against to test everything is working
99+
1. Navigate to "Discovery - Credentials &rarr; New".
100+
1. Choose a type from the list.
101+
1. Select "External credential store".
102+
1. Provide a fully qualified collection name (FQCN):
103+
- **Xanadu (Q4-2024) or newer**: use `com.snc.discovery.CredentialResolver`
104+
- **Versions prior to Xanadu (Q4-2024)**: leave blank or use "None"
105+
1. Provide a meaningful name for the resolver.
106+
1. Set "Credential ID" to the
107+
[ReadSecretVersion endpoint](/vault/api-docs/secret/kv/kv-v2#read-secret-version)
108+
of your secrets plugin and credential. For example, the endpoint
109+
for a secret stored on the path `ssh` under a KV v2 secret engine mounted at
110+
`secret` is `/secret/data/ssh`.
111+
1. Click "Test credential" then select a MID server and target to test your
112+
configuration.
67.1 KB
Loading

0 commit comments

Comments
 (0)