Back to Integrations

ServiceNow Integration

Connect TigerAccess with ServiceNow ITSM to unify privileged access management within your enterprise service management ecosystem. Automate change requests for infrastructure access, synchronize CMDB data, and leverage ServiceNow approval workflows for access governance.

Features

Enterprise Service Management Integration

Seamlessly integrate privileged access management with your ServiceNow ITSM platform.

ITSM Integration

Automatically create and update ServiceNow tickets for access requests, approvals, and incidents.

Change Request Workflows

Trigger infrastructure access through ServiceNow change management processes with full audit trails.

CMDB Synchronization

Bi-directional sync of infrastructure assets between TigerAccess and ServiceNow CMDB.

Approval Automation

Leverage ServiceNow approval workflows for access requests with automatic escalation and notifications.

Capabilities

Complete ServiceNow ITSM Coverage

Incident ticket creation
Change request automation
CMDB asset sync
Approval workflow integration
Service catalog items
Custom table mapping
REST API integration
Orchestration workflows
Knowledge base integration
SLA tracking
Event management
Problem management
Setup

Get Started in Minutes

Follow these simple steps to integrate TigerAccess with your ServiceNow instance.

1

Configure ServiceNow Integration

Set up OAuth authentication and configure the TigerAccess application in your ServiceNow instance.

tacctl integrations add servicenow \
  --instance=yourcompany.service-now.com \
  --client-id=<oauth-client-id> \
  --client-secret=<oauth-client-secret> \
  --sync-cmdb=true \
  --create-change-requests=true
2

Map Access Request Workflow

Configure ServiceNow approval workflows to integrate with TigerAccess access requests.

# ServiceNow Flow Designer Configuration
# Trigger: TigerAccess Access Request Created
# Actions:
#   1. Create Change Request (type: Standard)
#   2. Add Approval - Manager
#   3. Add Approval - Security Team
#   4. On Approval: Call TigerAccess API
#      POST /api/v1/access-requests/{id}/approve
#   5. On Rejection: Call TigerAccess API
#      POST /api/v1/access-requests/{id}/deny
3

Test Integration

Verify that access requests create ServiceNow tickets and approvals flow bidirectionally.

# Request access to a production database
tac request access \
  --resource=db/postgres-prod \
  --duration=2h \
  --reason="Deploy schema migration per CHG0012345"

# This will:
# 1. Create ServiceNow change request
# 2. Request approvals from configured approvers
# 3. Grant access upon approval
# 4. Link all sessions to the change ticket
Use Cases

Real-World ITSM Scenarios

Automated Change Control

Route all production access requests through ServiceNow change management. Automatically create change requests for privileged access with required approvals, risk assessment, and implementation plans.

Incident Response Integration

Grant emergency access to critical systems during P1 incidents. Automatically link privileged sessions to ServiceNow incident tickets for complete audit trails and post-incident analysis.

CMDB-Driven Access Control

Synchronize infrastructure inventory from TigerAccess to ServiceNow CMDB. Use CMDB data to enforce access policies based on asset classification, ownership, and business criticality.

Compliance Reporting

Generate comprehensive access reports for SOC 2, ISO 27001, and HIPAA audits. Link all privileged access sessions to ServiceNow tickets for complete traceability and compliance evidence.

FAQ

Frequently Asked Questions

How does TigerAccess integrate with ServiceNow change management?

TigerAccess can automatically create change requests in ServiceNow when users request privileged access. The integration supports standard, normal, and emergency change types. Access is granted only after the change request receives required approvals, ensuring compliance with your ITIL processes.

Can I use existing ServiceNow approval workflows?

Yes. TigerAccess integrates with your existing ServiceNow approval workflows and assignment rules. You can configure which access requests require ServiceNow approvals, leverage multi-level approval chains, and use ServiceNow's delegation and escalation features.

How does CMDB synchronization work?

TigerAccess can bi-directionally sync infrastructure assets with ServiceNow CMDB. Discovered servers, databases, and applications in TigerAccess are automatically created or updated in CMDB as Configuration Items (CIs). You can map TigerAccess resource types to ServiceNow CI classes and maintain relationships.

What happens during incident response?

During P1/P2 incidents, TigerAccess can provide emergency access while automatically creating or updating ServiceNow incident tickets. All privileged sessions are linked to the incident for audit purposes. Post-incident, you have complete visibility into who accessed what systems during the incident response.

Can I create custom integrations with ServiceNow?

Yes. Beyond the standard integration, you can use ServiceNow Flow Designer, Integration Hub, and REST APIs to create custom workflows. Common examples include: auto-provisioning access based on HR onboarding tickets, revoking access on offboarding, and triggering security reviews based on access patterns.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available