Requirements

Information that will help you design and plan the implementation of the 1E Core application in your organization. This includes all the prerequisites and dependencies that are necessary to install the 1E Core application.

This page is part of the design phase of implementation.

1E Core provides ServiceNow with access to 1E instructions in order to provide functionality to 1E ServiceNow solutions (such as 1E ITSM Connect and 1E Service Catalog Connect).

1E requirements

Category

Requirement

More details

1Esystem

(Basic Authentication)

  • A complete infrastructure of 1E (on-premises) is required, either in a local network or hosted over the internet. This includes the 1E Client, deployed to all devices that you need to manage.

  • The Basic Authentication feature (if applicable) must be installed on the 1E Platform Server (Master Stack), and enabled in the Consumer web application.

Planning for 1E 8.1

Disable 1E Two-factor Authentication

 

Enable Basic Authentication

1E system

(Modern Authentication)

  • A complete infrastructure of 1E (Saas) is required, either in a local network or hosted over the internet. This includes the 1E Client, deployed to all devices that you need to manage.

  • The Modern Authentication is to be setup either using Microsoft Entra ID or Okta for external IdP.

Modern authentication

1E consumer

  • A consumer with the name 1EServiceNowCore must be registered in the 1E Settings application, Configuration, Consumers page.

  • When you add the consumer name, it will create an entry in the dbo.Consumer table of the Tachyon Master database. You must follow the instructions given in the link opposite to change the consumer's Workflow setting in the database to the following value:

    Copy
    [{"ReferenceType":0,"InstructionWorkflow":[{"InstructionType":1,"Workflow":{"StateMachine":"State"}}]}]

Add the ServiceNow consumer to 1E

1E administrator

  • One or more 1E users are assigned the following role(s) for the following purposes. Users must be AD domain accounts.

Purpose

Roles in 1E 9.0/23.7

Roles in 1E 8.1

Register the 1EServiceNowCore consumer

1E ITSM Connect Actioner

Full Administrator

Upload instruction definitions and create instruction sets

1E ITSM Connect Actioner

Full Administrator

Create 1E users and assign them to roles, create custom roles, and assign them to some instruction sets and management groups

1E ITSM Connect Actioner

Full Administrator or Group Administrator

Create Management groups if desired

1E ITSM Connect Actioner

Full Administrator or Group Administrator

  • Additional 1E Platform roles are required by other 1E ServiceNow apps.

Permissions

1E license

  • Your 1E Platform license must include the 1EServiceNowCore consumer in the ServiceNow Integration feature tag as following:

    Copy
    <Feature name="ServiceNow-Integration">
    <Consumer name="1EServiceNowCore" enable="on">
    </Consumer>
    </Feature>

You can also verify this information in the 1E Settings app by navigating to Configuration → License Information. Scroll down to Products section and check whether 1EServiceNowCore is present as a feature item.

Check your 1E license

ServiceNow requirements

Category

Requirement

More details

ServiceNow

  • A working ServiceNow instance must be set up. This can be a demo instance or a production/vendor instance.

  • The application supports the latest ServiceNow releases. For more details on the supported releases, refer to Compatibility matrix for 1E and ServiceNow integration applications.

  • If you are using this application in multi-tenant mode (domain separation), please enable the Domain Support plugin on your ServiceNow instance.

Installing

MID Server

(Basic Authentication)

  • You require a MID Server when your 1E Platform instance is installed on-prem (that is, does not have a direct connection to your ServiceNow instance in the Cloud).

  • The MID Server must be installed on the same network domain as the 1E Platform server. It must be able to connect to the 1E Platform server (specifically the Master server hosting the Coordinator service).

Please refer to your ServiceNow documentation for details on installing a MID Server.

A MID Server is a software application which gets installed on any local machine with internet connectivity, can access 1E Server on the local network and is configured to point to the desired ServiceNow instance on the Internet.

MID Servers are specific to the release version of ServiceNow and must be downloaded from the ServiceNow instance itself. For more information about MID Server set up, please refer to the ServiceNow MID Server installation documentation.

Multiple MID Servers can be installed on a single machine and be able to point to the same or different ServiceNow instances, however you will only be able to set the 1E ServiceNow app to use one of them.

 

ServiceNow users

  • At least one ServiceNow user with each of the roles as described in the following table. These roles are created in ServiceNow during installation of the app.

Role name

Additional ServiceNow roles required

Description

x_1e_core_connect.admin

n/a

This role allows its users to configure and set up the 1E Core application.

 

ServiceNow admin users must change their application scope to 1E Core in order to configure the application, and retrieve instructions.

x_1e_core_connect.tenant_user

n/a

This role allows its users to use all 1E ServiceNow apps except for the 1E Core app. The role is inherited by the roles used by the 1E ServiceNow apps.

 

This role allows its users to access the x_1e_core_connect_domain_api_configuration table.

x_1e_core_connect.user

n/a

This role allows its users to use all 1E ServiceNow apps except for the 1E Core app. The role is inherited by the roles used by the 1E ServiceNow apps.

 

The role is inherited by the 1E ServiceNow solution roles.

 

User Management

ServiceNow admin

  • This role allows its users to install and configure the 1E Core app.

App Installation

ServiceNow certificate

(Modern Authentication)

  • The input certificate for Modern Authentication is a standard .pfx file containing a private key, hence it requires conversion from .pfx to .PEM and .JKS.

  • App ID is required and is provided by your 1E instance.

  • Client certificates (in .PEM and .JKS format) and App ID are required, in case the application's authentication mechanism is set to Modern Auth. Also create a JWT key and associate it with the JKS certificate. Similarly, create JWT provider and associate it with the JWT key.

    In the System Properties table, update the glide.attachment.extensions record with the value field of the property with the appropriate list of allowable extension types. For more information, click here.

Modern authentication