Entra ID Provisioning
Overview
Configuring automatic user and group provisioning from Microsoft Entra ID (formerly Azure AD) to ServiceNow ensures that identity data remains accurate and synchronized across your organization’s systems. This integration automates the lifecycle management of user accounts and group objects, reducing manual administrative effort while strengthening security through timely provisioning and deprovisioning.
By using Microsoft Entra ID as the authoritative identity source, organizations can enforce consistent access policies, maintain a single source of truth for user and group data, and streamline onboarding, role changes, and offboarding processes. Automated provisioning also minimizes the risk of orphaned accounts and access discrepancies, supporting compliance and governance requirements.
This guide provides step-by-step instructions for configuring provisioning from Microsoft Entra ID to ServiceNow. The synchronized attributes and group memberships established through this integration can later be leveraged within ServiceNow to automatically assign roles, categorize users, and further enhance identity driven automation.
Prerequisites
- Administrative access to the Microsoft Entra admin center or set as an application owner for the ServiceNow enterprise application.
- A ServiceNow instance with a dedicated service account that has permissions to create, update, and delete user and group records.
Technical Implementation
1. Enterprise Application Configuration
- Navigate to the Microsoft Entra Admin Center (Azure).
- Search for and select Enterprise Applications.
- Locate and select your ServiceNow application from the list.
- In the left-hand navigation menu, select Provisioning.
- Click Get started (or Edit provisioning) and set the Provisioning Mode to Automatic.
2. Admin Credentials & Connectivity
To establish the handshake between Entra ID and ServiceNow, configure the following under the Admin Credentials section:
- ServiceNow Instance Name: The sub-domain of your instance (e.g.,
dev12345). - Admin Username: The service account username.
- Admin Password: The service account password.
Click Test Connection to verify that the Entra ID service can reach your ServiceNow instance. Once successful, click Save.

3. Notification & Operational Settings
Under the Settings section, configure failure alerts to ensure proactive monitoring:
- Email Notification: Check the box Send an email notification when a failure occurs.
- Notification Email: Enter the internal support or identity team email address.

4. Attribute Mapping
Customizing attribute mappings is essential for ensuring data lands in the correct fields (e.g., mapping Entra jobTitle to ServiceNow title). ServiceNow’s sys_user and sys_user_group tables have specific schema requirements, so review and adjust the default mappings as needed. See below for guidance on user and group attribute mapping.
User Mappings
- Under Mappings, click Provision Microsoft Entra ID Users.
- Review the attribute list. Add or modify mappings to match your ServiceNow
sys_userschema requirements. - Click Save.
Example mappings:
| ServiceNow | Microsoft Entra ID | Mapping Type | Matching Precedence |
|---|---|---|---|
user_name | userPrincipalName | Direct | 1 |
first_name | givenName | Direct | |
last_name | surname | Direct | |
email | mail | Direct | |
title | jobTitle | Direct | |
phone | telephoneNumber | Direct | |
department | department | Direct | |
active | Switch([IsSoftDeleted], , "False", "1", "True", "0") | Expression |
Group Mappings
- Under Mappings, click Provision Microsoft Entra ID Groups.
- Map the Entra group attributes to the ServiceNow
sys_user_grouptable. - Click Save.
Example mappings:
| ServiceNow | Microsoft Entra ID | Mapping Type | Matching Precedence |
|---|---|---|---|
name | displayName | Direct | 1 |
description | description | Direct | |
email | mail | Direct | |
u_entra_object_id | id | Direct | 2 |
user | members | Direct | |
active | Switch([IsSoftDeleted], , "False", "1", "True", "0") | Expression |
Custom Attributes
By default ServiceNow Attributes shown for mapping are the default fields from the sys_user and sys_user_group tables scheme. If you have custom fields in ServiceNow that you want to populate, you can add them to the attribute mapping list by following these steps:
- In the Attribute Mapping section, click on Edit Attribute List checkbox.
- Click Edit attribute list for ServiceNow
- Enter the details for the custom attribute (see below example for the sys_user_group table)
| Name | Type | Primary Key? | Required? | Multi-Value? | Referenced Object Attribute? |
|---|---|---|---|---|---|
u_entra_object_id | String | False | False | False |
- Click Save to add the custom attribute to the list of available attributes for mapping. You can now map this custom attribute to an Entra ID attribute in the same way as the default attributes.
Finalizing Deployment
- Navigate back to the Provisioning main page.
- Click Users and Groups to review the list of users and groups in scope for provisioning. These users and groups will be created, updated, or deleted in ServiceNow based on their status in Entra ID.
- Set the Provisioning Status toggle to On.
- Click Save to initialize the cycle.
