Skip to main content

Supported Data Models

Required Parameters

These parameters are mandatory for the connector to authenticate and function properly.
VariableDescription
Instance NameYour ServiceNow instance name(if the instance url is https://devxxxxxx.service-now.com - put the instance name as devxxxxxx)
UsernameYour ServiceNow username
PasswordYour ServiceNow password

Creating a ServiceNow User for Leen Integration

This guide walks you through creating a ServiceNow user and assigning the appropriate roles to enable Leen to connect and interact with your ServiceNow instance.

Create a User

  1. Navigate to All > User Administration > Users
  2. Select New
  3. Fill in the mandatory fields on the form:
    • User ID - This will be used as the username in the Leen connection
    • Complete all other required fields and save the record
  4. Set up the user’s password:
    • After saving, select Set Password
    • Create a password that can be permanent or temporary
    • Copy this password for use in the Leen connection configuration
📝 Password Configuration Notes:
  • If you check Password needs reset, the user will be required to change the password during first login
  • For API-only access where the user doesn’t need ServiceNow UI access, you can set appropriate restrictions

Assign Roles

  1. Navigate to All > User Administration > Users
  2. Open the previously created user record
  3. Scroll down to the Roles related list
  4. Click Edit
  5. Assign roles based on your requirements by dragging them from the left bucket to the right:

Role Options

Access LevelRoleDescription
Read-only accesssn_grc.readerProvides read-only access to GRC data
Full GRC accesssn_grc.adminProvides administrative access to all GRC functionality
  1. Select Save to apply the role assignments

Additional Resources

For comprehensive information about GRC roles and permissions, refer to the ServiceNow GRC Roles Documentation. ⚠️ Security Consideration: Only assign the minimum roles necessary for your Leen integration requirements to maintain security best practices.
I