Customer Use Case: Automated Onboarding

Automating Employee Onboarding and Role-Based Access Control in ServiceNow


A rapidly growing company requires an efficient and secure system to manage new employee onboarding, specifically focusing on authentication and access control within their ServiceNow environment. To address this, the company plans to leverage Akeyless API to automate the creation of new authentication methods for each employee and assign them to predefined access roles based on their job function, directly within ServiceNow.


Akeyless Account and API Access

  • A valid Akeyless account with administrative privileges to generate API keys and manage access roles.
  • API keys, allowing ServiceNow to securely communicate with Akeyless services.

For detailed instructions on configuring your Akeyless API keys, please refer to our Akeyless API Key Configuration Guide.

ServiceNow Requirements

ServiceNow Instance and Administrator Access

  • An active ServiceNow instance with administrative access to create custom tables, define business rules or workflows, and configure REST API integrations.

REST API Integration Capabilities

  • The ability to make outbound REST API calls to Akeyless for creating and managing authentication methods and access roles.
  • Support for securely storing API credentials and handling API responses within ServiceNow.

Custom Table and Workflow Configuration

  • Tools and permissions to create custom tables for storing new employee records.
  • Capabilities to develop custom workflows or business rules that trigger upon the addition of a new employee record, integrating with Akeyless APIs.

Role-Based Access Control Management

  • The ability to dynamically assign and manage access roles within ServiceNow, potentially using information from Akeyless to determine the appropriate roles based on the authentication method or policy.


Once all implementation steps are finalized, should you add a new record to the employee table (either through the appropriate form or directly within the table itself), the system will automatically generate a corresponding authentication method for the newly added employee and link it to the appropriate access role.