From ab7a976e3d703a8897ab01f4f4424d7fb47feec5 Mon Sep 17 00:00:00 2001 From: Alex Dworjan Date: Tue, 5 Mar 2024 13:29:14 -0500 Subject: [PATCH] added note about admin role --- .ansible-sign/sha256sum.txt | 2 +- .ansible-sign/sha256sum.txt.sig | 22 +++++++++++----------- SNOWSetup/readme.md | 2 +- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/.ansible-sign/sha256sum.txt b/.ansible-sign/sha256sum.txt index db26d00..8fc5b13 100644 --- a/.ansible-sign/sha256sum.txt +++ b/.ansible-sign/sha256sum.txt @@ -95,7 +95,7 @@ b64a9ce7ade9b8fae7bda827f7a8d179809a8df065c8bafc1af07ae827ffb2aa SNOWSetup/imag 3b6b1d02322d2b0435b86bec366c94c6fe928ab84f0d2b881cf102021c44dddc SNOWSetup/images/workflow_start.jpg cb3a760e0f134314711929e87e54b3a46d3d4898f0baa2d641000ee1e3b63708 SNOWSetup/images/write_scope.png b8bc0e6865c91d1d8cedf5bc9faa24782629806c15f99d0b24e3397ec294dcbb SNOWSetup/images/write_scope_deets.png -b6188015477b32930a47db39abaf86da9a3d919eff72222deb053f3fc032b43c SNOWSetup/readme.md +f58b44080c5457f9dd4e58ab0a3141ec748dbe041020925b3cc8d87ddf3962e4 SNOWSetup/readme.md 8d64a90e1cf927f9adf8074d405a62ec50f4df417865706d1f4bc5ff5bdfeaa5 ServiceNowCR_and_approve.yml db0cf6bab374ea48077c3898aea1602a570541a49ed82797b7459c9ce9a9824c ServiceNowCR_canceled.yml 675d62c62ed528e495f8144290d181875521766c5cebb9661fc15552f1db1083 ServiceNowCR_closed.yml diff --git a/.ansible-sign/sha256sum.txt.sig b/.ansible-sign/sha256sum.txt.sig index 20656e0..b450d41 100644 --- a/.ansible-sign/sha256sum.txt.sig +++ b/.ansible-sign/sha256sum.txt.sig @@ -1,14 +1,14 @@ -----BEGIN PGP SIGNATURE----- -iQGzBAABCAAdFiEE/bJvyFHKKJdaZDOLTiIiIXrUDNEFAmXnNyYACgkQTiIiIXrU -DNH56wv/SWOvDQN/w4KrEgyWZvXJQ0J+kFNvPKMClKXqN0cKmyFS8s3gg9+MHCgO -rpOMHOtNJavuJMPSgU+1ksUDp2q4EK3HFY/rFbQBo3F473sjFjbCWKUycEeofdLg -MDBfzqJ72kGsor72EXwKZroKVZDs/EM8tMUWiQeNT9YQFiaYY9qbrR0Wpl69RD2N -9mMQeCwnDqmvrudVrfgZpOgshwjg3ogKVdRLt14/FTWIAQIIcQ+rw0lNDBqP5wHc -fIsdIBMU7CcYotnyMJRw8O54QmMHz2evVTVS+3hXIPxlM6r56tFbFXGQ5WIr6+py -oTGh/MwhR2NlhHQz++s9omexEDCDKbLysxhWXLYXOuiqQiEOnURwUs6n1iOYYNK8 -+PPzucukLT4jc+i2e/UZZ3ECIAOCwhA/moQ3eRghdw/dqWM0ifgz/czqD+jsIW0z -l0DgEOipAbwsloRjaXS/bbNEPUGqA/5TuzNEsNdoysDLU8KSTATVREst5gM/IJ3s -FEoJ7YVQ -=Sluy +iQGzBAABCAAdFiEE/bJvyFHKKJdaZDOLTiIiIXrUDNEFAmXnZG8ACgkQTiIiIXrU +DNGxgQv/WOM8eMRmSRvY8yvC+GFraMmjth/OnrVqYPJLielTY28S+v7xJZroO3qy +ofp+hupW6GHh9SuOCr0XaUQNmJjIFruGIFQVBShrTcHSWULuW3hQl4qZDlfwHkuW +ndX2m8rB3Wp3gBkBqplVeTsmyGzj/UV/b/pO21Lntq8X7zTiFsBQ56u6IxknC2eV +j4OSjtf4n4ef5kNQWt51y7gXlpjRyaA0tnCRZ3d9LgJhRmr0bJUdOIQ9WEE8ujON +4UbKCws7z/tRhNnAJS1rUAW438/qrSjER3fdTRwC2+pdhJHbgEcSVUguUIdNCu2C ++qSo54gFkBjU85ago1s9gwUC0YSKykjlIfdG/EJb8UQkVlv7QwJmT+Y6N44Itzom +j5Vm4YIu3w8qqEalJhtKzTXksnS2/UH/HyD4NxD8dnwhhEWRJHrMgSlz2tcdUi4y +Cwux5G+hNDEFk4d2gaMNupJfH4F0TJk8I6wvOwnbdzeZl2rMlurgCB2awM9pNkKV +Qgj4H+bb +=JjEO -----END PGP SIGNATURE----- diff --git a/SNOWSetup/readme.md b/SNOWSetup/readme.md index 880c526..d34fd12 100644 --- a/SNOWSetup/readme.md +++ b/SNOWSetup/readme.md @@ -554,7 +554,7 @@ On the Event-Driven Ansible Notification Service click install, select your vers Event-Driven Ansible Notification Service #### 2) -After the install is complete, you need to add the EDA role to the ServiceNow user who will be performing the configuration. Navigate to the **All** menu and select **System Security -> Users and Groups -> Users**. Select a user from the list or click New to create a new user. If needed, fill in the required and possibly other fields. If necessary, set a password. To assign roles, switch to the Roles tab and click **Edit**. In the Edit Member page search the collection for the **x_rhtpp_eda.admin** role and move it to the right to appear in the roles list. In addition, assign the **itil** and **itil_admin** roles to grant the user write access to the problem, problem task, configuration item, change request, and incident tables. Click **Save** to apply the assigned roles. +After the install is complete, you need to add the EDA role to the ServiceNow user who will be performing the configuration. Navigate to the **All** menu and select **System Security -> Users and Groups -> Users**. Select a user from the list or click New to create a new user. If needed, fill in the required and possibly other fields. If necessary, set a password. To assign roles, switch to the Roles tab and click **Edit**. In the Edit Member page search the collection for the **x_rhtpp_eda.admin** role and move it to the right to appear in the roles list. In addition, assign the **itil** and **itil_admin** roles to grant the user write access to the problem, problem task, configuration item, change request, and incident tables. This user can not have the **admin** role or you will be unable to save changes to the Event-Driven Ansible Notification Properties. Click **Save** to apply the assigned roles. Event-Driven Ansible Role