Book Image

Learning ServiceNow. - Second Edition

5 (1)
Book Image

Learning ServiceNow. - Second Edition

5 (1)

Overview of this book

This book is an updated version of Learning ServiceNow, that will cover the new and updated features of the ServiceNow platform. It will show you how to put important ServiceNow features to work in the real world, while introducing key concepts via examples of managing and automating IT services. It'll help you build a solid foundation of knowledge, and will demonstrate how to effectively implement and configure modules within ServiceNow. We'll show you how to configure and administer your instance, and then move on to building strong user interfaces and creating powerful workflows. We also cover other key elements of ServiceNow, such as notifications, security, reporting, and custom development. You will learn how to improve and automate your business' workflow and processes. By the end of this book, you will be able to successfully configure and manage ServiceNow like a pro.
Table of Contents (19 chapters)
Learning ServiceNow Second Edition
Contributors
Preface
Index

Data policies versus ACLs


Data policies are an effective means of controlling a few fields, and making a field mandatory in a data policy is probably the best way to ensure that a field has a value on the server before a record can be inserted or updated. Making a field read-only in a data policy is probably also the best way to prevent the value from changing on the server. When it comes to ensuring that a field (or a table) is fully inaccessible to users without a certain role or set of permissions however, ACLs are the way to go.

ACLs (short for Access Control Lists and otherwise known as Security Rules) are another means by which you can control access to elements within ServiceNow. They can serve much the same function as data policies, and a great deal more. One major difference between data policies and ACLs, is that ACLs are scriptable. This allows for a great degree of flexibility of functionality.

You can access the list of ACLs on a given table in the same way you'd access many...