Book Image

Mastering ServiceNow - Second Edition

Book Image

Mastering ServiceNow - Second Edition

Overview of this book

ServiceNow is a SaaS application that provides workflow form-based applications. It is an ideal platform for creating enterprise-level applications giving requesters and fulfillers improved visibility and access to a process. ServiceNow-based applications often replace email by providing a better way to get work done. The book steps through the main aspects of the ServiceNow platform, from the ground up. It starts by exploring the core architecture of ServiceNow, including building the right data structure. To add business logic and control data, and interactivity to user interaction, you will be shown how to code on both server and the client. You will then learn more about the power of tasks, events and notifications. The book will then focus on using web services and other mechanisms to integrate ServiceNow with other systems. Furthermore, you will learn how to secure applications and data, and understand how ServiceNow performs logging and error reporting. You will then be shown how to package your applications and changes, so they can be installed elsewhere and ways to maintain them easily. If you wish to create an alternative simple interface, then explore ways to make ServiceNow beautiful using Service Portal. By the end of the book, you will know the fundamentals of the ServiceNow platform, helping you be a better ServiceNow System Administrator or developer.
Table of Contents (18 chapters)
Mastering ServiceNow Second Edition
Credits
Notice
About the Author
About the Reviewer
www.PacktPub.com
Preface

Encrypting data


ServiceNow provides support for three types of encryption. Two occur within the server, and the data is decrypted before it leaves the instance, whereas Edge Encryption ensures data is always protected outside of the customer's network. The three types of encryption are as follows:

  • Full disc encryption protects a disk if it is physically stolen from the ServiceNow data center. The instance itself is unaware of any differences to a normal operating environment.

  • Field and attachment encryption stores encrypted data in the database. This provides a level of protection against a malicious database administrator. It is decrypted using an encryption key stored on and controlled by the instance.

    Tip

    These two methods are different forms of protecting data at rest. All communication with the instance occurs over HTTPS. This means that all the data is also secured in transit, but in both cases, the instance can work with the unencrypted data.

  • Edge Encryption uses a gateway sitting in the...