<h2>Exploring Zero Trust Access</h2><br/><div style="overflow-x:auto"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><meta content="text/html; charset=UTF-8" /><meta name="copyright" content="(C) Copyright 2026" /><meta name="DC.rights.owner" content="(C) Copyright 2026" /><meta name="generator" content="DITA-OT" /><meta name="DC.type" content="concept" /><meta name="DC.title" content="Exploring Zero Trust Access" /><meta name="abstract" content="Zero Trust Access (ZTA) is a security model that assumes that no user or device is trusted by default." /><meta name="description" content="Zero Trust Access (ZTA) is a security model that assumes that no user or device is trusted by default." /><meta name="DC.date.created" content="2023-10-05T13:25:21+05:30" /><meta name="DC.date.modified" content="2025-01-30" /><meta name="DC.format" content="XHTML" /><meta name="DC.identifier" content="explore-zero-trust-access" /><link rel="stylesheet" type="text/css" href="../../../CSS/commonltr.css" /><title>Exploring Zero Trust Access</title></head><body id="explore-zero-trust-access"> <h1 class="title topictitle1" id="ariaid-title1">Exploring Zero Trust Access</h1> <div class="body conbody"><p class="shortdesc">Zero Trust Access (ZTA) is a security model that assumes that no user or device is trusted by default.</p> <p class="p">ZTA ensures that all access to applications and data is granted on a least privilege basis, only after the user's identity verification and risk assessment.</p> <div class="section" id="explore-zero-trust-access__section_g3z_1cs_zxb"><h2 class="title sectiontitle">Zero Trust - Policy Based Session Access</h2><p class="p"><span class="ph">ServiceNow</span> Zero Trust - Policy Based Session Access (Session Access) enables organizations to dynamically reduce user privilege in a web session based on a variety of factors, including IP address, location, authentication method, user’s role, group, user having MFA and attributes shared by the Identity Provider (IDP). This can help protect organizations from unauthorized access and data breaches, even when high-privileged users access applications from untrusted devices or locations.</p> <span>Zero Trust - Policy Based Session Access</span> <p class="p">It enables the security admins to reduce or limit user access in a session based on IP address, location, Identity Provider attributes, and user attributes using adaptive authentication policies.</p> <img class="image" id="explore-zero-trust-access__image_rd1_h1j_2yb" src="../images/session-access-aa.png" alt="Zero Trust Access and Adaptive Authentication" /><div class="note"><span class="notetitle">Note:</span> <ul class="ul" id="explore-zero-trust-access__ul_kcm_4vj_qxb"><li class="li">Session Access configurations can only be performed with security_admin role. You must elevate your role to security_admin.</li><li class="li">Session Access doesn’t support integrations.</li><li class="li">Session Access has no impact if the reduced or limited role isn’t assigned to a user. In this case, there are no changes to the logged in session. The user continues to access the instance with the assigned privileges.</li><li class="li">Session Access has no impact while the user is already logged in to the instance and simultaneously the admin configures the policy. The user has to log out from the session for the policy to be effective.</li><li class="li">Session Access has no impact when the user is in a trusted network and later switches to a VPN (change in location or network) within a session.</li><li class="li">Session Access is enforced at the time of login. Any change in risk parameters during the session won’t result in reduced access. For example, a user switching from the corporate network to an untrusted network after establishing the session won’t result in reduced access unless the user logs out and logs in again.</li><li class="li">Session Access (Zero trust access - ZTA) feature, roles like snc_internal and snc_external cannot be removed.</li><li class="li">Session Access (Zero trust access - ZTA) feature does not remove a role from the sys_user_has_role or the user group membership table. Based on the ZTA policy, it establishes the user session with reduced or limited roles.</li><li class="li">The scripts running in the system context will not honor the ZTA session roles.</li></ul> </div> </div> <div class="section" id="explore-zero-trust-access__section_nbs_3q2_twb"><h2 class="title sectiontitle">Use case</h2> <p class="p">Following are some of the use cases of Zero Trust Access:</p> <ul class="ul" id="explore-zero-trust-access__ul_mmn_pq2_twb"><li class="li">Reduce privileges based on the risk associated with the session. For example, a fulfiller role user logging from outside the trusted network can be configured to have only the requester role for the session.</li><li class="li">Reduce access based on IDP response for a user session, if the user is using an untrusted device. For more information, see <a class="xref" href="https://servicenow.com/docs/bundle/yokohama-platform-security/page/integrate/authentication/task/configure-idp-session-access.html" title="Use Identity Provider (IDP) attribute created from the Security Assertion Markup Language (SAML) response for removing or restricting user session access to the instance.">Configure IDP attribute for Session Access</a>.</li></ul> <p class="p">This role relegation ensures that the user doesn’t have any other existing privileges in a session. When the user is logging in from a trusted network, all the existing privileges are assigned for a session.</p> <p class="p">Multiple IP conditions and multiple role or group assignments can be defined as part of the policy.</p> </div> <div class="section" id="explore-zero-trust-access__section_v5q_dzv_3zb"><h2 class="title sectiontitle">Zero Trust Access - Mobile</h2> <p class="p">You can use the Zero Trust Access - Session Access policy within the Adaptive Authentication policy to reduce the roles or privileges of the particular session in mobile.</p> <p class="p">Zero Trust Access - Session Access mobile can be enabled by enabling the <span class="ph uicontrol">glide.authenticate.session_access.mobile.enabled</span> from the system properties table.</p> <p class="p">To use Zero Trust Access - Session Access mobile with the IDP attributes you can configure the <span class="ph uicontrol">glide.authenticate.session_access.mobile.refresh_token_interval</span> field. This enables the administrators to effectively control the session access based on refresh token.</p> <p class="p">For more information, see <a class="xref" href="https://www.servicenow.com/docs/access?context=configure-zero-trust-access-mobile&version=yokohama&pubname=yokohama-mobile&ft:locale=en-US" target="_blank" rel="noopener noreferrer">Configure Zero Trust Access for mobile</a>.</p> </div> </div> </body></html></div>