Integrating Password Manager Pro with Enterprise Ticketing Systems
(Feature available only in Enterprise edition)

Password Manager Pro comes with the facility to integrate with a wide range of ticketing systems, to automatically validate service requests related to privileged access. The integration ensures only users with a valid ticket ID can access the authorized privileged passwords. This integration also extends to the Password Manager Pro workflow, which helps in granting approvals to password access requests upon automatic validation of corresponding service requests in the ticketing system.

In this document you will learn the following with respect to integrating Password Manager Pro with ticketing systems:

  1. How does this Integration Work?
  2. Ticketing Systems
  3. Steps to Integrate your Ticketing System with Password Manager Pro
  4. Ticketing System Validation Enforcement and Exceptions
  5. Disabling Ticketing System Integration
  6. Integrating Other Ticketing Systems
  7. Code Snippet for ServiceNow Custom Implementation
  8. Interface Description

1. How does this Integration Work?

Once you integrate Password Manager Pro with an Enterprise Ticketing System, users will be required to enter a valid ticket ID for password retrieval or reset and Password Manager Pro will do the following before granting access:

  • Validate that the ticket ID entered by the user exists in the ticketing system.
  • Verify that the incident connected with the ticket is NOT in the 'Closed' state.
  • Verify whether the user is authorized to view that password and thereby access the IT resource.
  • Verify for appropriate permissions in the case of password reset attempts.

In addition to verifying the above by default, Password Manager Pro also lets you define custom criteria and validate them with the ticketing system before granting access to the passwords. The entire process is completely audited - which means, privileged actions can be ​traced using ticket IDs and password access can be traced using ticket numbers in the ticketing system. In addition, you can generate custom reports on privileged access scenario through the ticket IDs.

2. Ticketing Systems

Integrating Password Manager Pro with your ticketing system is so simple. Password Manager Pro readily integrates with the following:

Apart from the above, you can integrate Password Manager Pro with any other Enterprise Ticketing System.

3. Steps to Integrate your Ticketing System with Password Manager Pro

Integration with the ticketing systems that are readily supported is very straightforward. You just need to provide the details necessary to establish connection with the ticketing system.

Notes:

Remember, if your ticketing system is ServiceDesk Plus or ServiceDesk Plus MSP and it is running in the HTTPs mode, the identity of the system needs to be verified through a valid SSL certificate, which has to be imported into the Password Manager Pro certificate store. To do this, follow the below steps:

  1. Stop the service.
  2. Navigate to the "<PMP_Installation_Folder>/bin" directory.
  3. Execute any of the following:
    Windows:
    importCert.bat <Path of the certificate used by ServiceDesk Plus or ServiceDesk Plus MSP>
    Linux:
    importCert.sh <Path of the certificate used by ServiceDesk Plus or ServiceDesk Plus MSP>
  4. Restart the service.
    1. Navigate to Admin >> Integration >> Ticketing System.

    2. In the page displayed, select the ticketing system you wish to integrate, from the list of supported ticketing systems. If the ticketing system that you use is not found in the list, select 'Others'.

3.1 Settings to Establish Connection with different Ticketing Systems

Basically, the integration is achieved leveraging the REST APIs provided by the respective ticketing system. So, all that you need to do is to specify/generate the ​Authentication Token and Ticketing System's application URL.

Generating Auth Token:

You can generate and obtain the the Auth Token for each of the ticketing systems as below:

  1. ManageEngine ServiceDesk Plus:
    1. Log in to ManageEngine ServiceDesk Plus.
    2. Click API Key Generation under the Username at the top right corner of the page.
  2. ManageEngine ServiceDesk Plus MSP:
    1. Log in to ManageEngine ServiceDesk Plus MSP.
    2. Click API Key Generation under the Username at the top right corner of the page.
  3. ManageEngine ServiceDesk Plus Cloud:
    1. Go to Zoho Developer Console.
    2. Choose the Client Type as Server-based Application.
    3. Enter the following details:
      1. Client Name:
        The name of your application you want to register with ManageEngine ServiceDesk Plus Cloud (PMP/Password Manager Pro is advisable).
      2. Home page URL:
        Mention the Password Manager Pro access URL.
        Example: https://<server>:port/ (or) https://<domain_name>.com
      3. Authorized Redirect URLs:
        <homepageurl>/sdpodAuth/saveSDPODRefreshAndAccessTokens
    4. Click Create to generate the following credentials:
      1. Client ID: The consumer key generated from the connected app.
      2. Client Secret: The consumer secret generated from the connected app.
  4. ServiceNow:
    1. Log in to Password Manager Pro, navigate to Admin >> Integration >> Ticketing System.
    2. Click Enable under servicenow.
    3. Click Generate beside the "AUTH Token" field.
    4. Mention the Username, Password and click Proceed.
  5. JIRA Service Desk:
    1. Go to Atlassian Developer Console.
    2. Click Create and select OAuth 2.0 integration.
    3. Provide the app Name ("PMP" recommended) and click Create.
    4. In the UI that appears, click Permissions from the left pane.
      1. Click Add against Jira API.
      2. Now, click Configure against Jira API.
      3. In the page that appears, under Jira Service Management API, click Edit Scope.
      4. Select View Jira Service Management request data and click Save.
    5. Click Authorization from the left pane.
      1. Click Add.
      2. In the UI that appears, mention the Callback URL in the below given format and click Save changes.
      • https://<HOSTNAME>:<PORT>/jiraAuth/saveJiraAccessToken
    6. Click Settings from the left pane.
      1. Here, you will find the Client ID and Secret.

3.1.i ServiceDesk Plus Cloud

Password Manager Pro integrates with ManageEngine ServiceDesk Plus Cloud to automatically validate access request to privilege access with a valid ticket ID. This can be done by generating AUTH token and entering the valid ticket ID in the ticketing system. You can also check the value of the change ID status associated with the ticket ID by selecting that option and entering the changeID status.

Configuring ServiceDesk Plus Cloud in Password Manager Pro:

  1. Navigate to Admin >> Integrations >> Ticketing System.
  2. Click Enable under ManageEngine ServiceDesk Plus Cloud.

  3. Now, enter the Client ID, Client Secret generated from the previous step. 
  4. Mention the Ticketing System URL and Redirect URL. 

    Notes:
    1. If there are multiple portals available in the ServiceDesk Plus Cloud, enter the Ticketing System URL with the relevant portal name. For example, https://sdpondemand.manageengine.eu/app/itdesk
    2. Mention the Home page URL from the previous step as the Redirect URL.

  5. Click Enable.

The ServiceDesk Plus Cloud configurations have been saved successfully.

Authorizing ServiceDesk Plus Cloud:

  1. To authorize ServiceDesk Plus Cloud, click the refresh icon on top-right corner of Password Manager Pro to find the red icon on top-left corner of ManageEngine ServiceDesk Plus Cloud.
  2. Click the red icon to authorize and enable the integration.

  3. In the UI that appears, read the conditions and click Accept to allow Password Manager Pro to access data.
  4. Note: Remember, only users with a technician role in the Ticketing System should 'Accept' the above request to view and validate the tickets.

  1. ServiceDesk Plus Cloud has been configured successfully as ticketing system in Password Manager Pro.


  2. Now, click OK to exit the GUI and click the refresh icon on top-right corner of Password Manager Pro for the changes to appear.


3.1.ii ServiceDesk Plus MSP

Password Manager Pro integrates with ManageEngine ServiceDesk MSP to automatically validate access request to privilege access only with a valid ticket ID. This can be done by generating Technician key and entering the valid ticket ID in the ticketing system. 

3.1.iii ServiceDesk Plus

  • Password Manager Pro now integrates with ManageEngine ServiceDesk Plus by validating change request in addition to the ticket ID entered by the user in the ticketing system. And validation occurs only when the change ID provided is approved in Manage Engine Service Desk Plus.
  • Enabling this option will require your users to provide valid Change IDs for validation of password access requests and other similar operations. On the other hand, if you leave this option unchecked, users will have to submit valid Request IDs for validation.

3.1.iv ServiceNow

Password Manager Pro now integrates with ServiceNow. By integrating with ServiceNow, you can get data from the following simply by entering the 'Ticketing system URL' in the respective field '<instance>. <ticketingsystem>.com and by entering the number.

  • ServiceNow Incident - INC(7 digit number) eg: INC0010007
  • ServiceNow Change - CHG(7 digit number) eg: CNG0000003
  • ServiceNow Change Task - CTASK(7 digit number) eg: CTASK0000009
  • ServiceNow Request -  REQ(7 digit number) eg: REQ0010004
  • ServiceNow Request Item - RITM (7 digit number) eg: RITM0010007
  • ServiceNow Problem - PRB(7 digit number) eg: PRB0000007
  • ServiceNow Project - PRJ (7 digit number) eg: PRJ0000009
  • ServiceNow Project Task - PRJTASK(7DIGIT NUMBER) eg: PRJTASK0010001
  • ServiceNow Task - TASK(7 digit number) eg: TASK0010001
  • ServiceNow SCTask - SCTASK(7 digit number) eg: SCTASK0010001

Enabling this option will require your users to enter any of the above valid numbers in Password Manager Pro for validation of password access requests.

3.1.v JIRA Service Desk

Password Manager Pro now readily integrates with JIRA Service Desk integration to automatically validate service requests related to privileged access. 

Configuring JIRA Service Desk in Password Manager Pro:

  1. Navigate to Admin >> Integrations >> Ticketing System.
  2. Click Enable under Jira ServiceDesk.
  3. Now, enter the Client ID and Client Secret generated from the previous step. 
  4. Mention your Jira Service Management URL as the Ticketing system URL and the Access URL you use to access the Password Manager Pro server as the Redirect URL.
  5. Click Enable.

The Jira Service Desk configurations have been saved successfully.

Authorizing Jira Service Desk:

  1. Click the red icon on top-left corner of Jira Service Desk to authorize and enable the integration.

  2. In the UI that appears, read the conditions and click Accept to allow Password Manager Pro to access data.

  3. You will now be redirected to Password Manager Pro UI with a success message.

Jira Service Desk has been configured successfully as a ticketing system in Password Manager Pro.

3.1.vi Others

If you are using any other ticketing system, you can integrate it with Password Manager Pro by having your own custom implementation. 

  • By default, Password Manager Pro validates if the ticket ID entered by the user exists in the ticketing system and also verifies if the incident connected with the ticket is NOT in 'Closed' state. If your requirement is satisfied with these, ticketing system integration is complete.

3.2 Optional Advanced Configurations

In case, you want to validate some other criteria (in addition to ticket number and ticket status), you have the option to configure advanced settings. For example, you can choose to check if the Password Manager Pro user who is raising the password access request matches with the 'REQUESTER' column in the ticketing system. Similarly, you can check for certain specific conditions related to the ticket - for instance, 'PRIORITY' of the ticket as 'HIGH'. Password Manager Pro offers the total flexibility to check for any parameter in the ticketing system, including additional fields.

To carry out advanced configurations,

  1. Click the three dots on top-right corner and select Advanced Configuration.
  2. Advanced Configurations GUI opens in which advanced configurations can be carried out either by means of a readily available configuration setting or by implementing a custom class.

Options in Advanced Configurations:

  1. Validating if specific columns in Password Manager Pro match with the ones you specify in the ticketing system
    1. Select Map Entries in PMP Vs Ticketing System to validate if specific columns in Password Manager Pro match with the ones you specify in the ticketing system.
    2. The Column Name drop-down lists the column names as available in Password Manager Pro - Resource Name, Resource Type, Account Name, PMP User Name, DNS Name, etc. (including custom fields).
    3. Select a Criteria to validate based on conditions such as is, is not, contains, does not contain, starts with or ends with.
    4. The Ticketing System column lists the fields (including custom fields) available in the ticketing system. Choose the field, that has to be mapped with the corresponding field in Password Manager Pro.
      For example, you can choose to map RESOURCE NAME in Password Manager Pro with ASSET in the ticketing system. Once you specify such a mapping, before granting access to the password, Password Manager Pro will check if the RESOURCE NAME as specified in Password Manager Pro matches with the ASSET name in the ticketing system. Only if the validation succeeds, access will be granted.

  2. Validating if specific columns in the Ticketing System match with the ones you specify in Password Manager Pro.
    1. Select Map Entries in Ticketing System Vs PMP to validate if specific columns in the ticketing system match with the ones you specify in Password Manager Pro.
    2. The Ticketing System column lists the fields (including custom fields) available in the ticketing system. Choose the field that has to be to be mapped with the corresponding field in Password Manager Pro.
    3. Select a Criteria to validate based on conditions such as is, is not, contains, does not contain, starts with or ends with.
    4. The Column Name drop-down lists the column names available in Password Manager Pro such as: Resource Name, Resource Type, Account Name, PMP User Name, DNS Name, etc. (including custom fields).
  3. Validating specific conditions related to the ticket in the ticketing system.
    1. To validate if specific conditions related to the ticket are met, you need to select the option 'Conditions to be checked in the ticketing system'. By default Password Manager Pro checks if the ticket STATUS is not in CLOSED state.
    2. You can select any number of additional conditions and Password Manager Pro will validate all of them with the ticketing system. By default, Password Manager Pro lists down all the fields available in the ticketing system, including the custom fields. You can specify the value, which Password Manager Pro has to validate.
  4. Select to Check the value of change ID status associated with the ticket ID and mention the Change ID Status.
  5. Click Save to save changes to the ticketing system configurations.

3.3 Test Ticketing System Configuration Setup

After completing the integration, you can do a testing to ensure if Password Manager Pro is able to establish communication with the ticketing system properly. Click the link Test Configuration Setup by clicking the three dots on the top right corner to do this.

As part of this testing, you can also fetch the custom fields available in Password Manager Pro to the advanced configuration setup.

3.4 Custom Implementation

In case, the advanced configuration does not satisfy your requirements, you can provide your own class implementation and integrate it with Password Manager Pro by updating a jar file with the implemented class. For more details, refer to Integrating Other Ticketing Systems section below. The steps outlined there hold good here too.

4. Ticketing System Validation Enforcement and Exceptions

  1. Once you complete ticketing system integration, it takes immediate effect globally and users will have to produce valid ticket IDs to access passwords. By design, super administrators are exempted from ticket ID enforcement. In addition, as part of access control workflow too, users could be enforced to produce ticket IDs and access can be automatically granted after validating the IDs.
  2. You also have the option to selectively enable/disable ticketing enforcement for select resource groups.
    1. This can be done from Groups.
    2. Select the required resource group(s).
    3. Click on Bulk Configuration button at the top of the groups list and select Configure Ticketing Settings from the drop down.

  3. From General Settings , select Allow users to retrieve password without ticket ID under Password retrieval section to allow/restrict users for ticket validation.

  4. You can also select to Allow users to reset passwords without giving ticket ID from the Password Reset section.

  5. In addition, you can have user group-specific settings too, which can be done from the User Groups tab.

5. Disabling Ticketing System Integration

You can disable the integration with the ticketing system anytime. To disable/remove the integration from Password Manager Pro,

  1. Click the Disable icon to disable the integration.

    Note: The integration details will not be removed from Password Manager Pro when the integration is disabled.  You will be able to enable the integration at any given time.

  2. Click Remove to completely remove all the integration details from Password Manager Pro.
  3. Note: To enable ServiceDesk Plus Cloud integration again, you have to generate a new set of Client ID, Client Secret as instructed in this step, and configure ServiceDesk Plus Cloud to Password Manager Pro.

6. Integrating Other Ticketing Systems

If you are using any other ticketing system, you can integrate it with Password Manager Pro by having your own custom implementation. To guide you through the process, we have taken integrating Zendesk as an example to explain the steps involved.

Step 1: Create your implementation class

Refer to the sample implementation class created for integrating Zendesk. The important aspects of the implementation class have been explained below:

Generate Authentication Token

The first step is to generate authentication token of the ticketing system to enable Password Manager Pro establish connection. When generating the AUTH TOKEN, ensure that you provide the credentials of an administrator who has full access to the ticketing system. You can do this either by providing the credentials directly in the implementation class or by generating the token and putting the token.

The snippet below shows how to generate Base64 Authstring belonging to a privileged account of the ticketing system. This will come in handy when the REST API is based on Base64 Authorization header. Some ticketing systems offer AUTH-Token with inbuilt GUI. In such cases, you can directly use the authentication parameters. In addition, instead of hard coding username and password in the implementation class, you can very well skip this part and make REST API call with direct Base64 token that are generated through Java or through any online editors.

Refer to the code snippet below:

// Constructing Authstring from Zendesk login credentials
String username = "username@example.com"; //Zendesk username
String password = "zendeskpassword"; //Zendesk password
Base64 encoder = new Base64();
byte[] encodedPassword = (username + ":" + password).getBytes();
byte[] encodedString = encoder.encodeBase64(encodedPassword);
String authStr = new String(encodedString);


Step 2: Check connection with ticketing system

Using REST APIs, Password Manager Pro can be made to get the information about tickets from the ticketing system. Each ticketing system follows its own procedure to disseminate ticket details. Refer to the respective documentation to identify the procedure. After obtaining the ticket details, you need to validate the details.

Refer to the code snippet below:

String sUrl = "https://<zendesk-instance>.zendesk.com/api/v2/tickets/"; //REST API call Zendesk
sUrl = sUrl + ticketId +".json"; //This is the ticket ID that will be validated against the one supplied by the user in Password Manager Pro
URL url = new URL(sUrl);
HttpsURLConnection connection = (HttpsURLConnection) url.openConnection();
connection.setRequestProperty("Authorization","Basic "+authStr); //Setting Authstring in the header


Step 3: Validating if specific columns in Password Manager Pro match with the ones you specify in the ticketing system (optional configuration)

Refer to the code snippet below to validate if specific columns in Password Manager Pro match with the ones you specify in the ticketing system (For example, you can choose to map RESOURCE NAME in Password Manager Pro with the SUBJECT in the ticketing system. Once you specify such a mapping, before granting access to the password, Password Manager Pro will check if the RESOURCE NAME as specified in Password Manager Pro matches with the SUBJECT name (if the subject contains the resource name) in the ticketing system. Only if the validation succeeds, access will be granted):

String assetName = (String)pmpColumns.get("Resource Name");//Password Manager Pro Asset Name for which password related operation done
String subject = (String)ticket.get("subject");//Getting the ticket subject
boolean descriptionCheck = subject.toLowerCase().contains(assetName.toLowerCase());
//Checking the description of the ticket contains the resource name of user account


Step 4: Validating specific conditions related to the ticket in the ticketing system (optional configuration)

You can validate if specific conditions related to the ticket are met - by default, Password Manager Pro checks if the ticket STATUS is not in CLOSED state. You can select any number of additional conditions and Password Manager Pro will validate all of them with the ticketing system. By default, Password Manager Pro lists down all the fields available in the ticketing system, including the custom fields. You can specify the value, which Password Manager Pro has to validate.

JSONObject ticket = (JSONObject)ticketingOuput.get("ticket");
String status = (String)ticket.get("status");
boolean statusCheck = "open".equalsIgnoreCase(status); //Checking whether the status of the ticket is in open state


Step 5: Compilation

While compiling keep the following jars in the classpath (the jars are available under <PMP_HOME>\lib folder)
AdventNetPassTrix.jar;
json_simple-1.1.jar;
commons-codec-1.7.jar
For Example,
javac -d . -cp AdventNetPassTrix.jar;json_simple-1.1.jar;commons-codec-1.7.jar ZendeskImpl.java - (For Windows)
javac -d . -cp AdventNetPassTrix.jar:json_simple-1.1.jar:commons-codec-1.7.jar ZendeskImpl.java - (For Linux)

Step 6: Configurations in Password Manager Pro installation

  1. Compile the implemented class files as a single jar and place that jar in PMP_HOME\lib folder.
  2. Restart the Password Manager Pro Service so that Password Manager Pro will make use of the implemented class.
  3. Navigate to Admin >> Integration >> Ticketing System.
  4. In the GUI that opens, select the option 'Other' (to integrate any ticketing system) OR the 'Class Implementation' 'Advanced Configuration' of the already integrated ticketing system (if you want to extend the functionality).
  5. Specify the name of your implementation class.
  6. Your implementation has to be approved by another administrator. All other administrators (other than those who made the request) will receive an alert regarding the request for approval.
  7. Once an admin approves the implementation, it will be made available for use.
  8. After enabling, ticketing system workflow will be made mandatory for password retrieval and password reset.

For further information, refer to the sample implementation class created for integrating Zendesk.

Ensure the below SHA256 value upon downloading the file:
SHA256 Checksum:

Implementation tips

For steps 3 and 4 above, you might require additional information for implementation. Refer to the tips below for details:

Columns in Password Manager Pro

List of data related to the user account for which ticketing request is raised through pmpColumns parameters from Password Manager Pro side:

Password Manager Pro User Name - Logged in user name
Resource Name - Name of the resource
DNS Name - IP Address of the resource
User Account - Account name
Resource Type - Type of the resource being accessed (Windows/ WindowsDomain/ Linux etc.)
Resource Description - Description about the resource
Department - Department to which the resource belongs
Location - Resource location
Domain Name - Domain name of the resource
Request Type - Request Type for which ticketing system call is made. It can be

RETRIEVAL - Password access
REQUEST - Password access request raised through Access-Control workflow
RESET - Password reset
AUTOLOGON - 'Open Connection' request

User Organization Name - Organization name of the user who made the request
User Current Organization Name - Name of the organization where the requested account is present
Other than this, all additional columns will be sent as shown below:
Resource additional field - Resource@<field_name>
Account additional field - Account@<field_name>

Credentials to Access Ticketing System

AUTHTOKEN - Authentication token value given in the integration GUI
TICKETINGSYSTEMURL - URL given in the integration GUI


Advanced Configuration Details

ISPMPTICKETCRITERIA - To check if Password Manager Pro vs Ticketing system is configured or not

(Boolean - true or false)

PMPTICKETCRITERIACOLUMNS - Mapping details between Password Manager Pro and ticketing system. Each element in the array represents a criteria. For example, the column 'User Account' in Password Manager Pro has to be validated against Ticketing system column 'REQUESTER' with match parameter 'EQUAL' in criteria 'C1'

JSONArray - [ ["C1","User Account","REQUESTER","EQUAL"],
["C2","PMP User Name","TECHNICIAN","EQUAL"] ]

PMPTICKETCRITERIA - Specifies the relationship between different criteria. Each element of 'PMPTICKETCRITERIACOLUMNS' contains the first parameter as criteria name. It gives the relationship between criteria

(String - Example: C1 or C2)

ISTICKETVALUECRITERIA - To check if the validation for ticketing system values is configured or not.

(Boolean - true or false)

TICKETVALUECRITERIACOLUMNS - Mapping details that ticket should satisfy. Each element in the array represents an criteria. For example, ticket column 'STATUS' has to be validated against value other than 'Closed' in criteria 'C1'

JSONArray - [ ["C1","STATUS","Closed","NOT_EQUAL"],
["C2","URGENCY","high","EQUAL"],
["C3","IMPACT","high","EQUAL"] ]

TICKETVALUECRITERIA - Specifies the relationship between different criteria. Each element of 'TICKETVALUECRITERIACOLUMNS' contains the first parameter as criteria name. It gives the relationship between criteria

(String - Example: C1 or (C2 and C3)


ISTICKETCHANGEIDSTATUS - To check if the validation for system change status check is configured or not (true or false)
TICKETCHANGEIDSTATUS - Associated 'change ID status' of the ticket ID value

Match Parameters can be

EQUAL - Values of two parameters should be same
NOT_EQUAL - Values of two parameters should not be same
CONTAINS - First parameter value should contain the value of second parameter
NOT_CONTAINS - First parameter value should not contain the value of second parameter,
STARTS_WITH - First parameter must start with value of second parameter,
ENDS_WITH - First parameter must end with value of second parameter,
(Date based comparison parameters)
LESS_THAN - First parameter date value should be less than the second one,
GREATER_THAN - First parameter date value should be greater than the second one,
LESS_THAN_EQUAL - First parameter date value should be less than or equal to the second one,
GREATER_THAN_EQUAL - First parameter date value should be greater than or equal to the second one
Depending on the match parameters, the criteria should get validated.

7. Code Snippet For ServiceNow Custom Implementation

If the advanced configuration does not satisfy your requirements, you can have a custom implementation. You can extend the default implementation provided by Password Manager Pro and have the additional functionalities. The following example shows how the default implementation created for ServiceNow, can be extended to serve as the custom implementation.

package com.manageengine.ts;
import java.util.Properties;
import org.json.simple.JSONObject;
import com.adventnet.passtrix.helpdesk.ServiceNowImpl;
//ServiceNow custom implementation
public class ServiceNowCustomImpl extends ServiceNowImpl
{
public boolean checkViewHelpDeskRequest(String ticketId, Properties pmpColumns, Properties credentialDetails, JSONObject criteriaDetails)
throws Exception
{
boolean result = super.checkViewHelpDeskRequest(ticketId, pmpColumns, credentialDetails, criteriaDetails);
//Your own implementation
return result;
} }



The table below lists down default functionality processing classes for the ticketing systems that readily integrate with Password Manager Pro:

ServiceDesk Plus Cloud

com.adventnet.passtrix.helpdesk.ServiceDeskPlusCloudImpl

ServiceDesk Plus MSP

com.adventnet.passtrix.helpdesk.ServiceDeskPlusMSPImpl

ServiceDesk Plus

com.adventnet.passtrix.helpdesk.ServiceDeskPlusOnPremiseImpl

ServiceNow

com.adventnet.passtrix.helpdesk.ServiceNowImpl

JIRA

com.adventnet.passtrix.helpdesk.JiraServiceDeskImpl


8. Interface Description

The interface for ticketing system integration:

package com.manageengine.ts;
import java.util.Properties;
import org.json.simple.JSONObject;
// This class provides the methods to implement ticketing system integration. You need to implement this interface
public interface TicketingSystemInterface
{
/**
* Used to display the error message while doing the ticketing system related operations. The output gets reflected in audit trails.
* @return Error message, if the ticketing system accessible, return null. Otherwise, return a proper error message.
*/
public String getErrorMsg();
/**
* Used to return the properties related to the ticketing system operation
* @return Comments and needed message
*/
public Properties getRequestProperties();
/**
* Used for testing configuration setup. While testing, administrator will be able to get ticket details from the ticketing system.
* @param tsName Ticketing system Name
* @param tsUrl Ticketing system Web URL
* @param authToken Authentication Token assigned to a technician of ticketing system (Base64 authorization string constructed
using login credentials in the case of ServiceNow ticketing system)
* @param ticketId Ticket ID given as the input ((Ticket ID/Sys ID in the case of ServiceNow ticketing system)
* @param Ticketing System operation type
* {@value 0} Ticketing Operation
* {@value 1} Change Related Operation
* @return the output from ticketing side
* @throws Exception
*/
public JSONObject helpdeskCheck(String tsName, String tsUrl, String authToken, String ticketId, String operation) throws Exception;
/**
* Actual function that will be called upon whenever a ticketing system related operation is done from Password Manager Pro GUI
* @param ticketId Ticket ID (Ticket ID/Sys ID in the case of ServiceNow ticketing system)
* @param pmpColumns Details of the Password Manager Pro account for which ticketing system query is raised
* @param credentialDetails Key details of ticketing system (Authentication token or Base64 authorization string
and web URL of ticketing system)
* @param criteriaDetails Criteria mapping done as part of advanced configuration
* @return Final output that will be sent to Password Manager Pro server
* {@value true} Success case - Allows the operation to proceed
* {@value false} Failure case - Denies the operation to proceed
* @throws Exception
*/
public boolean checkViewHelpDeskRequest(String ticketId, Properties pmpColumns, Properties credentialDetails, JSONObject criteriaDetails)
throws Exception;
}

Top