Okay, The OAUTH integration message asks for credentials and says that that account will be able to interact as if it was you, right? And based on what you said, this is what happening (assuming that whenever that ServiceNow screen shows up you are adding your own credentials to allow OAUTH, instead of the credentials of the local API account you should have on ServiceNow for this purpose as you also mentioned that the account does NOT have interactive UI access). IMO and based in your statement, I believe in that authorization part you entered your own credentials and now during your tests this is the reason why ServiceNow is showing Splunk interactions as if it was you. So, though I'm just repeating myself, I guess the path is: If using basic auth: Create a new ServiceNow account config in the Splunk TA as you shown before, define it as basic On your alerts, whenever configuring the send event / incident action, pass the name of the account you created here You're done! If using OAUTH: Create a new ServiceNow account config in the Splunk TA as you shown before, define it as OAUTH While being redirected to ServiceNow OAUTH authorization page, insert the API account user name and password (not your own) - At this step, if your API account isn't accepted, then you cannot use it as it lacks those interactive permissions I mentioned According to the message, whatever communication between Splunk and ServiceNow with that OAUTH channel will use THAT logged account during auth phase On your alerts, whenever configuring the send event / incident action, pass the name of the account you created here You're done!
... View more