.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy84NjYvMjUxNC9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9BZG1pbl9HdWlkZSgyKS5wbmciLCJDb25kaXRpb24iOnsiRGF0ZUxlc3NUaGFuIjp7IkFXUzpFcG9jaFRpbWUiOjE3NjU4MjIzMTB9fX1dfQ__&Signature=eUw32tz7JABaAqYT-jASub7kgg8oTrCJPS9Gi8jlgVqLee5M3hcIa9UPn2nF~GD7NbNIe6Fm0HqmZ0WyrTAruma3Cr5C3LIAU~KXLxxOvFNiX~JQ00n~EmfrBql6Vq5BKB-a6Y6i37Qskv3-rx8vw9I~ZvKtC9sGb8qe8N7hjNd2vPDep-tCNbXqSoFUKWEJYRp2p9EbMm1iR4gajxfdEIxWKnhF18qoS5Pkb8emANfWbv9~X8w1xdrO5MYGLtAAjfm1MqmF5-iwcjdnrm6iKGn1M5z-5wol4cYqWacXHm9xQ9ElCgLYs04e64iSEO2MYmsoDClftQ~APtMspaiHPg__&Key-Pair-Id=K2TK3EG287XSFC)
ServiceDesk Plus Cloud requires Zoho Account to manage your organization and user settings. Zoho offers the following two types of accounts:
Personal Account: This type of account is used by individual users to access services for personal use like Zoho Mail, Zoho Vault, etc.
Organization User Account: This type of account is used by businesses/organizations to set up and use services like ServiceDesk Plus Cloud Zoho CRM, Zoho Desk, etc. With this type of account, you can manage your organization's users, settings, etc.
ServiceDesk Plus Cloud is an organization model application and it requires you to sign up for an Organization User Account.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy84NjYvMjUxNC9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg5NykucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY1ODIyMzEwfX19XX0_&Signature=EGAojlNyNWIwOhUYdmaUmsDn6AvqlMVaCyWV7zUscyAtU~VViOEaiwXQ~3D4rGVpT~OxHlBhNQfAPe20KYYmhj2DobdHuczyX8myrxHfizpXcP3vDvxsDIHyuF97UJ6cXhne-HHyKNEfUjFmtdEgbGdtmpwEl8xlQNc3au5G8-pqXLWMVIJca62qZRFzKP-qa0UbfHolkpYbjj91ecQ1yhev-Ns-q1OMC4v~Oqeer4t5GhxbPKG7XKDzyMYkeqhVfIERVJQhy0f8KEHkPQmG5TW6O7Ok4wNFilDhpjPEMqDY7L5SHwxnzCwUfvIPWI4YYUtYCIA~VnZ~NCKG-sH5NA__&Key-Pair-Id=K2TK3EG287XSFC)
Through a three-step questionnaire, set up your account by specifying your industry, technician count, ITSM needs, and data preferences. This helps us personalize your setup, including recommended configurations and the appropriate license edition. Sample data will be populated based on your industry, helping you explore the platform faster. For example, healthcare setups include sample healthcare requests.
The user who signs up becomes OrgSuperAdmin and OrgContact, who will be the primary point of contact for all organization-related configurations and communications.
The Portal Name will be the subdomain of the URL that is used to access the application.
Once onboarding is complete, essential help desk configurations are applied automatically. Administrators can explore the platform through a guided tour or customize settings via a centralized setup page where access to key configurations, such as mail server setup, admin configurations, self-service portal customization, personalization settings, and GenAI and ML-powered features, are made easier.

Editions are automatically selected based on onboarding inputs. Administrators can switch editions at any time and select relevant add-ons to extend capabilities from the Profile pane. Based on the selected edition and add-ons, the system applies details page and navigation menu customizations. Switching editions will reset the admin-configured details page and navigation menu customizations to match the new edition.

If your organization's domain is used as the email domain for your users, you have to verify your domain with Zoho using CNAME, TXT, or HTML files. Once a domain is verified, users with verified email domains can be added directly as organization users.
To verify your domain,
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy84NjYvMjUxNC9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg5NSkucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY1ODIyMzEwfX19XX0_&Signature=kQqWUxnM1c3bE-zutd8KPrGGQQNI2gpRnyX~Zom~FuhZ7iQ772ljdl2iVNh5GjkU4hxlPut~GSCJDJAqx5MpU9yZXnp3uDyFJWcwIfKvUbX4jOY7Q9ke5QZKoyBFbCTLdwdERWdFPsqo9RGh6VuX1LB6XLcoS2moijSFbEBKiDlvYhYqSvRABiGNe2DuMtqOY7J3dZBncbA0vejv0oJjEdphnDZC3i5rylKhhqnOOln0RynjYoVUKRnZvXDgwU9i0Fx9djF6p8u3Huioz78UMGWmFt8fHcnaPY27SIZqUJQBzcqpTC2-FJWQlum3ht~UwTF0UoWyzsj7sQc8HMxXtQ__&Key-Pair-Id=K2TK3EG287XSFC)
CNAME Method:
Obtain the CNAME record information from this pop-up

The domain will be verified between 1 to 72 hours. You can check the status by clicking Verify. For more detailed instructions, click here.
Open a text editor and copy the verification code displayed on this pop-up to it.

The domain will be verified immediately. For more details, click here.
You can access ServiceDesk Plus Cloud by using the default URL or a custom domain URL.
The default URL is sdpondemand.manageengine.com. It varies by your region. For example, the default URL for organizations in India will be sdpondemand.manageengine.in. Learn more.
For long-term use, we recommend using a custom domain URL (support.zylker.com) rather than a subdomain with default URL (support.sdpondemand.manageengine.com). This ensures better compatibility for third-party integrations, bookmarks, or email notification links.
To use a custom domain URL,
To learn more about accessing ServiceDesk Plus Cloud via a custom domain URL, click here.
You can add users to ServiceDesk Plus Cloud in one of the ways listed below.
You can add users manually via the user addition form.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy84NjYvMjUxNC9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg5NikucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY1ODIyMzEwfX19XX0_&Signature=H-ywkixAmcCq2O980OLIsacE9efyAa0jMkWkDhqdRPjbsm0lo0nqmHCKp3ysdzafh6jLPQukfg9Qh3u7zGfuMqoHl5UH2hHdi2lnJFjz3dd2d554Uyd9fJ6OhOIW13Wte8rGzx0kn8oBi3ictcYtkpBbSqzVoRK502K3P6ITcT3LuVfusCyDOm8I0P7mfTELoJFXtfjL401hCo2bWACI5r4PN037lQaiNLZ-wUxr-1LMWD730i9VP5ZTM9xDOAduKa9Gksl4EOMBEpreEH4HIxBzy0wB~KO46aU-lYbbrGK~2QEdSqlmDWm5-0gUhBVonaCpZokvKzs95gPWDgyq3g__&Key-Pair-Id=K2TK3EG287XSFC)
After adding users to your organization, you can import them to your preferred instance by choosing Import Users > Import from Organization in the requester or technician list view. To access it, go to Setup > Users & Permissions > Requesters.

You can also import users in bulk to an instance using CSV files. To do this, go to Setup > Data Administration > Import Data, select module as Users, upload the CSV file and follow the on-screen instructions to import users.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy84NjYvMjUxNC9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSgxMTQpLnBuZyIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTc2NTgyMjMxMH19fV19&Signature=MLzRgr~LdTeDR610zgRReNVeK3-UuPw8eYlsZF4lOnhBAswdl~82u4t0rt1PjJqOIRyiMOUF0PqhPvSc-2dF2wMvmTJjepPeGkoKEFnkCvkd2QCaOTO4fupbNzI4PNQPnqjpTEu5v8YCJmtEGKqz9W5gROriv~kQ0Z8BwFUbv~0erPgYOlaW-GExin50qST50WGzbJeA-jwHO1UALWj04AXgAKp6FhuDsEryxeIY3YsRj4fq~VwwZUWUOhwzfcoSoCulJ0zbx5~f0R5KAiIbFD7ja8bplL3IYCGaNTsgagK3yQ3w3y4is8WHr39NnbLDXCXUpCWAWIasZEIMwVH9JQ__&Key-Pair-Id=K2TK3EG287XSFC)
You can import and sync user information from your local Active Directory using our provisioning tool. The Active Directory server must have Internet access to use the provisioning tool.
To download the provisioning tool, go to ESM Directory > Active Directory, and click Download under the Download Provisioning app section.

For instructions on how to use the provisioning tool, visit this guide.
You can use Azure AD to import and sync your entire user base. To do this, there are two methods as discussed below:
You can integrate Azure AD directly with ServiceDesk Plus and import users from Azure AD. To learn more, follow the links below:
You can also import users from Azure AD and sync with ServiceDesk Plus Cloud via Zoho Directory. Using this method, Azure AD is integrated with Zoho Directory instead of ServiceDesk Plus Cloud, which helps sync user information from Azure AD with all other apps that use Zoho Directory.
To do this,
Sign in to Zoho Directory as OrgAdmin.
Visit this link: https://directory.zoho.com/directory/<portal_name>/scimtoken?provider= microsoft.
Replace <portal_name> with your ServiceDesk Plus Cloud Portal Name.
Copy SCIM Endpoint and token.
Sign in to Microsoft Azure Portal as an admin.
Go to Portal Menu > Azure Active Directory.
Click Create your own application, provide a name, choose Integrate any other application you don't find in the gallery (Non-gallery), and click Create.

On the app page, click Provision User Accounts, and set provisioning mode to automatic.
Provide SCIM token and endpoint URL and click Test Connection.

Once the test connection is successful, attribute mapping is enabled for provisioning.
Expand Mappings tab.
Click Provision Azure Active Directory Users.
Target Object Actions: Choose the actions that you want to perform over Zoho Directory using Azure. ( Create, Update, Delete )
Close the tab and save the details.
To learn more, click here.
Once provisioning is ON, start provisioning will be auto-enabled. If needed, it can also be disabled (Sync will be disabled). You can restart provisioning anytime to resume synchronization.
Click the Users and Groups tab on the left pane.

Click Add user/group and assign users to the application.
You can import users from your Google Apps to ServiceDesk Plus Cloud if you use Google account or sign in to ServiceDesk Plus Cloud. To do this, the admin of Google Apps must be a technician with SDAdmin role in ServiceDesk Plus Cloud.
To import users from Google Apps,
Sign in to ServiceDesk Plus Cloud using your Google account.
Go to Setup > Users & Permissions > Requesters.
Select Import from Google Apps from the Import Users drop-down.
Alternatively, you can also access ServiceDesk Plus Cloud app from the Google Workspace Marketplace to your Google account.

You can configure login access for your users using any of the following methods.
ServiceDesk Plus Cloud uses Zoho credentials as its default method for authenticating users. When login permission is enabled for a new user, an invitation to create a Zoho account will be sent to the provided email.
To enable login permission for users,
Go to Setup > Users & Permissions > Requesters/Technicians.
Click Edit
against your preferred user.
Select the appropriate option: Enable login to requester(s) or Enable login to this technician.
Finally, click Save.

To learn more, visit configuring requesters or configuring technicians pages respectively.
You can use Active Directory to authenticate users via SAML. To use SAML for Active Directory authentication, you need to set up ADFS as the IdP for SAML.
To learn more about setting up AD FS 3.0, click here.
To configure SAML,
Go to ESM Directory > SAML Authentication.
Provide IdP Login URL, IdP Logout URL, and IdP's Certificate.
Choose an encryption algorithm: RSA or DSA.
Finally, click Save.

For more information on SAML configuration, click here.
To do this,
Sign in to directory.zoho.com as OrgAdmin.
Go to Security > Custom Authentication and copy the ACS URL.
Now, sign in to the Azure portal and configure the ACS URL and obtain the certificate, Sign in and Sign out URLs from the custom app created for user provisioning. To learn more, click here.
Upload the certificate and provide the necessary URLs in Zoho Directory > Security > Custom Authentication.
Finally, click Save.

You can authenticate users using Google Apps as the SAML identity provider.
To do this,
Make sure your organization domain has been verified under ESM Directory.
Configure Google Apps as SAML Identity provider:
Log in to admin.google.com.
On the Home page, click Apps.
Go to SAML Apps.
Click the New App ("+") button.
Click Setup my own Custom App.
Copy the SSO URL and Download the certificate.
Save the certificate with a ".cer" extension.
Provide other information as provided in the screenshots below.
In the Service Provider Details page, enter the ACS URL or Reply URL in the format <https://accounts.zoho.com/signin/samlsp/ORG ID> (if you have signed-up in EU, use accounts.zoho.eu)
Provide zoho.com as the Entity ID and your sub domain or custom domain configured in the application as the Start URL.
Log in to ServiceDesk Plus Cloud and go to ESM Directory > SAML Authentication.
Use the SSO URL copied from the Google Apps as the Login URL. For Logout URL, configure https://accounts.google.com/logout.
Browse and select the saved certificate with .cer extension and click Save.





To learn more, click here.
You can also configure SAML for third-party IdP similar to setting up SAML for AD.
To configure SAML,
Go to ESM Directory > SAML Authentication.
Provide IdP Login URL, IdP Logout URL, and IdP's Certificate.
Choose an encryption algorithm: RSA or DSA.
Finally, click Save.

For more information on SAML configuration, click here.