Yes, I use clientMetadata in my access requests, and while the data is not directly searchable in IdentityNow, I can leverage it in a PowerBI report.
Here’s an example API request body for an access request. I include the number and Id of the request, as well as the Id of the catalog item it came from, since we use multiple catalog items in our ServiceNow instance that send in access requests.
{
"requestedFor": [
"2c918088804308340180474a372d5773"
],
"requestedItems": [
{
"type": "ACCESS_PROFILE",
"id": "4bc441cc76704d81904a3d5266214c0c",
"comment": "Created via ServiceNow Request Item RITM0121796 Requestor Comments: INEOS access to support data export."
}
],
"clientMetadata": {
"catalogItem": "5eb5e1181bc7091062a9ececbc4bcbf9",
"requestedItemId": "3a3c08564746f5104887861f536d4316",
"requestedItemNumber": "RITM0121796"
}
}
Here is the request in the /v3/access-request-status call, notice there is no clientMetadata there, but there is an attribute called “accessRequestId”. That is the Id of the associated Account Activity
{
"name": "SecWV10TSA-INEOSProd",
"type": "ACCESS_PROFILE",
"cancelledRequestDetails": null,
"errorMessages": null,
"state": "REQUEST_COMPLETED",
"approvalDetails": [],
"manualWorkItemDetails": null,
"accessRequestPhases": [
{
"started": "2023-10-24T21:13:59.391297Z",
"finished": "2023-10-24T21:14:09.381300Z",
"name": "SOD_PHASE",
"result": null,
"state": "COMPLETED",
"phaseReference": "sodViolationContext"
},
{
"started": "2023-10-24T21:14:09.718323Z",
"finished": "2023-10-24T21:14:09.869180Z",
"name": "APPROVAL_PHASE",
"result": null,
"state": "COMPLETED",
"phaseReference": "approvalDetails"
},
{
"started": "2023-10-24T21:14:10.009554Z",
"finished": "2023-10-24T21:14:15.785302Z",
"name": "PROVISIONING_PHASE",
"result": "SUCCESSFUL",
"state": "COMPLETED",
"phaseReference": null
}
],
"accountActivityItemId": "9760258cb7ab4e56b0f4528787d4a747",
"requestType": "GRANT_ACCESS",
"modified": "2023-10-24T21:14:18.645Z",
"created": "2023-10-24T21:13:59.054Z",
"requester": {
"type": "IDENTITY",
"id": "2c918087802a65bd01803d456238178d",
"name": "ServiceNow"
},
"requestedFor": {
"type": "IDENTITY",
"id": "2c918088804308340180474a372d5773",
"name": "Megan F"
},
"requesterComment": {
"comment": "Created via ServiceNow Request Item RITM0121796 Requestor Comments: INEOS access to support data export.",
"author": {
"type": "IDENTITY",
"id": "2c918087802a65bd01803d456238178d",
"name": "ServiceNow"
},
"created": "2023-10-24T21:13:59.054Z"
},
"sodViolationContext": {
"state": "SUCCESS",
"violationCheckResult": {
"message": {
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": ""
},
"violatedPolicies": [],
"violationContexts": [],
"clientMetadata": {
"identityRequestItemId": "9760258cb7ab4e56b0f4528787d4a747",
"identityRequestId": "ef46b9197c1c44ffbe7c6b8a9b32f7ea",
"workflowCaseId": "c56a687da10f4b3ea35849c3168151b3"
}
},
"uuid": "d66a22c9-5f82-47aa-b269-2608949702d2"
},
"provisioningDetails": null,
"preApprovalTriggerDetails": null,
"description": "Requested by Graham H - RITM0086418",
"removeDate": null,
"cancelable": false,
"accessRequestId": "f21da68a5f38438ba7794a97ee7539bd",
"clientMetadata": null
}
So, searching for the account activity using the Id from the access request, we get the following, notice the clientMetadata is there
{
"completed": "2023-10-24T21:14:18.644Z",
"completionStatus": "PENDING",
"type": "appRequest",
"requesterIdentitySummary": {
"id": "2c918087802a65bd01803d456238178d",
"name": "ServiceNow"
},
"targetIdentitySummary": {
"id": "2c918088804308340180474a372d5773",
"name": "Megan F"
},
"errors": null,
"warnings": null,
"items": [
{
"id": "03c899f1aba7474da9d3cf0eb5a6180a",
"name": "03c899f1aba7474da9d3cf0eb5a6180a",
"requested": "2023-10-24T21:14:10.291Z",
"approvalStatus": "FINISHED",
"provisioningStatus": "COMMITED",
"requesterComment": {
"commenterId": "2c918087802a65bd01803d456238178d",
"commenterName": "ServiceNow",
"body": "Created via ServiceNow Request Item RITM0121796 Requestor Comments: INEOS access to support data export.",
"date": "2023-10-24T21:13:59.054Z"
},
"reviewerIdentitySummary": null,
"reviewerComment": null,
"operation": "ADD",
"attribute": "memberOf",
"value": "CN=secWV10TSA-INEOSProd,OU=Security Groups,OU=Users and Groups,DC=chkenergy,DC=net",
"nativeIdentity": "CN=Megan F,OU=Contractors,OU=Users and Groups,DC=chkenergy,DC=net",
"sourceId": "2c9180877fdb6945017fe0b9ed8e5fef",
"accountRequestInfo": null,
"clientMetadata": null,
"removeDate": null
},
{
"id": "9760258cb7ab4e56b0f4528787d4a747",
"name": "9760258cb7ab4e56b0f4528787d4a747",
"requested": "2023-10-24T21:13:59.052Z",
"approvalStatus": "FINISHED",
"provisioningStatus": "FINISHED",
"requesterComment": {
"commenterId": "2c918087802a65bd01803d456238178d",
"commenterName": "ServiceNow",
"body": "Created via ServiceNow Request Item RITM0121796 Requestor Comments: INEOS access to support data export.",
"date": "2023-10-24T21:13:59.054Z"
},
"reviewerIdentitySummary": null,
"reviewerComment": null,
"operation": "ADD",
"attribute": "detectedRoles",
"value": "SecWV10TSA-INEOSProd [AccessProfile-1678286379446]",
"nativeIdentity": "202879",
"sourceId": "IdentityNow",
"accountRequestInfo": {
"requestedObjectId": "4bc441cc76704d81904a3d5266214c0c",
"requestedObjectName": "SecWV10TSA-INEOSProd",
"requestedObjectType": "ACCESS_PROFILE"
},
"clientMetadata": null,
"removeDate": null
}
],
"executionStatus": "VERIFYING",
"clientMetadata": {
"requestedItemNumber": "RITM0121796",
"requestedItemId": "3a3c08564746f5104887861f536d4316",
"catalogItem": "5eb5e1181bc7091062a9ececbc4bcbf9"
},
"id": "f21da68a5f38438ba7794a97ee7539bd",
"name": "f21da68a5f38438ba7794a97ee7539bd",
"created": "2023-10-24T21:13:59.054Z",
"modified": "2023-10-24T21:14:18.645Z"
}
And we’re able to bring it together in Power BI