Toktra’s ITSM integration turns policy violations into actionable tickets in your existing service management platform. Tickets are created automatically when a violation fires, and status changes in your ITSM flow back into Toktra via a webhook receiver.Documentation Index
Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt
Use this file to discover all available pages before exploring further.
Supported platforms
ServiceNow
REST API — incidents created via the Table API (
/api/now/table/incident) with Basic authentication.Jira Cloud
REST API v3 — issues created via
/rest/api/3/issue with Basic authentication (email + API token).Configuring an ITSM connector
Open the Integrations page
In your Toktra dashboard, go to Integrations → ITSM (
/integrations/itsm). Click Add connector.Enter credentials
Fill in the platform-specific fields described in Required credentials below.
Set defaults
Enter a Default project (Jira project key, e.g.
SEC) or Assignment group (ServiceNow) and a Default issue type (e.g. Bug, Incident). These are used when creating tickets from policy violations.Test the connection
Click Test connection. Toktra creates a low-severity test ticket in your ITSM and shows you the external ticket ID. Verify the ticket appears before saving.
Required credentials
- ServiceNow
- Jira
| Field | Description |
|---|---|
| Instance URL | The base URL of your ServiceNow instance, e.g. https://company.service-now.com. |
| Username | A ServiceNow user with the itil role and write access to the incident table. |
| Password | Password for the user above. |
| Assignment group | Optional. The group name to assign created incidents to, e.g. IT Security. |
Environment variables
Toktra uses HTTP Basic authentication (
Authorization: Basic <base64(username:password)>). For production use, create a dedicated service account with the minimum required permissions.Automatic ticket creation
When the Toktra policy engine evaluates a violation, it automatically calls your active ITSM connector. Tickets are created with:- Title:
[Toktra] <event_type>: <summary>— e.g.[Toktra] policy_violation: max-tokens exceeded - Description: Full JSON violation payload including user, model, provider, and policy details
- Severity mapping: See Severity mapping below
- Labels (Jira):
toktra,ai-policy, and the severity level
Severity mapping
Toktra severity levels map to native ITSM priority fields as follows:- ServiceNow
- Jira
| Toktra severity | ServiceNow urgency | ServiceNow impact |
|---|---|---|
critical | 1 — High | 1 — High |
high | 2 — Medium | 2 — Medium |
medium | 2 — Medium | 3 — Low |
low | 3 — Low | 3 — Low |
Bidirectional sync
When a ticket is resolved or updated in your ITSM, you can push the status change back to Toktra. Configure your ITSM to send a webhook to:ITSM webhook payload
external_ticket_id to a known ticket and updates its status in the Incidents page. Valid status values are open, in_progress, resolved, and closed.
Toktra does not currently verify an HMAC signature on inbound ITSM webhooks. Restrict access to the webhook endpoint at the network level (e.g. allowlist your ITSM’s IP ranges).
Creating tickets manually
You can create an ITSM ticket for any incident directly from the Toktra Incidents page:Create ticket
Click Create ITSM ticket. Select the ITSM connector to use if you have more than one configured.
/toktra-alerts command. See the Slack integration page.