Overview
Service Accounts are dedicated API users that provide controlled access for agents and automations. Unlike regular user accounts, service accounts cannot be used for login—they exist solely to execute automated tasks with specific, managed permissions.Purpose-Built API Users
Service accounts allow your agents and automations to operate with defined permissions, ensuring consistent security controls and complete auditability of automated actions.
- Controlled Access: Grant automations and agents only the permissions they need
- Security: Cannot be used for interactive login—API-only access
- Auditability: All actions performed by service accounts are tracked in the Activity Log
- Accountability: Clear ownership and purpose documentation for each service account
- Collaboration: Control which users and groups can use each service account
How Service Accounts Work
Service accounts act as the identity under which your agents and automations operate. When you assign a service account to an automation or agent:Permissions Apply
The automation or agent runs with the exact permissions granted to that service account—no more, no less
Data Access Enforced
Data access policies assigned to the service account determine what records the automation or agent can access
Creating a Service Account
Navigate to Your Organization
Go to your Elementum organization and select the app where you want to create the service account
Configure Account Details
Fill in the required information:
- First Name: The service account’s display first name
- Last Name: The service account’s display last name
- Purpose: A description explaining the intended use for this API user—this helps other authorized users understand what the service account was created for
- Profile Photo (optional): Add an avatar image that will appear in agent conversations and activity logs
Tip: Use descriptive names and clear purpose statements. For example, name it “Support Bot” with purpose “Handles L1 support ticket creation and routing” so other administrators understand its intended use.
Configuring Permissions
After creating a service account, configure its permissions through the overflow menu (⋮) on the service account row.Roles
The Roles tab controls what actions the service account can perform within the app.Role-Based Permissions
Assign roles to grant specific capabilities like creating records, running automations, or accessing agents. Service accounts follow the same role-based permission model as regular users.
Access Role Settings
Click the overflow menu on the service account and select permissions, then navigate to the Roles tab
Assign Roles
Select the roles that grant the permissions your automation or agent needs to perform its tasks
- Common Role Scenarios
- Permission Best Practices
Automation Service Account:
- Assign roles with permissions for Create Records, Update Records, and Run Automations
- Assign roles with permissions for Records, Comments, Attachments, and Agent access
- Assign roles with only Read permissions for reporting or monitoring automations
User/Group Access
The User/Group Access tab controls which users and groups are authorized to use this service account.Access Control for Service Accounts
Restrict who can assign this service account to their agents and automations. This provides an additional layer of security by ensuring only authorized personnel can leverage specific service accounts.
Access User/Group Settings
Click the overflow menu on the service account and select permissions, then navigate to the User/Group Access tab
Only users and groups listed in the User/Group Access tab can select this service account when configuring agents or automations.
Configuring Data Access
Service accounts follow the same data access model as regular users. To grant data access:Data Access Considerations
Broad Access for Automations
Broad Access for Automations
Scenario: An automation that processes all records in an elementConfiguration: Create a policy with no conditions (access to all records) and assign only the specific service account
Scoped Access for Agents
Scoped Access for Agents
Scenario: An agent that should only access records in a specific status or categoryConfiguration: Create a policy with conditions matching the records the agent should see (e.g.,
Status is Open)Cross-App Access
Cross-App Access
Scenario: An automation that needs to work across multiple appsConfiguration: Add data access policies in each app the service account needs to access
Elementum will attempt to warn you when configuring agents and automations if your selected service account doesn’t have the correct permissions or is missing required data access.
Using Service Accounts with Automations
When creating or editing automations, you’ll be prompted to select a service account.Select Service Account
When prompted, select the service account that should execute this automation
Automation Execution Identity
Once assigned, the automation runs as the service account. All records created, updated, or accessed by the automation will be attributed to that service account in the Activity Log.
Using Service Accounts with Agents
Agents can be configured to operate under a service account identity, which affects both permissions and how the agent appears to users.Agent Identity and Appearance
When an agent uses a service account:Profile Photo
The service account’s profile photo appears as the agent’s avatar in conversations
Display Name
The service account’s name appears as the sender in chat messages
Activity Attribution
All actions performed by the agent are logged under the service account
Consistent Identity
Users see a consistent brand/identity regardless of which agent variant they interact with
Activity Log Integration
All actions performed by service accounts are fully tracked in the Activity Log.- What Gets Logged
- Identifying Service Account Actions
- Record creation, updates, and deletions
- Automation executions and their outcomes
- Agent conversations and tool invocations
- Permission changes and data access
- Any API calls made using the service account
For complete details on Activity Log capabilities, see Activity Log.
Security Best Practices
Service Account Management
Purpose Documentation
Always document the intended purpose clearly so other administrators understand the service account’s role
Minimal Permissions
Apply the principle of least privilege—grant only permissions necessary for the specific use case
Regular Audits
Periodically review service account permissions and data access policies
Access Controls
Restrict which users and groups can use each service account
Common Security Patterns
One Service Account Per Function
One Service Account Per Function
Strategy: Create separate service accounts for different automation typesBenefits:
- Clear separation of concerns
- Easier permission management
- Better auditability
- Simpler troubleshooting when issues arise
Tiered Access Levels
Tiered Access Levels
Strategy: Create service accounts with different permission levelsExample:
- Read-Only SA: For reporting and monitoring automations
- Standard SA: For routine data processing
- Admin SA: For administrative automations (use sparingly)
Team-Based Service Accounts
Team-Based Service Accounts
Strategy: Create service accounts owned by specific teamsBenefits:
- Teams manage their own automation identities
- Clear ownership and accountability
- User/Group access controls limit usage to team members
Troubleshooting
Common Issues
Automation/Agent Can't Access Records
Automation/Agent Can't Access Records
Symptom: Automation fails or agent reports no records foundSolutions:
- Verify data access policies include the service account
- Check that policy conditions allow access to the expected records
- Ensure policies exist in all apps/elements the automation needs
Permission Denied Errors
Permission Denied Errors
Symptom: Actions fail with permission errorsSolutions:
- Review roles assigned to the service account
- Verify the required permissions are included in assigned roles
- Check if the specific action requires additional permissions
Can't Select Service Account
Can't Select Service Account
Symptom: Service account doesn’t appear in dropdown when configuring automation/agentSolutions:
- Verify you have been granted access in the User/Group Access tab
- Check if the service account was created in the correct app
- Contact the service account owner to request access
Wrong Identity Appearing
Wrong Identity Appearing
Symptom: Actions show different user than expected in Activity LogSolutions:
- Confirm the service account is properly assigned to the automation/agent
- Check for any “Run as current user” settings that might override the service account
- Verify the automation/agent configuration was saved after assigning the service account
Integration with Other Features
Roles & Permissions
Service accounts use the same role-based permission system as regular users
Data Access
Configure data access policies to control which records service accounts can access
Automations
Assign service accounts to automations for controlled, auditable execution
Activity Log
All service account actions are tracked in the comprehensive audit trail
Remember: Service accounts are the recommended way to run agents and automations in production. They provide security, accountability, and clear separation between automated processes and human user actions.