Service Accounts are dedicated API users that provide controlled access for agents and automations. Unlike regular user accounts, service accounts cannot be used for login—they exist solely to execute automated tasks with specific, managed permissions.
Purpose-Built API Users
Service accounts allow your agents and automations to operate with defined permissions, ensuring consistent security controls and complete auditability of automated actions.
Key Benefits:
Controlled Access: Grant automations and agents only the permissions they need
Security: Cannot be used for interactive login—API-only access
Auditability: All actions performed by service accounts are tracked in the Activity Log
Accountability: Clear ownership and purpose documentation for each service account
Collaboration: Control which users and groups can use each service account
Service accounts act as the identity under which your agents and automations operate. When you assign a service account to an automation or agent:
1
Permissions Apply
The automation or agent runs with the exact permissions granted to that service account—no more, no less
2
Data Access Enforced
Data access policies assigned to the service account determine what records the automation or agent can access
3
Actions Attributed
All actions performed are logged as being performed by the service account, providing clear audit trails
Important: Service accounts have no default access to your data. You must explicitly configure data access policies for any app, element, or table the service account needs to interact with.
Go to your Elementum organization and select the app where you want to create the service account
2
Access Service Accounts
In the app subnavigation, navigate to Security → Service Accounts
3
Create New Service Account
Click “Create Service Account” in the upper right corner
4
Configure Account Details
Fill in the required information:
First Name: The service account’s display first name
Last Name: The service account’s display last name
Purpose: A description explaining the intended use for this API user—this helps other authorized users understand what the service account was created for
Profile Photo (optional): Add an avatar image that will appear in agent conversations and activity logs
5
Save and Configure Permissions
After creating the service account, you’ll need to configure its permissions and data access
Tip: Use descriptive names and clear purpose statements. For example, name it “Support Bot” with purpose “Handles L1 support ticket creation and routing” so other administrators understand its intended use.
The Roles tab controls what actions the service account can perform within the app.
Role-Based Permissions
Assign roles to grant specific capabilities like creating records, running automations, or accessing agents. Service accounts follow the same role-based permission model as regular users.
1
Access Role Settings
Click the overflow menu on the service account and select permissions, then navigate to the Roles tab
2
Assign Roles
Select the roles that grant the permissions your automation or agent needs to perform its tasks
3
Apply Changes
Save your changes to apply the role assignments
Common Role Scenarios
Permission Best Practices
Automation Service Account:
Assign roles with permissions for Create Records, Update Records, and Run Automations
Agent Service Account:
Assign roles with permissions for Records, Comments, Attachments, and Agent access
Read-Only Service Account:
Assign roles with only Read permissions for reporting or monitoring automations
Principle of Least Privilege:
Grant only the minimum permissions required for the service account’s intended purpose
Review and remove unnecessary permissions periodically
Separation of Concerns:
Create separate service accounts for different types of automations
Don’t reuse a single service account for unrelated tasks
The User/Group Access tab controls which users and groups are authorized to use this service account.
Access Control for Service Accounts
Restrict who can assign this service account to their agents and automations. This provides an additional layer of security by ensuring only authorized personnel can leverage specific service accounts.
1
Access User/Group Settings
Click the overflow menu on the service account and select permissions, then navigate to the User/Group Access tab
2
Add Authorized Users
Select individual users who should be able to use this service account
3
Add Authorized Groups
Select user groups whose members should be able to use this service account
Only users and groups listed in the User/Group Access tab can select this service account when configuring agents or automations.
Critical: Service accounts have no data access by default. You must explicitly add data access policies for every app, element, and table the service account needs to access.
Service accounts follow the same data access model as regular users. To grant data access:
1
Navigate to Data Access
Go to App Settings → Security → Data Access
2
Create or Edit a Policy
Create a new policy or edit an existing one
3
Add Service Account
In the Users and Groups section, add the service account
4
Configure Access Conditions
Define which records the service account can access based on your security requirements
Scenario: An automation that processes all records in an elementConfiguration: Create a policy with no conditions (access to all records) and assign only the specific service account
Scoped Access for Agents
Scenario: An agent that should only access records in a specific status or categoryConfiguration: Create a policy with conditions matching the records the agent should see (e.g., StatusisOpen)
Cross-App Access
Scenario: An automation that needs to work across multiple appsConfiguration: Add data access policies in each app the service account needs to access
Elementum will attempt to warn you when configuring agents and automations if your selected service account doesn’t have the correct permissions or is missing required data access.
When creating or editing automations, you’ll be prompted to select a service account.
1
Navigate to Automations
Go to your app and navigate to Workflow → Automations
2
Create or Edit an Automation
Create a new automation or edit an existing one
3
Select Service Account
When prompted, select the service account that should execute this automation
4
Verify Permissions
Ensure the service account has the necessary roles and data access for the automation’s actions
Automation Execution Identity
Once assigned, the automation runs as the service account. All records created, updated, or accessed by the automation will be attributed to that service account in the Activity Log.
Remember: Service accounts are the recommended way to run agents and automations in production. They provide security, accountability, and clear separation between automated processes and human user actions.