diff --git a/blog-service/2025-05-01-manage.md b/blog-service/2025-05-01-manage.md
new file mode 100644
index 0000000000..08031e46f4
--- /dev/null
+++ b/blog-service/2025-05-01-manage.md
@@ -0,0 +1,17 @@
+---
+title: Service Accounts (Manage)
+image: https://help.sumologic.com/img/sumo-square.png
+keywords:
+ - manage
+ - access keys
+ - service accounts
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+We are happy to announce that you can now create service accounts in Sumo Logic. Service accounts are a special type of account designed for automating processes that use Sumo Logic APIs, such as scripts, integrations, and infrastructure as code. Unlike user accounts, service accounts are not associated with an individual and do not allow for interactive logins.
+
+[Learn more](/docs/manage/security/service-accounts).
+
+
\ No newline at end of file
diff --git a/cid-redirects.json b/cid-redirects.json
index 9120856eaa..3c98025196 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -2361,6 +2361,7 @@
"/cid/5155": "/docs/manage/field-extractions",
"/cid/5156": "/docs/send-data/collection/processing-rules",
"/cid/5162": "/docs/manage/security/access-keys",
+ "/cid/51621": "/docs/manage/security/service-accounts",
"/cid/5163": "/docs/search/search-query-language/search-operators/geo-lookup-map",
"/cid/5164": "/",
"/cid/5165": "/docs/manage/data-forwarding/amazon-s3-bucket",
diff --git a/docs/api/index.md b/docs/api/index.md
index 44297850d2..8623929841 100644
--- a/docs/api/index.md
+++ b/docs/api/index.md
@@ -210,6 +210,11 @@ To connect with other Sumo Logic users, post feedback, or ask a question, visit
![]()
Search Job
+
})
+1. On the **Personal Access Keys** tab, click **+ Add Access Key**.})
1. **Name**. Enter a name for your access key.
1. **Allowed CORS Domains (optional)**. Create an allowlist of domains from which the access key can be used to access Sumo Logic APIs. For more information, see [CORS support](#cors-support).
:::note
@@ -41,15 +48,26 @@ In Sumo Logic, you'll need an access key to:
After you click **Done**, you will not be able to recover this Access ID and Access Key.
:::
-All personal access keys created in the organization are displayed in the **Access Keys** page, described next.
+All personal access keys created in the organization are displayed in the **Access Keys** tab, described next.
+
+### From the Access Keys tab
-### From the Access Keys page
+The **Access Keys** tab shows all access keys in the system. It provides a central place for administrators to manage access keys.
-Administrators can create access keys under **Access Keys** as an alternative to doing it [from the Personal Access Keys page](#from-the-personal-access-keys-page).
+Administrators can create access keys under **Access Keys** as an alternative to doing it [from the Personal Access Keys tab](#from-the-personal-access-keys-tab) or [from a service account](#from-a-service-account).
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Access Keys**.
-1. Follow the steps in the [previous section](#from-the-personal-access-keys-page), starting with step 3.
+1. At the top right of the table, click **+ Add Access Key**.
+1. Follow the steps in [From the Personal Access Keys tab](#from-the-personal-access-keys-tab) section above, starting with step 3.
+
+### From a Service Account
+
+Administrators can create access keys on a service account for use in scripts or automation. For more information, see [Service Accounts](/docs/manage/security/service-accounts).
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Service Accounts**.
+1. Follow the steps in [From the Personal Access Keys tab](#from-the-personal-access-keys-tab) section above, starting with step 3.
#### CORS support
@@ -89,7 +107,7 @@ an Access-Control-Allow-Origin header.
If you have the [**Manage Access Keys** role capability](/docs/manage/users-roles/roles/role-capabilities#security), you can edit, deactivate, and delete any access keys created by other users in your organization.
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Access Keys**.
+
+1. **Name**. Enter a name for your service account. Make it descriptive enough so that others will be able to tell what its purpose is.
+1. **Email**. Enter an email to associate with the service account. It should be an email monitored by an organization rather than an email for an individual, so that it is not dependent on use by a single person.
+1. **Roles**. Select the roles to assign to the service account. A service account must have the [role capabilities](/docs/manage/users-roles/roles/role-capabilities) needed to execute the tasks its access keys are needed for.
+ :::tip
+ You can further limit permissions in the access keys using scope. The scoping of keys allows you to further restrict an access key to a subset of the service account’s assigned role capabilities.
+ :::
+1. Click **Save**.
+1. Proceed to the next section to add access keys to the service account.
+
+### Add an access key to a service account
+
+After you have created a service account, add access keys to the service account. The access keys are tied to the service account. When you create an access key for a service account, ensure that the scope of the key is restricted to only the rights needed for the key.
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Service Accounts**.
+1. The **Add New Access Key** window appears. Add the access key information, including scopes. Follow the steps to add an access key as described in [Create an access key](/docs/manage/security/access-keys/#create-an-access-key).
+1. You can add multiple access keys to the service account.
+
+:::note
+Any access keys you add on a service account appear on the [**Access Keys** tab](/docs/manage/security/access-keys/#from-the-access-keys-tab).
+:::
+
+## Change a service account
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Service Accounts**.
+
+:::warning
+When a service account is deactivated or deleted, the access keys on the service account are also deactivated or deleted. For more information about deactivation, see [Access Keys deactivation policy](/docs/manage/security/access-keys/#access-keys-deactivation-policy).
+:::
+
+## Change an access key on a service account
+
+To modify only the access keys on a service account (rather than the service account itself), open the service account, hover over an access key, and click the three-dot kebab icon to reveal modification options.
+
+
+
+## Audit logging for service account activity
+
+Service account events are recorded in the Audit Event Index as user events. To search for for service account events, run this query:
+
+```
+_index=sumologic_audit_events _sourceCategory=users
+```
+
+Service account events will return with `subsystem` shown as `serviceAccounts`.
+
+For more information about audit logging, see [Audit Event Index](/docs/manage/security/audit-indexes/audit-event-index/).
diff --git a/sidebars.ts b/sidebars.ts
index e59a9081ba..f4399a1895 100644
--- a/sidebars.ts
+++ b/sidebars.ts
@@ -1058,6 +1058,7 @@ module.exports = {
'manage/security/2-step-verification-admins',
'manage/security/2-step-verification-users',
'manage/security/access-keys',
+ 'manage/security/service-accounts',
{
type: 'category',
label: 'Audit Indexes',
@@ -3097,6 +3098,7 @@ integrations: [
'api/scan-budget',
'api/scheduled-views',
'api/search-job',
+ 'api/service-accounts',
'api/service-allowlist',
'api/service-map',
'api/slo-management',
diff --git a/static/img/security/add-service-account.png b/static/img/security/add-service-account.png
new file mode 100644
index 0000000000..0a2b69d32f
Binary files /dev/null and b/static/img/security/add-service-account.png differ
diff --git a/static/img/security/edit-access-keys-on-service-account.png b/static/img/security/edit-access-keys-on-service-account.png
new file mode 100644
index 0000000000..6e345f96bb
Binary files /dev/null and b/static/img/security/edit-access-keys-on-service-account.png differ
diff --git a/static/img/security/modify-options-for-service-accounts.png b/static/img/security/modify-options-for-service-accounts.png
new file mode 100644
index 0000000000..d2bd9547bc
Binary files /dev/null and b/static/img/security/modify-options-for-service-accounts.png differ
diff --git a/static/img/security/service-account-details.png b/static/img/security/service-account-details.png
new file mode 100644
index 0000000000..f1f15149b9
Binary files /dev/null and b/static/img/security/service-account-details.png differ
diff --git a/static/img/security/service-accounts-page.png b/static/img/security/service-accounts-page.png
new file mode 100644
index 0000000000..364724d01d
Binary files /dev/null and b/static/img/security/service-accounts-page.png differ