Skip to content

Commit 28aef6a

Browse files
committed
PR comments
1 parent 3dbe3f5 commit 28aef6a

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

docs/admin/access_control/service_accounts.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,22 @@
11
# Service Accounts
22

3-
Service accounts are specialized user accounts designed for automation, API integrations, and programmatic access to Sourcegraph, as opposed to using access tokens from regular users. Unlike regular user accounts, service accounts don't require an email address or password and cannot access the Sourcegraph UI. They are specifically intended for automated workflows, CI/CD pipelines, scripts, and other non-human access patterns. Service accounts also don't count towards the user limit and won't be part of any billing cycles.
3+
Service accounts are specialized user accounts designed for automation, API integrations, and programmatic access to Sourcegraph, as opposed to using access tokens from regular users. Unlike regular user accounts, service accounts don't require an email address or password, cannot access the Sourcegraph UI, don't count towards a license's user limit and won't be part of any billing cycles.
44

55
## Creating Service Accounts
66

77
Service accounts are created like regular user accounts, but with a few key differences.
88

99
- Go to **Site admin****Users & auth****Users**
1010
- Click **Create User**
11-
- Enter a descriptive **Username** (e.g., `ci-automation`, `api-integration`)
11+
- Enter a descriptive **Username** (e.g., `ci-bot-scip-uploads`, `api-search-jobs`)
1212
- Check the **Service account** checkbox
1313
- Click **Create service account**
1414

1515
You'll be presented with some next steps you might want to take, like creating an access token, managing and assigning roles, and managing repository permissions.
1616

1717
- Service accounts are automatically assigned the "Service Account" system role
1818
- They appear in the user list with "Service account" type designation
19+
- By default, service accounts can only access public and unrestricted repositories
1920

2021
## Managing Access Tokens
2122

@@ -47,4 +48,4 @@ Administrators can assign additional roles to service accounts through the user
4748

4849
Service accounts respect repository permissions and access controls. For comprehensive information about repository permissions, see the [Repository permissions](/admin/permissions) documentation.
4950

50-
Service accounts cannot have external service accounts. If service accounts need access to private repositories, they must explicitly be granted access to those repositories. This can be done from the service account's user settings page, under the **Repo permissions** tab, or via [the GraphQL API](/admin/permissions/api#explicit-permissions-api).
51+
Service accounts by default can only access public and unrestricted repositories in Sourcegraph. You may explicitly grant fine-grained access to private repositories from the service account's user settings page, under the **Repo permissions** tab, or via [the GraphQL API](/admin/permissions/api#explicit-permissions-api).

0 commit comments

Comments
 (0)