Service accounts

Learn how to create and manage service accounts in Soda Cloud to authenticate automated pipelines and API integrations without tying credentials to individual users.

circle-exclamation

Service accounts are organization-bound identities designed for automated pipelines and API integrations. Unlike regular users, they authenticate exclusively via API key. They have no email/password login and are not tied to any individual's SSO credentials.

Use service accounts when you want API keys that are independent of any individual user, for example in CI/CD pipelines, scheduled scans, or data engineering workflows.

A service account can...
A service account cannot

check Run soda-core scans (results attributed to the service account)

x Log in to the Soda Cloud UI

check Call the Soda Cloud REST API

x Participate in agreements, discussions, or incidents via the UI

check Be assigned to datasets and user groups

x Be used as agents (agents use their own API keys)

check Receive notifications

check Create and verify data contracts from a pipeline

check Log incident activity via API

Create a service account

1

Click on your avatar > Organization Settings > Service Accounts tab

2

Create a new service account

Click on plus (top right) to create a new service account.

Enter a name and a unique email address for the service account, then confirm.

circle-info

A unique email is required but it does not represent a real login.

3

Store the API key

Copy the API key that is displayed. This is the only time the key is shown. It cannot be retrieved after you navigate away.

Use the API key ID and secret as credentials wherever you would normally configure Soda API keys, for example in soda-core scan configurations or REST API calls.

Deactivate a service account

In the Service Accounts tab, open the context menu for the account and select Deactivate. The API key is immediately invalidated.

circle-info

Note: Service accounts cannot be deleted by design. They are only deactivated until activated again.


Default permissions

New service accounts are automatically assigned a default role configured under Organization Settings > Global Roles > Responsibilities. This default role excludes UI-bound permissions that don't apply to non-human accounts.

You can also:

  • Add a service account to a user group to inherit that group's dataset permissions.

  • Assign a service account a direct dataset role via the dataset's Edit Responsibilities panel.

When both a group-inherited and a direct dataset role exist, the higher permission takes precedence.


circle-info

You are not logged in to Soda and are viewing the default public documentation. Learn more about Documentation access & licensing.

Last updated

Was this helpful?