Skip to content

Service Accounts

Service accounts are special accounts designed for automated systems and integrations that interact with the RAMP API. Unlike regular user accounts, service accounts are not tied to individual people and are intended for machine-to-machine communication.

Required role: Administrator

Navigate to Administration > Service Accounts (or /_admin/service-accounts).

Service accounts are appropriate for:

Use CaseExample
CI/CD pipelinesAutomated deployment tools that create or update instances in RAMP
Monitoring systemsExternal monitoring tools that read instance status or execution progress
Integration platformsMiddleware that connects RAMP with ticketing systems, CMDB, or orchestration tools
Scheduled automationCron jobs or scheduled tasks that interact with the RAMP API
Reporting toolsBusiness intelligence tools that pull data from RAMP for dashboards
  1. Click Create Service Account.
  2. Enter a Name that clearly identifies the account’s purpose (e.g., “Jenkins CI Pipeline”, “Monitoring Service”, “CMDB Integration”).
  3. Optionally add a Description explaining what the service account is used for and who maintains it.
  4. Click Create.
  5. RAMP generates API credentials for the service account. Copy and store these credentials securely.

Service accounts use the same role system as regular users. Assign only the roles needed for the integration’s functionality.

  1. Click on the service account.
  2. Open the Roles tab.
  3. Click Add Role.
  4. Select the appropriate application role.
  5. Click Assign.
Integration TypeRecommended Roles
Read-only monitoringGlobalInstanceObserver, GlobalTemplateViewer
Instance creationGlobalInstanceEditor or GlobalInstanceExecutor
Full automationGlobalInstanceHead (use carefully)
Template managementGlobalTemplateEditor
ReportingGlobalTemplateViewer, GlobalInstanceObserver
  1. Click on the service account in the list.
  2. Modify the name or description.
  3. Click Save.

If credentials are compromised or lost:

  1. Click on the service account.
  2. Click Regenerate Credentials.
  3. Copy and store the new credentials securely.
  4. Update all systems that use the old credentials.

To temporarily disable a service account without deleting it:

  1. Click on the service account.
  2. Toggle the status to Inactive.
  3. Click Save.

Deactivated service accounts cannot authenticate. All API calls using their credentials will be rejected.

  1. Click on the service account.
  2. Click Delete.
  3. Confirm the deletion.

Service accounts authenticate with the RAMP API using their credentials to obtain a JWT token. This token is then included in the Authorization header of subsequent API requests.

Authorization: Bearer <token>

The authentication flow is:

  1. Send credentials to the authentication endpoint.
  2. Receive a JWT token.
  3. Include the token in all API requests.
  4. Refresh the token before it expires.
  • One account per integration — create separate service accounts for each system or integration. This makes it easy to revoke access for a specific integration without affecting others.
  • Descriptive names — name service accounts after their purpose, not the person who set them up.
  • Document owners — add the responsible team or person in the description so others know who to contact.
  • Rotate credentials — periodically regenerate credentials as a security measure, especially for accounts with broad permissions.
  • Monitor usage — review service account activity periodically to ensure they are being used as intended.
  • Least privilege — assign only the minimum roles needed for the integration to function.