Looking for information, documentation, and best practices regarding Service Accounts(SA) and overall Authorization for external calls and ION connection points & flows. I would like to understand more of the necessity or benefit of tying infor users to SAs? They seem to be optional, but should they required? What's best practice?...etc.. My trials appear to show you do not need to have user setup with a SA make Authorized Apps and ION work.
Case 1 - Authorized Apps - External Calls
We have web applications calling Authorized Apps (AA) to submit data to ION ~ CSD. We initially Downloaded credentials of the AA by creating a SA and associating that SA with an infor user ( a person) However, our organization does not want SAs tied to infor users. So, I tested our process using the same AA client_id and secret paired with an SA that was not setup with an infor user. This also worked successfully. The SA didn't even have any oAuth2 scope. Is this viable or best practice? Security risks? As the credentials are downloaded for the SA and used in the web application, I believe this ok. I just don't understand the need for the infor user on the SA.
Case 2 - ION Desk Connection Points & Flows
Following that same logic of a SA not tied to infor user, I wanted to give that same type of setup of a SA account to a ION Desk Connection Point for its Authorization. When I attempted to import the SA file, it gave me error saying the user was invalid. Which is true as no user name is present in the file, it was zero length "" as the SA was not set with a user. I edited the file to provide "none" for the user name and reattempted the import for the Connection Point - Authorization. The import of the file worked and I could save the Connection Point with that SA. The Connection Point worked successfully within ION by processing the Document file it was configured for. Is this workaround something anyone has used? Again, what is does a user tied to a SA really do for security here?
Steve