The Infor OS Platform is accessed and modified by multiple independent entities—Infor Services teams, customer IT staff, and external contractors—making strong credential management and authorization controls essential. Each party may use different identity providers and privilege models, requiring consistent enforcement across heterogeneous authentication sources.
Additionally, third‑party systems frequently integrate with Infor applications using their own authentication mechanisms (e.g., OAuth2 clients, service accounts, API tokens). In these scenarios, identity propagation and action traceability are critical to determine which actor or system performed an operation, under what authority, and with what level of access.
However The current process for Authorized apps allows IONAPI-Administrators and other Administrator to download Service account credentials on behalf of other users. Moreover, the Users MAY NOT be informed that such Service Account is created on their behalf.
I believe this was originally meant for Administrator to create Service Account on behalf of a Service User which is NOT meant to be an actual user as its used to connect to other systems such as Git and other applications. However the current paradigm allows Administrator to impersonate any other User. Infor OS will be taking steps to ensure that when such credentials are created they will be notified.
However I dont think this should be possible AT ALL even by an Administrator. Specially in the case of AI these credentials can be abused without knowledge of Either Administrator or the users on behalf of whom the credentials have been created.
Note that service accounts are LONG TERM credentials and NOT tokens. As a User of Infor OS I am not comfortable with working with a system where an Administrator CAN create LONG TERM credentials on my behalf and hand it over to anyone. Moreover since different Clients APIs can work with API suites, IONAPI-Administrator role may not be protected and that allows different parties to create credentials on behalf of other entities.