Service accounts API

  • Tier: Premium, Ultimate
  • Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated

Use this API to interact with service accounts.

You can also interact with service accounts through the users API.

Instance service accounts

  • Offering: GitLab Self-Managed, GitLab Dedicated

Instance service accounts are available to an entire GitLab instance, but must still be added to groups and projects like a human user.

To manage personal access tokens for instance service accounts, use the personal access tokens API.

Prerequisites:

  • You must have administrator access to the instance.

List all instance service accounts

Lists all instance service accounts.

Use the page and per_page pagination parameters to filter the results.

GET /service_accounts

Supported attributes:

AttributeTypeRequiredDescription
order_bystringnoAttribute to order results by. Possible values: id or username. Default value: id.
sortstringnoDirection to sort results by. Possible values: desc or asc. Default value: desc.

Example request:

curl --request GET --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/service_accounts"

Example response:

[
  {
    "id": 114,
    "username": "service_account_33",
    "name": "Service account user"
  },
  {
    "id": 137,
    "username": "service_account_34",
    "name": "john doe"
  }
]

Create an instance service account

Creates an instance service account.

POST /service_accounts
POST /service_accounts?email=custom_email@gitlab.example.com

Supported attributes:

AttributeTypeRequiredDescription
namestringnoName of the user. If not set, uses Service account user.
usernamestringnoUsername of the user account. If undefined, generates a name prepended with service_account_.
emailstringnoEmail of the user account. If undefined, generates a no-reply email address. Custom email addresses require confirmation, unless the email confirmation settings are turned off.

Example request:

curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/service_accounts"

Example response:

{
  "id": 57,
  "username": "service_account_6018816a18e515214e0c34c2b33523fc",
  "name": "Service account user",
  "email": "service_account_6018816a18e515214e0c34c2b33523fc@noreply.gitlab.example.com"
}

If the email address defined by the email attribute is already in use by another user, returns a 400 Bad request error.

Update an instance service account

Updates a specified instance service account.

PATCH /service_accounts/:id

Parameters:

AttributeTypeRequiredDescription
idintegeryesID of the service account.
namestringnoName of the user.
usernamestringnoUsername of the user account.
emailstringnoEmail of the user account. Custom email addresses require confirmation, unless the email confirmation settings are turned off.

Example request:

curl --request PATCH --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/service_accounts/57" --data "name=Updated Service Account email=updated_email@example.com"

Example response:

{
  "id": 57,
  "username": "service_account_6018816a18e515214e0c34c2b33523fc",
  "name": "Updated Service Account",
  "email": "service_account_<random_hash>@noreply.gitlab.example.com",
  "unconfirmed_email": "custom_email@example.com"
}

Group service accounts

Group service accounts are owned by a specific top-level group and can inherit membership to subgroups and projects like a human user.

Prerequisites:

  • On GitLab.com, you must have the Owner role for the group.
  • On GitLab Self-Managed or GitLab Dedicated you must either:

List all group service accounts

Lists all service accounts in a specified top-level group.

Use the page and per_page pagination parameters to filter the results.

GET /groups/:id/service_accounts

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesThe ID or URL-encoded path of the target group.
order_bystringnoOrders list of users by username or id. Default is id.
sortstringnoSpecifies sorting by asc or desc. Default is desc.

Example request:

curl --request GET --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/345/service_accounts"

Example response:

[

  {
    "id": 57,
    "username": "service_account_group_345_<random_hash>",
    "name": "Service account user",
    "email": "service_account_group_345_<random_hash>@noreply.gitlab.example.com"
  },
  {
    "id": 58,
    "username": "service_account_group_346_<random_hash>",
    "name": "Service account user",
    "email": "service_account_group_346_<random_hash>@noreply.gitlab.example.com",
    "unconfirmed_email": "custom_email@example.com"
  }
]

Create a group service account

Creates a service account in a specified top-level group.

This endpoint only works on top-level groups.

POST /groups/:id/service_accounts

Supported attributes:

AttributeTypeRequiredDescription
idinteger or stringyesID or URL-encoded path of a top-level group.
namestringnoUser account name. If not specified, uses Service account user.
usernamestringnoUser account username. If not specified, generates a name prepended with service_account_group_.
emailstringnoEmail of the user account. If not specified, generates an email prepended with service_account_group_. Custom email addresses require confirmation, unless the group has a matching verified domain or email confirmation settings are turned off.

Example request:

curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/345/service_accounts" --data "email=custom_email@example.com"

Example response:

{
  "id": 57,
  "username": "service_account_group_345_6018816a18e515214e0c34c2b33523fc",
  "name": "Service account user",
  "email": "custom_email@example.com"
}

Update a group service account

Updates a service account in a specified top-level group.

This endpoint only works on top-level groups.

PATCH /groups/:id/service_accounts/:user_id

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesThe ID or URL-encoded path of the target group.
user_idintegeryesThe ID of the service account.
namestringnoName of the user.
usernamestringnoUsername of the user.
emailstringnoEmail of the user account. Custom email addresses require confirmation, unless the group has a matching verified domain or email confirmation settings are turned off.

Example request:

curl --request PATCH --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/345/service_accounts/57" --data "name=Updated Service Account email=updated_email@example.com"

Example response:

{
  "id": 57,
  "username": "service_account_group_345_6018816a18e515214e0c34c2b33523fc",
  "name": "Updated Service Account",
  "email": "service_account_group_345_<random_hash>@noreply.gitlab.example.com",
  "unconfirmed_email": "custom_email@example.com"
}

Delete a group service account

Deletes a service account from a specified top-level group.

This endpoint only works on top-level groups.

DELETE /groups/:id/service_accounts/:user_id

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesThe ID or URL-encoded path of the target group.
user_idintegeryesThe ID of a service account.
hard_deletebooleannoIf true, contributions that would usually be moved to a Ghost User are instead deleted, as well as groups owned solely by this service account.

Example request:

curl --request DELETE --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/345/service_accounts/181"

List all personal access tokens for a group service account

Lists all personal access tokens for a service account in a top-level group.

GET /groups/:id/service_accounts/:user_id/personal_access_tokens

Supported attributes:

AttributeTypeRequiredDescription
idinteger or stringyesID or URL-encoded path of a top-level group.
user_idintegeryesID of service account.
created_afterdatetime (ISO 8601)noIf defined, returns tokens created after the specified time.
created_beforedatetime (ISO 8601)noIf defined, returns tokens created before the specified time.
expires_afterdate (ISO 8601)noIf defined, returns tokens that expire after the specified time.
expires_beforedate (ISO 8601)noIf defined, returns tokens that expire before the specified time.
last_used_afterdatetime (ISO 8601)noIf defined, returns tokens last used after the specified time.
last_used_beforedatetime (ISO 8601)noIf defined, returns tokens last used before the specified time.
revokedbooleannoIf true, only returns revoked tokens.
searchstringnoIf defined, returns tokens that include the specified value in the name.
sortstringnoIf defined, sorts the results by the specified value. Possible values: created_asc, created_desc, expires_asc, expires_desc, last_used_asc, last_used_desc, name_asc, name_desc.
statestringnoIf defined, returns tokens with the specified state. Possible values: active and inactive.

Example request:

curl --request GET \
  --header "PRIVATE-TOKEN: <your_access_token>" \
  --url "https://gitlab.example.com/api/v4/groups/187/service_accounts/195/personal_access_tokens?sort=id_desc&search=token2b&created_before=2025-03-27"

Example response:

[
    {
        "id": 187,
        "name": "service_accounts_token2b",
        "revoked": false,
        "created_at": "2025-03-26T14:42:51.084Z",
        "description": null,
        "scopes": [
            "api"
        ],
        "user_id": 195,
        "last_used_at": null,
        "active": true,
        "expires_at": null
    }
]

Example of unsuccessful responses:

  • 401: Unauthorized
  • 404 Group Not Found

Create a personal access token for a group service account

Creates a personal access token for an existing service account in a specified top-level group.

POST /groups/:id/service_accounts/:user_id/personal_access_tokens

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesID or URL-encoded path of a top-level group.
user_idintegeryesID of service account.
namestringyesName of personal access token.
descriptionstringnoDescription of personal access token.
scopesarrayyesArray of approved scopes. For a list of possible values, see Personal access token scopes.
expires_atdatenoExpiration date of the access token in ISO format (YYYY-MM-DD). If not specified, the date is set to the maximum allowable lifetime limit.

Example request:

curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/35/service_accounts/71/personal_access_tokens" --data "scopes[]=api,read_user,read_repository" --data "name=service_accounts_token"

Example response:

{
  "id":6,
  "name":"service_accounts_token",
  "revoked":false,
  "created_at":"2023-06-13T07:47:13.900Z",
  "scopes":["api"],
  "user_id":71,
  "last_used_at":null,
  "active":true,
  "expires_at":"2024-06-12",
  "token":"<token_value>"
}

Revoke a personal access token for a group service account

Revokes a personal access token for an existing service account in a specified top-level group.

This endpoint only works on top-level groups.

DELETE /groups/:id/service_accounts/:user_id/personal_access_tokens/:token_id

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesThe ID or URL-encoded path of the target group.
user_idintegeryesThe ID of the service account.
token_idintegeryesThe ID of the token.

Example request:

curl --request DELETE --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/35/service_accounts/71/personal_access_tokens/6"

If successful, returns 204: No Content.

Other possible responses:

  • 400: Bad Request if not revoked successfully.
  • 401: Unauthorized if the request is not authorized.
  • 403: Forbidden if the request is not allowed.
  • 404: Not Found if the access token does not exist.

Rotate a personal access token for a group service account

Rotates a personal access token for an existing service account in a specified top-level group. This creates a new token valid for one week and revokes any existing tokens.

This endpoint only works on top-level groups.

POST /groups/:id/service_accounts/:user_id/personal_access_tokens/:token_id/rotate

Parameters:

AttributeTypeRequiredDescription
idinteger or stringyesThe ID or URL-encoded path of the target group.
user_idintegeryesThe ID of the service account.
token_idintegeryesThe ID of the token.
expires_atdatenoExpiration date of the access token in ISO format (YYYY-MM-DD). Introduced in GitLab 17.9. If the token requires an expiration date, defaults to one week. If not required, defaults to the maximum allowable lifetime limit.

Example request:

curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/35/service_accounts/71/personal_access_tokens/6/rotate"

Example response:

{
  "id":7,
  "name":"service_accounts_token",
  "revoked":false,
  "created_at":"2023-06-13T07:54:49.962Z",
  "scopes":["api"],
  "user_id":71,
  "last_used_at":null,
  "active":true,
  "expires_at":"2023-06-20",
  "token":"<token_value>"
}