|
| 1 | +[[service-account-authorization]] |
| 2 | +== Service account authorization |
| 3 | + |
| 4 | +When you create a glossterm:mcp-server[] or glossterm:ai-agent[], Redpanda Cloud automatically creates a glossterm:service-account[] to glossterm:authentication[authenticate] requests to your glossterm:cluster[]. |
| 5 | + |
| 6 | +=== Default configuration |
| 7 | + |
| 8 | +The service account is created with: |
| 9 | + |
| 10 | +* *Name*: Pre-filled as `cluster-<cluster-id>-<resource-type>-<resource-name>-sa`, where `sa` stands for service account. For example: |
| 11 | +** MCP server: `cluster-d5tp5kntujt599ksadgg-mcp-my-test-server-sa` |
| 12 | +** AI agent: `cluster-d5tp5kntujt599ksadgg-agent-my-agent-sa` |
| 13 | ++ |
| 14 | +You can customize this name during creation. |
| 15 | + |
| 16 | +* *Role binding*: Cluster scope with Writer role for the cluster where you created the resource. This allows the resource to read and write data, manage glossterm:topic[,topics], and access cluster resources. |
| 17 | + |
| 18 | +=== Manage service accounts |
| 19 | + |
| 20 | +You can view and manage service accounts created for MCP servers and AI agents in *Organization* > *IAM* > *Service accounts*. |
| 21 | + |
| 22 | +The Organization IAM page shows additional details not visible during creation: |
| 23 | + |
| 24 | +[cols="1,2", options="header"] |
| 25 | +|=== |
| 26 | +|Field |Description |
| 27 | + |
| 28 | +|Client ID |
| 29 | +|Unique identifier for OAuth2 authentication |
| 30 | + |
| 31 | +|Description |
| 32 | +|Optional description of the service account |
| 33 | + |
| 34 | +|Created at |
| 35 | +|Timestamp when the service account was created |
| 36 | + |
| 37 | +|Updated at |
| 38 | +|Timestamp of the last modification |
| 39 | +|=== |
| 40 | + |
| 41 | +From this page you can: |
| 42 | + |
| 43 | +* Edit the service account name or description |
| 44 | +* View and manage role bindings |
| 45 | +* Rotate credentials |
| 46 | +* Delete the service account |
| 47 | + |
| 48 | +[NOTE] |
| 49 | +==== |
| 50 | +Deleting a service account removes authentication for the associated MCP server or AI agent. The resource can no longer access cluster data. |
| 51 | +==== |
| 52 | + |
| 53 | +=== Customize role bindings |
| 54 | + |
| 55 | +The default Writer role provides broad access suitable for most use cases. If you need more restrictive permissions: |
| 56 | + |
| 57 | +. Exit the cluster. Navigate to *Organization IAM * > *Service accounts*. |
| 58 | +. Find the service account for your resource. |
| 59 | +. Edit the role bindings to use a more restrictive role or scope. |
| 60 | + |
| 61 | +For more about roles and permissions, see xref:security:authorization/rbac/rbac.adoc[Role-based access control]. |
0 commit comments