All
Suodatusperuste:
Miten voin tallettaa käteistä tililleni?
Tarvitsen apua tilin vahvistamisessa
Miksi en pääse tililleni?
Peritäänkö kryptovaluutan nostoista palvelumaksuja?
Tarvitsen apua tililleni kirjautumisessa
A Service User is an API-only operator created within your Organization for programmatic access. Service Users authenticate with API key credentials and are designed for automated integrations, such as trading bots, treasury management scripts, or internal tooling that needs to interact with your Organization's accounts.
Service Users do not represent individual people. They do not sign in to the UI, and they do not require individual KYC.
Jäsen | Service User | |
|---|---|---|
Authentication | Individual credentials with 2FA | API key credentials |
UI login | Kyllä | Ei |
KYC required | Kyllä | Ei |
Can initiate requests | Kyllä | Yes (via API) |
Can approve requests | Yes, except their own requests | Ei |
Can execute immediately | Yes, when policy allows | Ei |
Administrative access | Yes, if granted | Ei |
Available workflows | Manage Access, Manage Policies, Manage Addresses, Initiate Withdrawal | Withdrawals via API (constrained by API key scopes) |
Authorization model | Organization workflow permissions (View, Initiate, Approve, Execute) | API key permissions |
A Service User's capabilities are defined by its API key permissions. Depending on the scopes granted to the key, a Service User can:
Only withdrawal operations are subject to Organization policies. All other API key operations — trading, Earn, queries, data exports — are immediate.
Important: When an Organization policy governs the Initiate Withdrawal workflow, Service Users can only initiate requests, not complete them. All other API key operations (trading, Earn, queries) execute immediately. Service Users have no administrative access and cannot approve requests.
Service Users are authorized through API key permissions, not Organization workflow permissions (View, Initiate, Approve, Execute). Each API key is configured with a set of scopes that define what the Service User can access.
Permission | What it allows |
|---|---|
Kysely | View balances and funding status |
Ansaitse | Allocate and deallocate Earn (staking and yield) products |
Talleta | Generate deposit addresses and view deposit history |
Lunasta | Submit withdrawal requests — if an Organization policy governs this workflow, the request requires Member approval (see Policy interaction) |
Permission | What it allows |
|---|---|
Avoimiin toimeksiantoihin ja kauppoihin kohdistuva kysely | View currently open orders and active trades |
Suljettuihin toimeksiantoihin ja kauppoihin kohdistuva kysely | View historical orders and completed trades |
Luo ja muokkaa toimeksiantoja | Place new orders and modify existing ones |
Peruuta ja sulje toimeksiantoja | Cancel open orders and close positions |
Permission | What it allows |
|---|---|
Kirjanpitomerkintöihin kohdistuva kysely | View transaction and ledger history |
Vie tiedot | Export account data for reporting and reconciliation |
Each API key also supports the following settings:
Setting | Kuvaus |
|---|---|
API-avaimen vanhentuminen | Optional expiration date after which the key is automatically disabled |
Kyselyn aloituspäivämäärä | Restrict data queries to entries after this date |
Kyselyn päättymispäivämäärä | Restrict data queries to entries before this date |
Salli WebSocket-yhteydet | Enable or disable real-time streaming via WebSocket |
Mukautettu nonce-ikkuna | Configure a custom nonce window for replay protection |
Rajoita IP-osoitteita tai -alueita | Limit key usage to specific IP addresses or CIDR ranges |
API key permissions define what a Service User can access, but Organization policies override API key capabilities for withdrawal operations.
When a policy is configured for the Initiate Withdrawal workflow:
All other API key operations — placing and canceling orders, Earn allocations, queries, data exports — are immediate. They are not subject to Organization policies and do not require approval.
If no policy is configured for a workflow, the API key's permissions apply directly for that operation as well.
If the Manage Access policy requires approval, your request enters the approval queue. Once approved (or immediately completed via Execute), the Service User is created and its API key credentials are generated.
Caution: API key credentials are shown only once at creation time. Copy and store them securely. You cannot retrieve the secret after leaving the creation screen.
To change a Service User's permissions or remove it entirely, go to Manage Access, select the Service User, and submit the change. The same governance rules apply — if Manage Access requires approval, the change enters the approval queue.
See Permissions and workflows for the full list of Manage Access operations.