Service Accounts
Service accounts allow your application to access the Banking API programmatically. Each service account has:- Access ID - Unique identifier (UUID)
- Public Key - For signature verification
- Permissions - Granular access control
- Allowed IPs - List of authorized IPs
Creating a Service Account
1. Access the Dashboard
Navigate to Settings → API Credentials in the Conta Digital dashboard.2. Click “New Credential”
Fill in the fields:| Field | Description |
|---|---|
| Description | Name to identify the credential (e.g., “Production Backend”) |
| Public Key | Your Ed25519 key in ssh-ed25519 ... format |
| Permissions | Select the required permissions |
| Allowed IPs | List of authorized IPs or CIDRs (optional, default: 0.0.0.0/0, ::/0) |
3. Save the Access ID
After creation, you’ll receive an Access ID (UUID). This is the value for thex-access-id header in requests.
Available Permissions
| Permission | Description | Endpoints |
|---|---|---|
view_balance | View balance | GET /v1/balance |
view_account_details | View account details | GET /v1/account, GET /v1/account-limits |
view_transactions | View transactions | GET /v1/transactions, GET /v1/transactions/{id} |
list_dict_keys | List PIX keys | GET /v1/dict-keys |
initiate_payment | Create transfers | POST /v1/transfers |
cancel_scheduled_payments | Cancel payments | Scheduled payments |
refund_transaction | Refund transactions | Refunds |
Apply the principle of least privilege. Grant only the permissions your application needs.
Allowed IPs
Configure a list of authorized IPs for added security. Accepted formats:0.0.0.0/0 and ::/0).
Managing Service Accounts
List Accounts
In the dashboard, view all active service accounts with:- Description
- Access ID (partially hidden)
- Permissions
- Allowed IPs
Delete Account
To revoke access, delete the service account. Deletion is immediate and permanent.Complete Flow
1
Generate Keys
Create an Ed25519 keypair using
ssh-keygen or another method.
See instructions →2
Create Service Account
In the dashboard, register the public key and configure permissions.
3
Store Credentials
Save the Access ID and private key securely (environment variables, secret manager).
4
Make Requests
Use the private key to sign requests.
See authentication →
Best Practices
Rotate Regularly
Create new credentials periodically and revoke old ones.
Separate Environments
Use different service accounts for dev, staging, and production.
Minimal Permissions
Grant only the strictly necessary permissions.
Restrict IPs
Configure allowed IPs for your production servers.
