1. Overview
  2. Procedures for create a service app in the staging developer portal
  3. Scopes
  4. Service account
  5. Create Service App JWT with Credentials
  6. Use the service app JWT in Spaces API requests

1 Overview

If you are creating an application that needs to perform user administration functions, an application that can create adhoc meeting rooms, or a bot application that can interact with other users, you can consider using the service type of application (service app).

The service app is designed for server-to-server communication. The service type of application utilizes the service account to access the Spaces API. The service account is a special user account under a company. It doesn’t allow login. It can be assigned with a Spaces license.

Only a Spaces user with company admin and developer permissions can create a new service app. Avaya Support personnel must create the service account domain for your company before you can create the service app.

The service app belongs to the company that is managed by the creator. It can only access the resources within this company. If your application needs to access multiple companies, you must create separate service apps for each company..

2 Procedures for create a service app in the staging developer portal

  • Sign up for Spaces staging services from https://loganstaging.esna.com/ with your work email and then create a password.
  • Login to https://onesnastaging.esna.com with your email and password. In the upper-right corner drop-down menu under your name, click Add Company. If your “User Settings” doesn’t have any “Current Employers”, then it’s recommended to create a company that matches to your email address domain. Enter the company name that you are working for. Enter the company domain name that matches to your work email domain. Note: If a co-worker already performed this step and created the company, ask them to either complete the remaining steps or invite you as a company admin.
    Link for instruction how to add company: Link for instruction.
  • Developer permission self-assignment for Spaces Staging environment can be done from User Settings. Permissions are assigned by checking a checkbox for a specific company. Checkboxes are located next to Developer permission label. Each checkbox corresponds to a company where your account is both admin and employee. Check a checkbox of a company that you want to get developer permissions for.
    Please note: Service applications are only available for companies, therefore "Freelance" permission will not give the access to create service applications.
  • Once the permission is assigned, reload the page and Manage company apps will be available.
  • Service account domain must be created. Go to Manage Companies and select your company. After selecting company go to Service accounts and click Create service domain button.
  • From the Manage company apps , create service apps. Remember to select a company for the service app.

3 Scopes

After a service app is created, you must configure the service app scope. You can select multiple scope options from the following list. Each scope corresponds to an API endpoint.

API EndpointsScopesPurpose
POST /users/bulkupdateaccounts.users.bulk.writeCreate, update, or delete users in bulk
POST /spaces/{spaceId}/chatsspaces.chat.createSend new chat messages into a space
GET /spaces/{spaceId}/messages/byrefspaces.chat.readRetrieve messages from the space where the service account is the admin or member
POST /spaces/invitespaces.createCreate a new space with service account as the owner
POST /spaces/invite with “X-Avaya-Act-As” headerspaces.create.actasCreate a new Space with another user as the owner
DELETE /spaces/{spaceId}spaces.deleteDelete the space where the service account is the admin
GET /spaces/direct/user/{userId}spaces.direct.createCreate a direct messaging space between the service account and another user
POST /spaces/{spaceId}/invitespaces.invite.writeInvite to the space where the service account is the admin
GET /users/me/spacesspaces.listList space where the service account is the admin
GET /spaces/{spaceId}spaces.settings.readGet the space's settings where the service account is the admin
POST /spaces/{spaceId}spaces.settings.writeUpdate the space's settings where the service account is the admin
Socket.IO connectionspaces.websocketConnect websocket to a space
GET /users/me/colleaguesusers.searchSearch for users within the company
POST /users/me/colleaguesbulkusers.search.bulkSearch for list of user emails within the company
GET /spaces/{spaceId}/ideasspaces.post.readRetrieve posts from the space which service account is the admin or member
POST /spaces/{spaceId}/ideasspaces.post.createCreate a new post into a space which service account is the admin or member
GET /spaces/{spaceId}/taskspaces.task.readRetrieve tasks from the space which service account is the admin or member
POST /spaces/{spaceId}/tasksspaces.task.createCreate a new task into a space which service account is the admin or member
POST /messages/{messageId}spaces.messages.writeUpdate the post and task in the space which service account is the admin or member

4 Service account

A new service account is automatically created for each new service application. If the service account is disabled by the company admin, the associated service application cannot access the Spaces API anymore.

If your service application needs to create new spaces for meeting, you should assign a Spaces Power or Business license to the service account so that the created spaces can support the meeting features that come with the license bundle.

5 Create Service App JWT with Credentials

To create the service app JWT, use the following procedure:

  1. Activate the service app.
  2. Add a new public/private key pair under the Credentials tab.
  3. Click on the Download Key button.
    • Note: The downloaded file service-key-f14f61d7f84347880427.json contains the private key information needed to create the JWT. After using it in your code, delete the file as soon as possible. You can download it again or generate a new one if needed. For your protection, treat the file as a password and do not share it.
  4. Create the JWT using the data from the downloaded json file and sign it using the private key included in the file.

The following is an example of the downloaded service-key-f14f61d7f84347880427.json file:

  "iss": "66862e5f427b7cf325db", 
  "sub": "66862e5f427b7cf325db@psrsu9.servicesapps.spaces.avayacloud.com", 
  "kid": "f14f61d7f84347880427", 
  "private_key": "-----BEGIN RSA PRIVATE KEY-----

The following is an example of the service app JWT, which you can create based on the downloaded JSON:


  "typ": "JWT",
  "alg": "RS256",
  "kid": "f14f61d7f84347880427"


"iss": " 66862e5f427b7cf325db",
"sub": " 66862e5f427b7cf325db@psrsu9.servicesapps.spaces.avayacloud.com",
"aud": "spaces.avayacloud.com",
"exp": 2631806787

The exp is the JWT expiry time. The maximum exp time you can set is 3600 seconds for security reasons. The JWT token will be rejected by Spaces server if the exp time is greater than 3600 seconds. The exp time should be in the Unix timestamp format. For testing, you can manually generate the exp time value using online tools such as https://www.unixtimestamp.com/.

After creating the exp value, you can sign the JWT with the private key included in the downloaded JSON file. For testing, you can use online tools such as https://dinochiesa.github.io/jwt/ to generate and sign the JWT token.

6 Use the service app JWT in Spaces API requests

The service app JWT is used in the Authorization header of the REST request. For example, To create a new space, you can call POST /spaces/invite with Authorization header as service_app [JWT]:

Request URL:

For Production: POST https://spacesapis.avayacloud.com/api/spaces/invite
For Staging: POST https://loganstagingapis.esna.com/api/spaces/invite


Authorization: "service_app eyJ0eXAiOiJ1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImYxNDk0Yzc22FkODA0YjFjMGFkZTc1NyIsInN1YiI6IjA2MzNjYWQ4MDRiMWMwYWRlNzU3QGt4amE1by5zZXJ2aWNlc2FwcHMuc3BhY2VzLmF2YXlhY2xvdWQuY29tIiwiYXVkIjoic3BhY2VzLmF2YXlhY2xvdWQuY29tIiwiZXhwIjoxNjMxNzE1NTkwfQ.yEaVQ_WptwBQGqBPZN8OzP4sZC_QKgcmgPhOvZjYeRJfErXMpVpoNN9XrRsGzNCKw0Wxkd6y8jerlzPO4aY3SQL2Q0zvz2LvsOznatOULbPoRWwoABxfmJxPBGtvlSfU1hfbUjoGx8FafpShMptTeTsfh8k3Y2rqIRI3arAkjxfh3OP-PoZsuOdPswFLTZQ9jXR3w3ZeiE2xi5zlIkEziAMjTTYdldwCAvAP4JmdU_DOW2ICJlMcPL_gbjUj4Be-95CQbpQSgW1BIWs5_YPse5RupUbQ"