서비스 계정은 애플리케이션에서 OAuth 2.0을 통해 프로그래매틱 방식으로 Google API에 액세스하는 데 사용할 수 있는 특수한 Google 계정입니다. 서비스 계정은 추가 승인이 필요 없는 OAuth 2.0 흐름을 사용합니다. 대신 내 애플리케이션만 액세스할 수 있는 키 파일을 사용합니다. 이 가이드에서는 서비스 계정으로 Manufacturer Center API에 액세스하는 방법을 설명합니다.
양식에 서비스 계정 ID를 입력하고 원하는 사용자 역할을 선택합니다. 하나 이상을 선택해야 하며 Accounts 서비스를 사용하려면 관리자 역할이 필요합니다.
이전에 서비스 계정 ID를 기록하지 않았다면 서비스 계정 관리 페이지로 이동하여 만든 프로젝트를 선택합니다.
저장 버튼을 클릭합니다. 사용자 목록으로 돌아가게 되며, 선택한 사용자 역할과 함께 서비스 계정 ID가 나열됩니다.
추가하려는 다른 모든 서비스 계정에 대해 위 과정을 반복합니다.
사용자 탭으로 이동하여 기존 서비스 계정 사용자를 확인합니다. 이메일 주소가 'gserviceaccount.com'으로 끝나는 사용자입니다.
이제 Google 애플리케이션 기본 사용자 인증 정보 흐름을 사용하거나 서비스 계정 흐름을 직접 사용하여 서비스 계정을 사용하여 Manufacturer Center 계정에 액세스할 수 있습니다. Manufacturer Center API 샘플은 지원되는 각 프로그래밍 언어로 서비스 계정 사용자 인증 정보 흐름을 사용하는 방법을 보여줍니다. 새 서비스 계정을 사용해 보고 자체 코드에서 서비스 계정을 사용하는 데 필요한 변경사항을 알아보려면 코드 샘플을 참조하세요.
자주 묻는 질문(FAQ)
내 서비스 계정으로 Manufacturer Center 웹 사용자 인터페이스에 로그인할 수 있나요?
아니요. 서비스 계정은 일반 Google 계정이 아니며 Manufacturer Center 웹 사용자 인터페이스에 액세스할 수 없습니다.
서비스 계정 액세스 토큰을 얼마나 자주 새로고침해야 하나요?
액세스 토큰은 Google OAuth 2.0 승인 서버에서 발급된 후 1시간 후에 만료됩니다. 액세스 토큰이 만료되면 애플리케이션은 클라이언트 라이브러리를 사용하여 다른 액세스 토큰을 가져와야 합니다.
[null,null,["최종 업데이트: 2025-08-31(UTC)"],[[["\u003cp\u003eService accounts enable applications to programmatically access the Manufacturer Center API using OAuth 2.0 without user intervention.\u003c/p\u003e\n"],["\u003cp\u003eTo use a service account, generate service account credentials in Google Cloud Console, enable the Manufacturer Center API, and download the JSON key file.\u003c/p\u003e\n"],["\u003cp\u003eAdd the service account as a user to your Manufacturer Center account with the appropriate role for API access.\u003c/p\u003e\n"],["\u003cp\u003eAccess your Manufacturer Center account programmatically using Google Application Default Credentials or the service account flow, referencing the provided samples.\u003c/p\u003e\n"],["\u003cp\u003eService accounts cannot be used to log into the Manufacturer Center web user interface but solely for API interaction.\u003c/p\u003e\n"]]],[],null,["# Using OAuth 2.0 service accounts with the Manufacturer Center API\n\nService accounts are special Google accounts that can be used by applications to\naccess Google APIs programmatically via OAuth 2.0. A service account uses an\nOAuth 2.0 flow that does not require additional authorization. Instead, it uses\na key file that only your application can access. This guide discusses how to\naccess the Manufacturer Center API with service accounts.\n| **Note:** Applications using service accounts for authentication can only access your own Manufacturer Center account. If you are writing a third-party application that needs access to your clients' Manufacturer Center accounts, see the [Authorizing Requests](/manufacturers/how-tos/authorizing) guide instead.\n\nPrerequisites\n-------------\n\n- A [Manufacturer Center](//manufacturers.google.com/) account.\n\nSteps to using a service account to access the Manufacturer Center API\n----------------------------------------------------------------------\n\n1. Generate service-account credentials or access the public credentials you've\n already generated. You will need to create an OAuth 2.0 Client ID and obtain\n a \\*.json private key file:\n\n 1. Go to the [Google API Console](https://console.cloud.google.com/apis/library).\n\n 2. Select a project in the drop-down menu at the top of the page. If you do\n not have one yet, create one by clicking **Create Project**.\n\n 3. If you have not already enabled the Manufacturer Center API for this\n project, then search for it in the list of Google APIs and enable it.\n\n 4. In the sidebar on the left, select **Credentials**.\n\n 5. To set up a service account, select **Create credentials** , and then\n **Service account key**.\n\n 1. On the next page, select **New service account** from the drop-down\n list.\n\n 2. Name the new service account. This\n also serves as the default username for the service account ID. Remember\n the service account ID for use later.\n\n | **Note:** The choice of role for the service account will not have any effect on what calls can be made to the Manufacturer Center API, as access to Manufacturer Center API methods is determined instead by the role associated with the service account ID in Manufacturer Center. If you are unsure what to pick, just pick Project►Viewer.\n\n 1. Select **JSON** for the key type, then click **Create**.\n\n 2. The **Create** button will change to **Creating...**, and once the key\n generation finishes, it will automatically download the private key as a\n \\*.json file.\n\n | **Important:** Protect the \\*.json key file that allows a service account to access the Google services for which it has been authorized. It is good practice to allow service accounts to only access one Google API each. This is a preventative measure to mitigate the amount of data an attacker can access in the situation that the service account's \\*.json key file is compromised.\n 1. You will be returned to the Credentials page, and you should see the new service account in the list of service account keys for your account.\n2. Add the new service account as a user to your Manufacturer Center account.\n If you are a third party developer, you will need to have your client do\n this step for you.\n\n 1. Go to your [Manufacturer Center account](//manufacturers.google.com/).\n\n 2. Go to the 'Users' list in the settings of your Manufacturer Center\n account.\n\n 3. Click the +User button, and use the service account ID as the email\n address for the new user.\n\n 4. Fill in the form with the [service account ID](#service-account-name),\n and select the desired user role(s). At least one must be chosen, and\n use of the `Accounts` service requires the Admin role.\n\n If you did not take note of the service account ID earlier, go to the\n [Service Accounts](https://console.developers.google.com/iam-admin/serviceaccounts/)\n administration page and select the project you created.\n\n 1. Click on the **Save** button. You will be returned to the list of users,\n and the service account ID should be listed with the chosen user role(s).\n\n 2. Repeat the process for all other service accounts you want to add.\n\n 3. View existing service account users by going to the Users tab. These\n will be users with an email address ending in 'gserviceaccount.com'.\n\n3. Now you can access your Manufacturer Center account using the service\n account either by using the [Google Application Default\n Credentials](/identity/protocols/application-default-credentials) flow or by\n using the [service account flow](/identity/protocols/OAuth2ServiceAccount)\n directly. The Manufacturer Center API [Samples](/manufacturers/libraries)\n show how to use both flows for service account credentials in each supported\n programming language. See the code samples to try out your new service\n account and to learn what changes you will need to use service accounts in\n your own code.\n\nFrequently asked questions\n--------------------------\n\n#### Can I log into the Manufacturer Center web user interface with my service account?\n\nNo, service accounts are not regular Google accounts and cannot access the\nManufacturer Center web user interface.\n\n#### How often do I need to refresh service account access tokens?\n\nAccess tokens expire one hour after they are issued by the Google OAuth 2.0\nAuthorization Server. When an access token expires, the application should use\nthe client library to fetch another access token."]]