I have some questions about what appear to be service/impersonation accounts in my fresh HighQ instance. I have attached screenshots of the accounts in question, as well as a system created org group, which some of them are in. My question is what is the purpose of these accounts? It seems they are for api functionality with different modules in highq, some are self explanatory, such as the AI hub and document automation, however, others less so, like the matter management and project budget and planning accounts. Any insight anyone has on this would be great.
Related to this is the group I mentioned that has some of these accounts as members. If they all work in the same way, but just for different functions/modules, why aren't they all members of the group?
The last question is somewhat unrelated but is ultimately the reason I am asking questions about these service accounts. When others were set up with their instances, did they have a separate user type called HighQ users, and also about 20 different users who had access to the instance, as well as 5 who had System Admin rights? Indeed, one of these users appeared to be some kind of super admin/root level rights, who if I hadn't inactivated and archived all of these accounts, would ostensibly have been able to lock me out of the account entirely. From what I can tell, these accounts comprised essentially the entire US and UK support teams and some engineers possibly. One of the five system admin accounts was a support person who I spoke with on a support ticket. As I said, none of these users have access to the system anymore, as I couldn't really put any client data in there with such broad access to scores of people I don't know and have nothing to do with my firm, but this would seem like the opposite of what is described in the security documentation re: highq staff access. Did anyone else have this experience?



