How to create an HaloPSA API User
Connect your HaloPSA Instance to Propel Your MSP
To connect your HaloPSA instance to Propel Your MSP, you will need the following information:
Your instance's domain name (typically something like yourcompany.halopsa.com)
- The API's Client ID and Client Secret (see below)

It's a best practice to specify only the minimum security rights required by any third party provider
1- Creating an API-only Agent
- Login to your HaloPSA account
- Navigate to Configuration>Teams & Agents>Agents and click "New"
- Fill in the following information:
- Username = Propel Your MSP
- Active = checked
- Is an API-only Agent = checked
- First Name = Propel
- Last Name = Your MSP
- Initials = PYM
- Can approve Purchase Orders = unchecked
- Can approve Invoices = unchecked
- Go to "Permissions" tab and set the permissions as shown below:
- Feature Access
- Tickets Access Level: Read and Modify
- Customers Access Level: Read Only
- Assets Access Level: Read and Modify
- Calendars and Appointments Access Level
- Sales Access Level: Read and Modify
- Invoices Access Level: Read Only
- Customer Agreements Access Level: Read Only
- Tickets Permissions
- Can add new Tickets: Yes
- Can view Unassigned Tickets: Yes
- Can view Tickets that are assigned to other Agents: Yes
- Asset Type Restrictions
- Allow use of all Asset Types: Yes
- Calendars and Appointments Permissions
- Adding New Appointments: Can Add All Appointments
- Visibility of Appointments: Can View All Appointments
2- Creating Your API Key
You need to generate HaloPSA API keys so that Propel Your MSP can sync data with your PSA.

Be sure to make a copy of both the Client ID and Client Secret because the Client Secret will only be displayed once.
- Login to your HaloPSA account
- Navigate to Configuration > Integrations > HaloPSA API > Applications and click "New"
- Fill in the following information:
- Application Name = Propel Your MSP
- Active = checked
- Authentication Method = Client ID and Secret (Services)
- Copy the Client ID and Client Secret in a secure location
- Login Type = Agent
- Agent to log in as = "Propel Your MSP"
- Go to "Permissions" tab and set the permissions as shown below
- all:teams
- edit:tickets
- edit:calendar
- read:customers
- read:contracts
- read:items
- edit:sales
- read:invoices
- read:assets
- edit:assets
- Save your changes
Related Articles
How to create an Autotask API User?
Connect your Autotask PSA Instance to Propel Your MSP To connect your Autotask PSA instance to Propel Your MSP, you will need the following setup: Setup a security role for the "Propel Your MSP" user Create an API User (Key & Secret) Security Role We ...
How to create a ConnectWise Manage API Member Key?
Connect your ConnectWise Manage Instance to Propel Your MSP To connect your ConnectWise Manage instance to Propel Your MSP, you will need the following information: Your instance's domain name (typically connect.yourcompany.com) The Company ID ...
Changelog - Release notes
Propel Your MSP is updated frequently. When updates are deployed, a new entry is added to this changelog here. You can subscribe to the RSS feed to receive using your preferred RSS reader to receive notifications: ...
ConnectWise Manage Integration error "You do not have security permission to perform this action."
Are you are seeing this error about your ConnectWise Manage integration when signing in to Propel Your MSP? The reason is because in ConnectWise Manage v2020.4, a new "Table Setup" security permission, introduced in v2020.3 has started throwing the ...
FAQ - Asset Mapping - Autotask PSA specifics
If you have not yet read PSA to Propel Your MSP Asset Mapping, please do so now Autotask PSA Considerations Autotask PSA has both a Configuration Item Category and a Configuration Item Type. Propel uses the Configuration Item Type when configuring ...