For example, if you develop monitoring scripts that check for system health and have to store the user ID and password locally with the script, use an ID with the monitor role.
Develop some standard or signing scripts with private and public keys that actually check to ascertain that the script introduced is really authenticated.
If you develop PHP applications and publish them to an ISP, you may need to check with your ISP to verify that SOAP extensions will be enabled for you when they upgrade.