userMulti Account Management Guide

Understand how resources are isolated by account today and what to expect from upcoming RBAC enhancements.

circle-check

Current Behavior

When to use: Review how isolation works today before making architectural decisions.

Topic
Details

Account scope

Every agent, tool, MCP, and schedule is associated with a single account ID.

API keys

A regular API key only sees and manages resources for its account.

Master key

Platform operators can list or modify any account using the master key.

Soft delete

Deleting a resource keeps it within the originating account.

Auditing

Run history endpoints respect account scope; master key can audit across accounts.

Working Across Accounts

When to use: Share resources safely or perform admin tasks between tenants.

  • Standard usage: one API key per tenant environment (development, staging, production) keeps resources separated automatically.

  • Promoting configurations: export from one account and import into another using the Configuration management guidearrow-up-right.

  • Operations access: master key holders can create, list, or revoke accounts and keys via the REST API.

curl examples
# Create an account (public endpoint)
curl \
  -X POST "$AIP_API_URL/accounts" -d '{"name": "customer-acme"}' -H \
  "Content-Type: application/json"

# List accounts (master key only)
curl -sL "$AIP_API_URL/accounts" -H "X-API-Key: $MASTER_KEY"

Common isolation issues

Symptom
Likely cause
Fix

Resources appear across accounts unexpectedly

API key uses master scope.

Issue account-scoped keys and rotate credentials that should not have master permissions.

CLI refuses cross-account updates

Selected account differs from resource owner.

Switch API keys or use dedicated service accounts per tenant.

Audit trail incomplete

Manual updates performed via master key without logging.

Run exports before/after changes and store them centrally.

Preparing for RBAC

When to use: Plan migrations or communicate timelines to stakeholders.

Future releases introduce roles (Creator, Runner, Viewer) and delegated API keys with scoped permissions. Plan ahead by:

1

Track team access needs

Identify which teams require read vs. write access.

2

Store owner metadata

Store owner metadata on agents/tools (metadata fields) to ease migration.

3

Audit automation scripts

Audit automation scripts to ensure they use least-privilege keys once available.

Operational Tips

When to use: Keep daily account management predictable and auditable.

  • Rotate account keys regularly and revoke unused keys promptly.

  • Keep a secure record of master key usage; restrict it to platform operators.

  • When troubleshooting cross-account issues, verify that the API key matches the expected tenant before escalating.

Last updated