Multi-account Management
Understand how resources are isolated by account today and what to expect from upcoming RBAC enhancements.
Success
When to use this guide: You manage multiple tenants or environments and need to enforce isolation while planning for future RBAC.
Who benefits: Platform administrators, PMs handling customer onboarding, and compliance teams auditing access.
Current Behavior
When to use: Review how isolation works today before making architectural decisions.
Account scope
Every agent, tool, MCP, and schedule is associated with a single account ID.
API keys
A regular API key only sees and manages resources for its account.
Master key
Platform operators can list or modify any account using the master key.
Soft delete
Deleting a resource keeps it within the originating account.
Auditing
Run history endpoints respect account scope; master key can audit across accounts.
Working Across Accounts
When to use: Share resources safely or perform admin tasks between tenants.
Standard usage: one API key per tenant environment (development, staging, production) keeps resources separated automatically.
Promoting configurations: export from one account and import into another using the Configuration management guide.
Operations access: master key holders can create, list, or revoke accounts and keys via internal integrations. REST documentation is reference-only: REST API reference.
Common isolation issues
Resources appear across accounts unexpectedly
API key uses master scope.
Issue account-scoped keys and rotate credentials that should not have master permissions.
CLI refuses cross-account updates
Selected account differs from resource owner.
Switch API keys or use dedicated service accounts per tenant.
Audit trail incomplete
Manual updates performed via master key without logging.
Run exports before/after changes and store them centrally.
Preparing for RBAC
When to use: Plan migrations or communicate timelines to stakeholders.
Future releases introduce roles (Creator, Runner, Viewer) and delegated API keys with scoped permissions. Plan ahead by:
Tracking which teams need read vs. write access.
Storing owner metadata on agents/tools (
metadatafields) to ease migration.Auditing automation scripts to ensure they use least-privilege keys once available.
Operational Tips
When to use: Keep daily account management predictable and auditable.
Rotate account keys regularly and revoke unused keys promptly.
Keep a secure record of master key usage; restrict it to platform operators.
When troubleshooting cross-account issues, verify that the API key matches the expected tenant before escalating.
Related Documentation
Security & privacy — key hygiene and PII controls.
Configuration management — promote resources between accounts safely.
REST API reference — account endpoints and master-key operations.
Last updated
Was this helpful?