| User | Auth | Company | Requested | Status | Actions |
|---|
| User | Auth | Role | SKUs | Usage | Status | Actions |
|---|
| ID | Name | Description | Tools | Tier | Price |
|---|
| Name | Category | SKU | Source | Status | Updated | Actions |
|---|
| Title | Category | Submitted By | Date | Status | Actions |
|---|
| Title | Target Skill | Category | Author | Approved | Sync Status | Actions |
|---|
| Bundle ID | Title | Target Skill | Files | Rules | Submitted By | Date | Actions |
|---|
| Total Calls | Success Rate | Last Activity | Actions |
|---|
| Tool Name | Total Calls | Success Rate | Avg Time | Users | Actions |
|---|
| Timestamp | User | Tool | Status | Duration | Details |
|---|
| Status | App / Tenant | Cloud | Env | Duration | Initiated By | Started | Actions |
|---|---|---|---|---|---|---|---|
| Loading deployments... | |||||||
| App Name | Tenant | Env | Region | Friendly URL | Load Balancer | Resources | Status | Actions |
|---|
Scan AWS resources (ECR, ELB, Route53, EKS) and populate the database with discovered apps. Resources are matched by tags or naming patterns.
| Resource | Type | Tenant | Environment | Created | Days Left | Status | Actions |
|---|
Configure master cloud credentials used to provision tenant-specific IAM roles and Service Principals. All credentials are encrypted at rest.
These credentials are used to create tenant-specific IAM roles with resource-level isolation.
These credentials are used to create tenant-specific Service Principals with subscription-level access.
Tenants are automatically created during user enrollment based on email domain.
| Domain | AWS Role | Azure SP | Status | Created | Actions |
|---|
You are about to protect 0 resources. Protected resources will never expire automatically.
Embed Opsera credentials so user only needs one token for both MCP and Opsera APIs.
Embed Opsera credentials so user only needs one token for both MCP and Opsera APIs.
⚠️ Save this token now. It won't be shown again.