Manage your API access and monitor usage
Your request is being reviewed
We'll notify you once your access has been approved. This typically takes 1-2 business days.Add this to your MCP client settings file:
Claude Code: ~/.claude/settings.json
Cursor: ~/.cursor/mcp.json
See full documentation for more details.
Your request was not approved
Please contact support@opsera.io for more information.Your MCP token provides unified access to these connected platforms. No additional authentication required.
Not connected
Last Verified: -
â Opsera Pipeline API access enabled via your MCP token
Not connected
â GitHub Actions integration enabled via your MCP token
Permanent tenant-based IAM credentials
Shared Tenant Credentials
These are permanent credentials shared by all users in your organization.
Resources created with these credentials are scoped to your tenant using IAM role: -
AWS credentials not configured for your tenant
Contact your administrator to set up tenant cloud access
Tenant Service Principal
This Service Principal is restricted to your tenant resources only.
Use these credentials with Azure CLI or SDKs.
Contact your administrator to add or update platform integrations.
Update tenant IAM roles with the latest security policies
Current Policy Version: 2.0.0
Last Updated: 2026-01-23 - Fixed tenant resource isolation vulnerability
âĸ Enforced resource naming conventions (tenant-id prefix)
âĸ Added explicit Deny rules for cross-tenant access
âĸ Properly isolated S3 buckets, EKS clusters, and ECR repositories
Important Security Note
AWS tokens are valid for 12 hours. Access is controlled by IAM policy, not token expiration.
Users should regenerate tokens after policy updates for immediate effect of new policy.
Read-Only Discovery:
Write Operations (Tenant-Restricted):
Explicit Deny Rules: