Team administration
Tenant admins can invite users, assign role bindings, manage customer-scoped access, reset MFA, and review session history from the portal.
MSPlex is more than connector coverage. The platform gives MSP operators tenant-scoped administration, customer-bound access control, shown-once machine credentials, audited secret handling, approval-gated risky actions, and connector exposure that only happens after readiness checks pass.
This page focuses on the controls that shape real operator trust: who can act, how machine identities work, where secrets live, how approvals gate risky execution, and when connector tools are actually exposed to the gateway.
Tenant admins can invite users, assign role bindings, manage customer-scoped access, reset MFA, and review session history from the portal.
Service accounts and API credentials are created in the tenant boundary, shown once, rotatable, revocable, and exchanged for short-lived runtime tokens.
Tool visibility and execution both clear identity, context, entitlement, connector-readiness, quota, policy, and approval gates before dispatch.
MSPlex v1 uses a fixed baseline role catalog with tenant-wide and customer-scoped role bindings. That means predictable access control for your team without pretending there is already a custom permission-matrix builder behind the scenes.
Full tenant settings, billing visibility, audit access, identity management, customer management, and API credential administration.
Connector, customer, user, service-account, and audit-management surfaces without owner-only tenant settings.
Billing and subscription visibility without connector, identity, or tenant-settings administration rights.
Dashboard, catalog, connection and status views, connector setup, and notification surfaces for daily operations.
Read-only dashboard, catalog, connection-status, audit, analytics, and notification visibility with no mutating admin actions.
Customer-scoped roles limit access to the assigned customer set for sub-user management, usage, connector views, and audit visibility.
In v1, non-human automation runs through service accounts. Those identities stay tenant-scoped, can be narrowed to one or more customers, and exchange their shown-once secret for short-lived runtime tokens rather than holding long-lived access tokens.
Human and operator access tokens are limited to 15 minutes maximum. Service-account access tokens are limited to 60 minutes maximum, with a default target of 15 minutes.
Creating or rotating a service account, changing roles, disabling principals, or altering tenant security state requires recent MFA within the last 15 minutes.
After disablement or secret rotation, no new tokens may be minted and existing access tokens must stop being accepted within five minutes maximum.
The portal collects credentials once, the backend stores them encrypted, the UI never reveals them again, and runtime workers resolve them just in time through a secrets broker instead of carrying raw secrets through general dispatch payloads.
Vendor credentials stay encrypted at rest until the gateway needs them.
The request carries only a credential reference, not the secret itself.
A broker retrieves the secret just in time and scopes it to the tenant making the call.
The connector uses the secret in process memory only while the vendor request is in flight.
The execution window closes and the secret does not persist in the worker after the call completes.
Connector credentials and API secrets are displayed only at creation or rotation time. After that, the portal shows masked state like credential presence or last-updated time, not the secret itself.
Connector credential encryption keys are rotated on a scheduled cadence or through emergency re-keying, with batch re-encryption designed to avoid blocking connector operations.
Secret-boundary access is logged with timestamp, actor, action, resource, and result, and unauthorized access attempts trigger alerts immediately.
MSPlex keeps policy and authorization as a platform boundary. Connector code does not invent its own access model. The same checks that govern tools/call also filter tools/list, so operators only see tools they are actually allowed to invoke.
Authenticate principal
Resolve tenant context
Resolve customer context
Load entitlement snapshot
Verify subscription status
Verify connector entitlement
Verify instance readiness
Evaluate tool policy and RBAC
Check quota and overage
Check approval requirement
Dispatch to worker
Write audit and metering
Return response
A purchased connector is not automatically runnable. MSPlex treats connector exposure as the result of several state checks: entitlement, configuration, health, and activation. That keeps unconfigured or broken instances from silently surfacing tools.
The portal checks the tenant's entitlement snapshot before setup begins. Non-entitled connectors are blocked server-side before any credentials are collected.
Connector-specific settings are collected, credentials are sent only over HTTPS in the request body, and validation failures block instance creation until corrected.
Credential material is stored through the platform secret boundary and referenced by `credential_ref`, not copied into general worker payloads or environment variables.
Health checks run after validation. Tools are exposed only after the instance is entitled, configured, healthy enough, and explicitly active.
MSPlex keeps user changes, service-account rotation, connector lifecycle events, policy denials, approval decisions, and secret access attributable. The notification center then surfaces the warnings operators need to act on.
If your MSP needs tenant-safe AI access, machine credentials, approval gates, and connector administration in one control plane, MSPlex is built to have that conversation in concrete terms.