IAM Management
Manage Vision One identity and access management including API keys, user accounts, and access controls. This skill includes sensitive write operations for identity management.
Instructions
- •
When the user asks about API keys, user accounts, or access management in Vision One, use this skill.
- •
List API keys: Use
list_api_keysto review existing API key inventory and status. - •
Audit user accounts: Use
list_accountsto review user access and permissions. - •
Check account details: Use
get_accountfor detailed user account information. - •
CRITICAL - Write operations: All write operations in this skill are sensitive and require explicit user confirmation:
- •Deleting API keys removes programmatic access
- •Inviting users grants access to the platform
- •Updating accounts changes permissions
- •Deleting accounts removes user access entirely
- •
Document changes: All IAM changes should be documented for audit and compliance purposes.
- •
Principle of least privilege: When helping with access decisions, recommend minimal necessary permissions.
Tools
This skill uses the following Vision One MCP tools:
Read Operations
| Tool | Purpose |
|---|---|
list_api_keys | List all API keys with status and permissions |
list_accounts | List all user accounts |
Write Operations (Sensitive - Require User Confirmation)
| Tool | Purpose | Risk Level |
|---|---|---|
delete_api_key | Delete an API key | High - Removes programmatic access |
invite_account | Invite a new user to Vision One | Medium - Grants platform access |
update_account | Modify user account settings/permissions | Medium - Changes access rights |
delete_account | Remove a user account | High - Removes all user access |
Common Workflows
API Key Audit
- •List all API keys
- •Identify keys by purpose/owner
- •Check key permissions and scope
- •Identify unused or excessive permissions
- •Recommend keys for rotation or deletion
API Key Cleanup
- •List API keys
- •Identify keys for deletion (unused, compromised, etc.)
- •Confirm with user which keys to delete
- •Get explicit approval before deletion
- •Delete specified keys
- •Document deleted keys for audit
User Access Review
- •List all accounts
- •Review permissions by role
- •Identify excessive permissions
- •Check for inactive accounts
- •Recommend access adjustments
User Onboarding
- •Discuss required access level with user
- •Determine appropriate role and permissions
- •Confirm account details with user
- •Send account invitation
- •Document new account for audit
User Offboarding
- •Get account details for departing user
- •Review account permissions
- •Confirm deletion with user
- •Delete the account
- •Document removal for audit
Permission Update
- •Get current account details
- •Discuss required changes with user
- •Confirm new permissions are appropriate
- •Update account settings
- •Verify changes applied correctly
Output Format
API Key Inventory
## API Key Summary **Total Keys**: [count] - Active: [count] - Inactive: [count] ### API Keys | Key Name | Status | Created | Last Used | Permissions | |----------|--------|---------|-----------|-------------| | [Name] | [Active/Inactive] | [Date] | [Date] | [Scope] | ### Recommendations - [count] keys have not been used in 90+ days - [count] keys have excessive permissions
User Account Summary
## User Account Summary **Total Accounts**: [count] - Active: [count] - Inactive: [count] ### Accounts by Role | Role | Count | |------|-------| | Administrator | [count] | | Analyst | [count] | | Viewer | [count] | ### Accounts | User | Email | Role | Status | Last Login | |------|-------|------|--------|------------| | [Name] | [Email] | [Role] | [Active/Inactive] | [Date] |
Write Operation Confirmation (Critical)
## CONFIRMATION REQUIRED: [Operation Type] **Operation**: [Specific action] **Target**: [API key name / User account] ### Impact [Description of what will happen] ### This action: - [ ] Is irreversible (deletion) - [ ] Affects user access - [ ] Requires documentation **Type 'CONFIRM' to proceed or 'CANCEL' to abort:**
Audit Log Entry
## IAM Change Record **Date**: [Timestamp] **Operation**: [Action performed] **Target**: [Key/Account affected] **Performed By**: [User who requested] ### Details [Specifics of the change] ### Justification [Reason for the change]
Security Considerations
- •All write operations are sensitive and require explicit user confirmation
- •API key deletion immediately revokes programmatic access - verify no critical integrations depend on the key
- •Account deletion is permanent and removes all user access
- •Follow your organization's change management process for IAM changes
- •Document all changes for compliance and audit purposes
- •Apply principle of least privilege when granting permissions
- •Regularly audit API keys and accounts for unnecessary access
- •Consider impact on integrations before deleting API keys
- •Coordinate account changes with user's management chain
- •Deletion operations cannot be undone - verify target before confirming