Account boundary
Identity, services, billing state, support ownership, and commercial controls stay attached to the tenant and account record.
Vyoma.cloud workspace
This workspace is the account-bound system of record for tenancy, identity, account service, registrar custody, runtime posture, commercial state, and protected change. Every action is constrained by tenant, account, role profile, permission scope, approval state, and environment.
Fleet
8
100% healthy · 3 regions
Tenants
10
7 live plans · 9 attached services · managed
Domains
9
0 verified · 0 certificate-ready · managed
Automation
0
0 approvals · 0 deploys · 0 host jobs · limited
Account boundary
Identity, services, billing state, support ownership, and commercial controls stay attached to the tenant and account record.
Role + permission boundary
Access is granted per role profile, permission scope, lane, and review state rather than broad admin inheritance.
Change boundary
Managed service, registrar, runtime, and production changes stay separated. Promotion and protected actions remain recorded.
Workspace access
Use your approved workspace account. New access starts with identity review, tenant assignment, role mapping, and service approval.
Sanitized live posture from the current fleet, tenant accounts, domains, services, and automation queue.
Current node and service concentration by region.
Active platform lanes attached to the current tenant and service posture.
Current account and domain footprint tied to the live control plane.
Active accounts
10
7 live plans · managed
Attached services
9
Service relationships tied to managed accounts
Managed domains
9
0 verified · 0 certificate-ready
Current queued and active changes across approvals, deploys, and host-level automation.
Automation posture: limited
Customer accounts, users, contacts, role profiles, and access relationships tied to the tenant record.
Open account systemsPackaging, plan assignment, renewals, revenue records, and commercial changes attached to active accounts.
Open commerce deskDomain intake, transfer, DNS, and certificate readiness under approved tenant and service scopes.
Open domain workspaceFleet lifecycle, deploy history, typed host automation, and environment-level service changes.
Open runtime workspaceThreat review, exposure control, access scrutiny, and approval-bound protected actions.
Open security workspaceRegional grouping, cluster placement, and service distribution across the live fabric.
Open topology workspaceTenant boundary
Scoped
Identity, services, and commercial state stay attached to the tenant and account record.
Role + permission
Granular
Workspace access is broken down by role profile, permission scope, and action type.
Approval state
Recorded
Protected actions remain tied to explicit review and recorded change state.
Environment split
Strict
Production actions stay separated from lower-risk service work and do not inherit automatically.