New: MCP server monitoring is live. Start free

Documentation

Organizations, members, and access

Intello is multi-tenant. Every monitored dependency, snapshot, change event, and alert preference belongs to exactly one organization. You pick your org implicitly by signing in—there’s no separate “org switcher” in normal product use unless your deployment adds one.

This page explains roles, invitations, and what members can’t do in Settings (especially org and billing).

Organization as security boundary

Behind the scenes, Intello always loads data for your org only. You can’t view another customer’s dependencies by guessing URLs in the app; the backend enforces org-scoped access on every request.

Roles

Product roles are coarse-grained:

  • Admin — can mutate organization settings, billing, invitations, destructive member operations, and many integration settings.
  • Member — can view monitoring data and participate in workflows (acknowledgements, triage) but cannot perform destructive org mutations.

Exact UI labels may vary, but destructive actions you should expect to be admin-gated include:

  • Updating organization profile / billing contact details (where applicable)
  • Inviting, removing, or changing roles of members
  • Canceling or resending pending invitations

Invitations

Invitations flow through tokenized links:

  1. An admin creates an invitation from Settings → Organization / Members (wording varies).
  2. The recipient gets email with a link containing a token.
  3. They sign in (or sign up) and accept; Intello checks that the signed-in email matches the invite so someone else can’t steal the invite.

Service accounts and automation

Most teams only use human accounts in the UI. If you script against Intello, use a dedicated account with the minimum role you need; see Authentication.

Related topics

Catch OpenAPI breaking changes early

Add your spec—diffs and alerts on every sync. No credit card to start; upgrade for faster polling, Slack or Teams, and more seats.