VCIO Toolbox

About

v1 uses Entra ID sign-in and a strict tenant allow-list. Access is isolated per tenant. Early modules run read-only operations first, then expand into controlled deployment workflows.

Tenant isolation

Tenant context is derived from Graph organization data and validated against an allow-list. Cross-tenant data access is blocked by design.

Safety

Guardrails come first. Destructive actions will require explicit confirmation and auditing.