Home / Guides / Workspace ID and Token Setup Runbook
Access Governance Guide
Workspace ID and Token Setup Runbook
This runbook turns ad-hoc credential setup into a controlled access workflow for teams running profile automation at scale.
Updated: 2026-04-05 | Input references: account and API setup patterns found across getting-started and automation repositories.
Core Contract
Identifiers You Must Track
| Field |
Purpose |
Storage rule |
| workspace_id |
Scope jobs to the correct team workspace |
Config store, read-only in runtime logs |
| user_id |
Trace execution ownership |
Audit logs only, no public output |
| token_version |
Track credential rotation events |
Secrets metadata, never plain logs |
| profile_id |
Bind task lifecycle and cleanup events |
Job logs and evidence packs |
| trace_id |
Correlate stages and incident reports |
Required on every batch and job |
Setup Flow
Access Provisioning Sequence
Step 1: Confirm account role and workspace assignment for each operator.
Step 2: Capture workspace_id and user_id from controlled interface or verified API response.
Step 3: Issue scoped token per environment and register token_version.
Step 4: Validate access with a non-destructive API call and log trace_id.
Step 5: Move credentials into secrets manager and revoke temporary copies.
Environment Variable Baseline
MLX_BASE_URL=http://127.0.0.1:35000
MLX_WORKSPACE_ID=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
MLX_TOKEN=***
MLX_TOKEN_VERSION=v3
MLX_REQUEST_TIMEOUT_SEC=45
Expose only what runtime needs. Hide tokens from debug output and UI overlays.
Security Guardrails
- Separate staging and production credentials.
- Rotate tokens after team access changes.
- Disable old token versions immediately after cutover.
- Log access events with immutable timestamps.
Audit Record Skeleton
{
"trace_id": "access-2026-04-05-009",
"workspace_id": "948bab9a-2cad-4a3f-af1f-01bfe260f85b",
"user_id": "19047492-ea90-4138-9afc-d2df61de2b06",
"token_version": "v3",
"event": "access_validation",
"status": "pass",
"timestamp": "2026-04-05T18:30:00Z"
}
A simple, consistent audit record saves hours during incident response.
Common Mistakes
Access Setup Failures That Cause Production Pain
Token reuse everywhere
One leaked key can break every environment at once.
No token version tracking
Teams cannot know which jobs used stale credentials.
Missing workspace ownership checks
Jobs run under the wrong workspace and produce invalid evidence.
Commercial Routing
After Access Governance Is Stable
Once access controls are stable, route users to comparison and promo pages with confidence. This improves trust and reduces low-fit traffic.
FAQ
Access Setup Questions
Which identifiers are mandatory for audit?
Track workspace_id, user_id, profile_id, token_version, and trace_id for each automation run.
Should one token be shared across teams?
No, use scoped tokens per role or environment to reduce incident impact.
How often should token policy be reviewed?
Quarterly at minimum, and immediately after incidents or team changes.