Enterprise Admin Workflow Guide¶
This guide covers the core administrative workflows in SkillMeat's enterprise edition, including inspecting artifacts, performing bulk actions on multiple artifacts, managing collections, and triaging activity feeds.
Table of Contents¶
- Overview
- Inspecting Artifacts
- Using Bulk Actions
- Managing Collections
- Triaging the Activity Feed
- Workflow Examples
- Best Practices
Overview¶
The Enterprise Admin Dashboard provides four primary workflows for managing your organization's artifacts and collections:
- Inspecting Artifacts — Deep-dive into artifact governance, propagation, and change history
- Bulk Actions — Perform operations on multiple artifacts simultaneously (deploy, lock, delete, reassign)
- Managing Collections — Create, organize, and manage collections for teams and projects
- Activity Monitoring — Review prioritized activity feed for actionable governance events
Key Concepts¶
Artifact Inspection: Clicking an artifact row opens a detailed modal with three tabs: - Governance — Ownership, enforcement status, permissions, and scope - Propagation — Deployment targets, cascade policies, and version tracking - Audit Trail — Complete history of changes, deployments, and access events
Bulk Actions: Select multiple artifacts to apply the same action across them (deploy globally, lock, unlock, delete, or reassign ownership).
Collections: Organized groupings of artifacts that can be deployed together or shared with teams.
Activity Feed: Prioritized log of governance events (deployments, enforcement changes, violations, team changes) with filtering and deep-linking to affected artifacts.
Inspecting Artifacts¶
Click any artifact row in the dashboard to open the Artifact Inspection Modal, which provides detailed governance, propagation, and audit information.
Opening an Artifact¶
- Navigate to the Enterprise Admin Dashboard
- Locate the artifact you want to inspect in the artifact list
- Click anywhere on the artifact row (not the checkbox)
The artifact inspection modal opens with three tabs.
Governance Tab¶
The Governance tab shows ownership and enforcement information:
| Field | What it shows |
|---|---|
| Owner | Who owns this artifact (user, team, or enterprise) |
| Owner Type | Scope: enterprise, team, or personal |
| Current Status | Active, draft, deprecated, or archived |
| Enforcement Status | Locked (enforce_override enabled) or unlocked |
| Enforcement Mode | "Silent Override" (auto-push) or "Notify Only" (manual pull) |
| Access Control | Who can view, edit, or delete this artifact |
| Created Date | When the artifact was created |
| Last Modified | When it was last updated and by whom |
| Source URL | Upstream GitHub link (if tracking a source) |
What you can do: - Check enforcement status at a glance - Verify owner and access permissions - See modification history - Identify if the artifact is tied to a GitHub source
Propagation Tab¶
The Propagation tab shows deployment targets and cascade policies:
| Section | What it shows |
|---|---|
| Deployment Targets | List of teams, projects, and user collections this artifact is deployed to |
| Deployment Status | Which targets are in sync, diverged, or experiencing errors |
| Cascade Policy | How updates propagate down tiers (enterprise → team → user) |
| Last Deployment | When this artifact was last deployed and by whom |
| Version in Each Target | Specific version deployed to each team/project/collection |
| Pending Updates | If new versions are waiting to be pushed to any target |
What you can do: - See which targets have received the latest version - Identify which targets are out of sync - Review enforcement cascade behavior - Check deployment timestamps - Trigger re-deployment if needed
Audit Trail Tab¶
The Audit Trail tab shows a complete history of changes:
| Event | Information logged |
|---|---|
| Creation | Who created the artifact and when |
| Modifications | What changed, who changed it, and when |
| Deployments | Target, deployment time, enforcement mode, outcome |
| Access Events | Who accessed (viewed/modified) the artifact and when |
| Enforcement Changes | When enforcement was enabled/disabled and by whom |
| Ownership Changes | When the artifact was reassigned to a different owner |
What you can do: - Audit who has modified the artifact - See complete deployment history - Track enforcement changes and their timing - Identify access patterns - Verify compliance with governance policies
Example Inspection Workflow¶
To audit a critical security artifact:
- Click the artifact row for
security-audit-agent - Governance tab: Confirm it's enterprise-owned with enforcement enabled
- Propagation tab: Verify all 5 teams received the latest version
- Audit Trail tab: Review recent modifications to confirm authorized changes only
- Close the modal and take action if issues detected
Using Bulk Actions¶
Bulk actions allow you to perform the same operation on multiple artifacts simultaneously.
Selecting Artifacts¶
- Navigate to the artifact list in the dashboard
- Check the checkbox next to each artifact you want to select
- Use the top-level checkbox to select all visible artifacts
- The Bulk Action Bar appears at the bottom of the screen showing:
- Number of artifacts selected (e.g., "5 artifacts selected")
- Available actions for those artifacts
- Clear selection button
Available Bulk Actions¶
Once you've selected artifacts, the bulk action bar displays available operations:
Deploy Global¶
Pushes the selected artifacts to all downstream teams and user collections.
- Click Deploy Global
- A confirmation dialog appears with options:
- Enforcement Mode: Choose "Silent Override" (auto-push) or "Notify Only" (manual pull)
- Review Selected: See list of artifacts being deployed
- Click Confirm Deploy
Deployment proceeds in the background, and you'll see a progress indicator.
Lock / Unlock¶
Enables or disables enforcement on the selected artifacts.
Lock (Enable Enforcement):
1. Select artifacts
2. Click Lock
3. Confirm in dialog
4. All selected artifacts now have enforce_override: true
5. Lock icon appears on the artifacts
6. Local users cannot modify these artifacts
Unlock (Disable Enforcement):
1. Select artifacts with lock icons
2. Click Unlock
3. Confirm in dialog
4. All selected artifacts now have enforce_override: false
5. Lock icons disappear
6. Local users can now modify these artifacts
Delete¶
Removes selected artifacts from the enterprise.
- Select artifacts
- Click Delete
- A warning dialog appears listing:
- Artifacts being deleted
- How many deployments will be affected
- Whether any teams/projects depend on these artifacts
- Click Confirm Delete to proceed
Important: Deletion is permanent and may break downstream artifacts that depend on the deleted artifacts. Review carefully before confirming.
Reassign¶
Changes the owner of selected artifacts.
- Select artifacts
- Click Reassign
- A dialog appears with:
- Current owner (e.g., "enterprise", "team-name", "user-email")
- Owner type dropdown (enterprise, team, or user)
- If reassigning to a team, select which team from the dropdown
- If reassigning to a user, select from the user directory
- Click Confirm Reassign
Example Bulk Action Workflows¶
Deploy all new skills organization-wide:
- Filter by type = "skill" and date created = "last 7 days"
- Select all visible artifacts (use top checkbox)
- Click Deploy Global → choose "Silent Override" → confirm
- All new skills deploy to every team and user collection
Lock down critical artifacts:
- Filter by tag = "security" and status = "active"
- Select all visible artifacts
- Click Lock → confirm
- All security artifacts are now read-only with enforcement enabled
Archive deprecated artifacts:
- Filter by status = "deprecated"
- Select all visible artifacts
- Click Delete → review dependencies → confirm
- All deprecated artifacts are removed from the system
Managing Collections¶
Collections are organized groupings of artifacts that can be deployed together or shared with specific teams.
Creating a Collection¶
- Click the Create Collection button (usually at the top of the collections section)
- A dialog opens with the following fields:
- Name (required): Short, descriptive identifier (e.g.,
data-science-toolkit) - Description (required): Explain what this collection contains and who should use it
- Team (optional): Assign the collection to a specific team, or leave unassigned for enterprise-wide
- Tags (optional): Add tags for easier discovery (e.g.,
ml,experimental,tier-1) - Icon/Color (optional): Choose a visual identifier for the collection
- Click Create
The collection now appears in your collections list and is ready to receive artifacts.
Adding Artifacts to a Collection¶
- Navigate to the collections view
- Click the collection name to open its details
- Click Add Artifacts or + Add
- A dialog or panel appears with:
- Search bar to find artifacts
- Filter options (type, status, owner, tag)
- List of available artifacts with checkboxes
- Select the artifacts you want to add
- Click Add Selected or Confirm
Artifacts are now part of the collection and can be deployed together.
Viewing Collection Details¶
- Click the collection name from the collections list
- The Collection Details page shows:
- Metadata: Name, description, owner, creation date
- Artifacts: List of all artifacts in the collection with counts by type
- Deployments: History of deployments (when, where, by whom)
- Team Assignment: Which team(s) use this collection
- Settings: Access controls and visibility
Using the Kebab Menu¶
Each collection has a kebab menu (three dots) with additional actions:
| Action | What it does |
|---|---|
| Edit | Change name, description, team, or tags |
| Deploy | Push all artifacts in the collection to specified targets |
| Duplicate | Create a copy of the collection with all artifacts |
| Share | Grant access to specific teams or users |
| Delete | Remove the collection (artifacts are not affected) |
| Export | Download collection metadata and manifest |
Example Collection Workflows¶
Create and deploy a data science toolkit:
- Click Create Collection → name it
Data Science Toolkit - Description: "Pre-curated skills and commands for data analysis"
- Team: "Data Science" (or leave unassigned for org-wide)
- Click Create
- Open the collection → Add Artifacts
- Search for and select:
pandas-analysis,matplotlib-charts,jupyter-launcher - Click Add Selected
- Open kebab menu → Deploy → select teams → confirm
All teams now have access to the data science toolkit.
Organize artifacts by project:
- Create a collection for each project:
Project Alpha,Project Beta, etc. - Add relevant artifacts to each collection
- Assign each collection to the responsible team
- Use collections as the unit of deployment (deploy entire collection instead of individual artifacts)
Triaging the Activity Feed¶
The Activity Feed is a prioritized log of governance events, deployments, and team changes. Use it to stay informed about organizational changes and take action on issues.
Accessing the Activity Feed¶
- In the Enterprise Admin Dashboard, navigate to the Activity or Feed section
- The feed displays recent events, sorted by priority (actionable first, then by date)
Understanding Activity Priorities¶
Events are color-coded and sorted by actionability:
| Priority | Color | Event Types | Action |
|---|---|---|---|
| Critical | Red | Enforcement violations, failed deployments, unauthorized access, policy breaches | Requires immediate review and remediation |
| High | Orange | Deployment errors, enforcement disabled unexpectedly, access control changes | Review soon and verify intended changes |
| Medium | Yellow | Successful deployments, ownership changes, team reassignments | Monitor and log for audit purposes |
| Low | Gray | View access, artifact searches, routine sync events | Informational, no action needed |
Filtering the Activity Feed¶
At the top of the activity feed, use these filters to focus on relevant events:
| Filter | What it does |
|---|---|
| Event Type | Show only specific event types (e.g., deployments, permission changes, sync events) |
| Artifact Type | Show events for specific artifact types (skills, commands, agents, etc.) |
| Owner/Team | Show events for specific owners or teams |
| Date Range | Restrict events to a specific time period (last 24 hours, last 7 days, custom) |
| Status | Show only resolved, unresolved, or in-progress events |
Taking Action on Events¶
Click any actionable event in the feed to deep-link to the affected artifact:
- Click the event (e.g., "Deployment failed for security-audit-agent to Team Alpha")
- The Artifact Inspection Modal opens automatically
- Review the Governance, Propagation, and Audit Trail tabs
- Take corrective action:
- Re-deploy the artifact
- Change enforcement settings
- Reassign ownership
- Investigate access violations
- Close the modal to return to the feed
Example Activity Feed Workflows¶
Monitor critical deployments:
- Filter by Event Type = "Deployment" + Priority = "Critical"
- Review failures in the feed
- Click each failed deployment to open the artifact modal
- Check propagation tab to see which targets failed
- Retry deployment with corrected settings
Audit permission changes:
- Filter by Event Type = "Permission Change" + Owner = "enterprise"
- Review all permission modifications in the past month
- Click suspicious changes to verify they were authorized
- Document findings in your governance log
Track team transitions:
- Filter by Event Type = "Ownership Change" + Date Range = "last 30 days"
- See all artifacts reassigned between teams
- Verify downstream impacts are handled (re-deployments, consent changes)
- Update team documentation with new artifact ownership
Workflow Examples¶
Example 1: Deploy a New Security Artifact Organization-Wide¶
Scenario: You've created a new security audit agent and need to roll it out to all teams with enforcement enabled.
Steps:
- Navigate to the artifact list and find
security-audit-agent - Click the row to open the Artifact Inspection Modal
- Check the Governance tab to confirm it's enterprise-owned
- Close the modal, select the
security-audit-agentcheckbox - Click Deploy Global → select "Silent Override" → confirm
- The artifact deploys to all teams with enforcement enabled
- Check the Activity Feed to confirm deployment succeeded
- Click the deployment event to verify it reached all targets
Result: All teams now have the security audit agent locked with enforcement, ensuring consistency.
Example 2: Audit and Lock Down Critical Artifacts¶
Scenario: Q4 compliance requires all critical artifacts to be locked with enforcement enabled. You need to audit which artifacts are currently vulnerable.
Steps:
- Filter artifacts by tag = "critical"
- Review each artifact:
- Click to open the inspection modal
- Check Governance tab for enforcement status
- Check Audit Trail tab for recent changes
- For artifacts without enforcement:
- Select them (checkboxes)
- Click Lock → confirm
- Navigate to Activity Feed
- Filter by Event Type = "Enforcement Enabled" + Date Range = "today"
- Verify all critical artifacts are locked
Result: All critical artifacts now have enforcement enabled and are documented in the audit trail.
Example 3: Organize and Deploy a Team Toolkit¶
Scenario: The Data Science team needs a curated toolkit of pre-configured skills and commands. You'll create the collection and manage it.
Steps:
- Click Create Collection
- Name:
Data Science Toolkit| Team:Data Science - Click Create
- Open the collection → Add Artifacts
- Search for and add:
data-analysis-skill,visualization-command,ml-inference-agent - Open the collection's kebab menu → Deploy
- Select the Data Science team as the target
- Choose enforcement mode and confirm
- Check Activity Feed to see the deployment event
- Click the deployment event to verify all artifacts arrived
Result: The Data Science team now has a curated toolkit deployed as a unit.
Example 4: Investigate a Failed Deployment¶
Scenario: The activity feed shows a critical deployment failure. You need to diagnose and fix it.
Steps:
- In the Activity Feed, filter by Priority = "Critical"
- Find the deployment failure event (e.g., "Deployment failed for logging-agent to Team Sales")
- Click the event to open the Artifact Inspection Modal
- Check the Propagation tab to see:
- Which targets failed
- What error messages were returned
- Whether it's a network issue, permission issue, or data issue
- Possible fixes:
- If it's a permission issue: reassign the artifact or update access controls
- If it's a data issue: edit the artifact content and re-deploy
- If it's a network issue: wait and retry
- Click Deploy (or close and use bulk actions to retry)
- Confirm deployment
- Return to the Activity Feed and verify the retry succeeded
Result: The deployment is fixed and the team receives the artifact.
Best Practices¶
Artifact Inspection¶
- Inspect before deploying — Always check the Governance and Audit Trail tabs before deploying to verify the artifact is in the expected state
- Monitor propagation — Regularly check the Propagation tab to ensure artifacts reach their intended targets
- Audit changes — Review the Audit Trail monthly to catch unauthorized modifications
- Verify source links — If tracking GitHub sources, ensure the source URL is valid and up-to-date
Bulk Actions¶
- Test before bulk deploying — Deploy to a pilot team first, then expand
- Group by intent — Only bulk-deploy artifacts with the same enforcement intent
- Document bulk actions — Record what you deployed and why in your governance log
- Stagger large deployments — For >50 artifacts, deploy in batches to avoid overwhelming the system
- Always review the list — Read the confirmation dialog carefully before confirming bulk actions
Collection Management¶
- Use collections as deployment units — Instead of deploying individual artifacts, deploy entire collections to teams
- Document collection purpose — Keep descriptions clear so team members understand what's included
- Version your collections — Create versioned copies (e.g.,
Toolkit v1.0,Toolkit v1.1) when making significant changes - Regularly audit membership — Verify collections contain what you expect and remove obsolete artifacts
- Use kebab menus for organization — Duplicate collections when creating variations for different teams
Activity Feed Monitoring¶
- Check daily — Review high and critical priority events at least once per day
- Establish thresholds — Define what warrants escalation (e.g., deployment failures, access violations)
- Use filters aggressively — Filter to your area of concern rather than reviewing all events
- Deep-link and verify — Click events to inspect the affected artifacts in detail
- Document anomalies — Keep a log of unusual events for compliance and audit purposes
- Set up alerts — If your organization has monitoring configured, set critical event thresholds
See Also¶
- Enterprise Governance Guide — Understand enterprise ownership and enforcement concepts
- Enterprise Unified Sync UX — Manage synchronization and divergence across teams
- Enterprise Version Management — Track and manage artifact versions
- Web UI Guide — General navigation and dashboard overview