Multi-Tenancy lets you create multiple distinct management environments using a single Deep Security Manager and database server installation. It fully isolates the settings, Policies, and Events for each Tenant and makes use of a number of additional infrastructure scaling options.
Multi-Tenancy was designed to provide segmentation for business units within an organization and facilitate testing in staging environments prior to full production deployments. It also allows the provision of Deep Security to customers within a service model.
The requirements for Deep Security Multi-Tenancy are:
Optional but recommended:
Multi-Tenancy in Deep Security Manager operates similarly to a hypervisor. Multiple Tenants exist within the same Deep Security Manager installation but their data is highly isolated. All Manager Nodes process GUI, Heartbeat or Job requests for any Tenant. For the background processing, each Tenant is assigned a Manager Node that takes care of job queuing, maintenance and other background tasks. The assigned Manager node is automatically rebalanced when manager nodes are added or taken offline. The majority of each Tenant's data is stored in a separated database. This database may co-exist on the same database server as other Tenants, or it can be isolated onto its own database server. In all cases, some data only exists in the primary database (the one Deep Security Manager was installed with). When multiple database servers are available, Tenants are created on the database with the least amount of load.
| Single Tenant | Multi-Tenant | |
|---|---|---|
| Managed computers | 100,000 | 1,000,000 or more |
| Deep Security Manager Nodes | 1-5 | 1-50 |
| Databases | 1 | 1-10,000 |
| Database Servers | 1 (With or without replication) | 1-100 |
Once you enable Multi-Tenancy, you (as the "Primary Tenant") retain all of the capabilities of a regular installation of Deep Security Manager. However, the Tenants you subsequently create can have their access to Deep Security functionality restricted to varying degrees, based on how you configure the system for them.
The segmentation of each Tenant's data into a database provides additional benefits:
To enable Multi-Tenancy:
Once Multi-Tenant mode is enabled, Tenants can be managed from the Tenants page that now appears in the Administration section.
To create a new Tenant:
Welcome to Deep Security! To begin using your account, click the following confirmation URL. You can then access the console using your chosen password.
Account Name: AnyCo
Username: admin
Click the following URL to activate your account:
https://managername:4119/SignIn.screen?confirmation=1A16EC7A-D84F-D451-05F6-706095B6F646&tenantAccount=AnyCo&username=admin
Welcome to Deep Security! A new account has been created for you. Your password will be generated and provided in a separate email.
Account Name: AnyCo
Username: admin
You can access the Deep Security management console using the following URL:
https://managername:4119/SignIn.screen?tenantAccount=AnyCo&username=admin
This is the automatically generated password for your Deep Security account. Your Account Name, Username, and a link to access the Deep Security management console will follow in a separate email.
Password: z3IgRUQ0jaFi
The Tenants page (Administration > Tenants) displays the list of all Tenants. A Tenant can be in any of the following States:
Double-click on a Tenant to view the Tenant's Properties window.
The Locale, Time zone and State of the Tenant can be altered. Be aware that changing the time zone and locale does not affect existing Tenant Users. It will only affect new Users in that Tenancy and Events and other parts of the UI that are not User-specific.
The Database Name indicates the name of the database used by this Tenancy. The server the database is running on can be accessed via the hyperlink.
The Modules tab provides options for protection module visibility. By default all unlicensed modules are hidden. You can change this by deselecting Always Hide Unlicensed Modules. Alternatively, selected modules can be shown on a per-Tenant basis.
If you select Inherit License from Primary Tenant, all features that you (the Primary Tenant) are licensed for will be visible to all Tenants. The selected visibility can be used to tune which modules are visible for which Tenants.
If you are using the "Per Tenant" licensing, only the licensed modules for each Tenant will be visible by default.
If you are evaluating Deep Security in a test environment and want to see what a full Multi-Tenancy installation looks like, you can enable Multi-Tenancy Demo Mode. When in Demo Mode, the Manager populates its database with simulated Tenants, computers, Events, Alerts, and other data. Initially, seven days worth of data is generated but new data is generated on an ongoing basis to keep the Manager's Dashboard, Reports and Events pages populated with data.
The Statistics tab shows information for the current Tenant including database size, jobs processed, logins, security events and system events. The spark line show the last 24 hours at a glance.
The Agent Activation tab displays a command that can be run from the Agent install directory of this Tenant's computers which will activate the agent on the computer so that the Tenant can assign Policies and perform other configuration procedures from the Deep Security Manager.
When Multi-tenancy is enabled, the sign-in page has an additional Account Name text field:
Tenants are required to enter their account name in addition to their username and password. The account name allows Tenants to have overlapping usernames. (For example, if multiple Tenants synchronize with the same Active Directory server).
When Tenants log in, they have a very similar environment to a fresh install of Deep Security Manager. Some features in the UI are not available to Tenant Users. The following areas are hidden for Tenants:
It is also important to note that Tenants cannot see any of the Multi-Tenant features of the primary Tenant or any data from any other Tenant. In addition, certain APIs are restricted since they are only usable with Primary Tenant rights (such as creating other Tenants).
For more information on what is and is not available to Tenant Users, see Administration > System Settings > Tenants.
All Tenants have the ability to use Role-Based Access Control with multiple user accounts to further sub-divide access. Additionally, they can use Active Directory integration for users to delegate the authentication to the domain. The Tenant Account Name is still required for any Tenant authentications.
Agent-initiated activation is enabled by default for all Tenants.
Tenants can see the arguments required for agent-initiated activation by clicking Administration > Updates > Software > Local, selecting the Agent software and then clicking the Generate Deployment Scripts button. For example, the script for Agent-Initiated Activation on a Windows machine might look like this:
dsa_control -a dsm://manageraddress:4120/ "tenantID:7156CF5A-D130-29F4-5FE1-8AFD12E0EC02" "tenantPassword:98785384-3966-B729-1418-3E2A7197D0D5"
Tenants are not able to access manager diagnostic packages due to the sensitivity of the data contained within the packages. Tenants can still generate agent diagnostics by opening the Computer Editor and choosing Agent Diagnostics on the Actions tab of the Overview page.
Deep Security Manager records data about Tenant usage. This information is displayed in the Tenant Protection Activity widget on the Dashboard, the Tenant Properties window's Statistics tab, and the Chargeback report. This information can also be accessed through the Status Monitoring REST API, which can be enabled or disabled by going to Administration > System Settings > Advanced > Status Monitoring API.
This chargeback (or viewback) information can be customized to determine what attributes are included in the record. This configuration is designed to accommodate various charging models that may be required in service provider environments. For enterprises, this may be useful to determine the usage by each business unit.
When Multi-Tenancy is enabled, Primary Tenant Users have access to additional Dashboard widgets for monitoring Tenant activity:
Some examples of Tenant-related widgets:
The same information is available on the Administration > Tenants page (some in optional columns) and on the Statistics tab of a Tenant's Properties window.
This information provides the ability to monitor the usage of the overall system and look for indicators of abnormal activity. For example, if a single Tenant experiences a spike in Security Event Activity, they may be under attack.
More information is available in the Chargeback report (in the Events & Reports section). This report details protection hours, the current database sizes, and the number of computers (activated and non-activated) for each Tenant.