Sisense Multitenancy
Sisense supports multitenancy in several different ways:
-
Self contained - Built-in application based multitenancy with full isolation between tenants
-
Multi-instance - Installation based multitenancy with different tenants on separate servers
-
Internal capabilities - Multitenancy based on Sisense application features and user groups
The best approach for you depends on your requirements, preferences and available resources.
Self-contained Multitenancy
Sisense self-contained multitenancy adds a hierarchy to user management to support multiple organization tenants (or multiple environments) in parallel on a single Sisense deployment. This multitenancy is application based and provides a complete separation between tenants.
Advantages of Sisense self-contained multitenancy:
-
Security:
-
Highly secure application based multitenancy prevents data leaks between tenants
-
Auditing and logging capabilities on a per-tenant basis
-
-
Operational Efficiency:
-
Due to the high level of security, tenant admins can handle administrative responsibilities for their own tenant
-
Maintenance processes are more efficient, such as adding new tenants, new users, and handling system upgrades
-
-
Improved Control:
-
System admin has clear visibility of organization tenants, including the number of tenant users and dashboards
-
Supports customized tenant functionality, such as user management and feature management, (including SSO and white labeling)
-
See Overview of Self-contained Multitenancy and Managing Self-contained Tenants to learn more about Sisense self-contained multitenancy.
Multi-instance Multitenancy
With multi-instance (installation based) multitenancy, completely separate Sisense deployments run for different tenants on separate servers.
Internal Capabilities Based Multitenancy
Internal capabilities (implementation) based multitenancy is frequently used for OEM deployments. In this approach the segregation between tenants is achieved using a combination of the Sisense application features and user groups.
A common example of this type of multitenancy uses shared data models, and dashboards with row-based security.
See OEM Architecture for more information about this and several of its related approaches to multitenancy.
Tenant Segregation Level Comparison
This table compares, based on the type of multitenancy, the degree to which tenants are isolated from each other and to what degree they share various types of functionality.
Multi-instance Multitenancy (installation based) |
Self-contained Multitenancy (application based) |
Internal Capabilities Multitenancy (user group and implementation based) |
|
---|---|---|---|
User Isolation Level: |
Isolated user management per deployment |
Isolated user management per tenant |
All users login using the same URL |
User Authentication: |
Dedicated SSO per deployment |
Dedicated SSO per tenant |
Single SSO / SSO router add-on shared by all tenants |
Data Access: |
Tenants can create data models and dashboards that are private to them |
Tenants can create data models and dashboards that are private to them |
Tenants can create dashboards but don’t have access to the data model |
Branding: |
White labeling per deployment |
White labeling per tenant |
Same white labeling configuration shared by all tenants |
Computer Resource Isolation: |
Full isolation |
Isolation using Data Groups |
Isolation using Data Groups |