Enterprise Software Single-Tenant Vs. Multi-Tenant - FusionAuth

1y ago
12 Views
2 Downloads
662.60 KB
7 Pages
Last View : 9d ago
Last Download : 3m ago
Upload by : Ronan Garica
Transcription

Single-Tenant vs. Multi-TenantEnterprise SoftwareWHITE PAPER

Choosing between single-tenancy and multi-tenancy comes down to an organization'sbusiness objectives and requirements.Which trade-offs are you willing to make?A single instance of the software and supporting infrastructure serve a single customer.With single tenancy, each customer has his or her own independent database andinstance of the software. Essentially, there is no sharing happening with this option.Key Benefits Security Compliance Customization Upgrade control Data recovery Performance Failure isolationMulti-tenancy means that a single instance of the software and its supportinginfrastructure serves multiple customers. Each customer shares the software applicationand also shares a single database. Each tenant’s data is isolated and remains invisible toother tenants.Key Benefits Cost Automatic upgrades Instant on-boardingLearn more at2

In a single-tenant architecture each company, or tenant, has their own instance, separatefrom any other customer. With a single-tenant solution the risk of another businessaccidentally receiving another customer's user data is eliminated.Enhanced securitySingle-tenancy delivers true data isolation resulting in maximum privacy and enhancedsecurity. The possibility of data leakage between tenants, whether accidentally or throughsabotage, is removed making this architecture a popular choice for large enterprises. Toincrease security, customers can implement a firewall at any layer to protect data. Forexample, the identity provider APIs can be located behind a firewall while the OAuth loginsystem resides in the public facing network.Regulatory complianceEnforcing regulatory requirements is easier due to complete control of the environment. Ifyour company policy does not allow data to be transmitted outside of your country (i.e.German Data Regulations or GDPR regulations) a multi-tenant solution needs to bespecifically designed for this. A single-tenant solution makes this as simple as installingthe software on a server in Germany. Similarly, compliance with regulations such as PCI,HIPAA and SOC2 is simplified because data is secured, encrypted and protectedseparately for each tenant.Learn more at3

CustomizationWith a single-tenant architecture, the software environmentcan be customized to meet customer’s business needs; robustplugins can be installed to maximize personalization withoutlimitation.Upgrade controlCustomers have decision authority over the upgrade cycle.Customers can choose what updates they want to install andwhen. This adds flexibility for scheduling maintenancewindows and downtime without impacting others.Data recoveryData extraction is an important consideration that is oftenoverlooked. If a service is acquired or shutdown it’s wise toconsider how you will retrieve your data in advance; it is easierto export data from an isolated, single-tenant cloud.CostSince this is not a shared infrastructure, customers have topay the cost of the entire system (hardware and software).However, with the rise of low-cost hosting providers, like AWSand Azure, the cost for single-tenant solutions is becomingmore affordable.ProvisioningTo set up new customers, servers must be provisioned and thesoftware must be installed on each server. This process hasbeen made simpler through the use of APIs provided byhosting providers and tools such as Kubernetes and Chef.Learn more at4

Multi-tenant is an architecture where multiple companiesstore their data within the same infrastructure. The entiresystem can span multiple servers and data centers, but mostcommonly data is co-mingled in a single database.Cost reductionThe instances(tenants) arelogically isolated,but physicallyintegrated.GartnerOne of the big drivers is cost. The sharing of infrastructure andresources significantly reduces the overhead of the serviceprovider, and as a result, lowers the costs imposed oncustomers.Automatic upgradesMulti-tenant systems ensure that software updates, includingsecurity patches, are rolled out to all customerssimultaneously. This standardizes software versions utilized bycustomers and eliminates version control issues.Instant on-boardingIn most cases, new customers can be setup by creating a newlogical tenant. No new servers are provisioned and softwareinstallation is not required, which makes this processinstantaneous.Learn more at5

PerformanceOne tenant’s heavy use or load spike may impact the qualityof service provided to other tenants. In addition, whensoftware or hardware issues are found on a multi-tenantdatabase, it can cause an outage for all customers.Security riskIf a hacker gains access to one tenant’s data, they can accessdata from every tenant because all data resides in a singledatabase.Systemvulnerabilities, orexploitable bugs inprograms, are notnew, but they'vebecome a biggerproblem with theadvent ofmulti-tenancy incloud computing.Organizationsshare memory,databases, andother resources inclose proximity toone another,creating newattack surfaces.InfoWorldSingle point of failureIf the multi-tenant system goes down, EVERYONE goes down.In contrast, failure can be isolated with a single-tenant system.A multi-tenant architecture enables tenants to share the sameinfrastructure, but any interaction between tenants should beprevented. The ability to access another customer's data is abreach of security and can destroy confidence in multi-tenantenvironments.In August 2017, Microsoft leaked Office 365 usage data, namesand email addresses across the multi-tenant Admin Center.The breach affected users in multiple Office 365 data centerregions, including both the United States and EMEA,according to Petri.While this data breach was handled quickly, “the regulationsare clear that this is a leak. As such, the EU could fineMicrosoft up to 4% of its global revenue, which is enough tomake your eyes water.”Learn more at6

There are benefits and drawbacks to both single-tenant andmulti-tenant systems. Ultimately, a company must decidewhat is most important to their business and what can besacrificed. Choosing your deployment environment dependson a variety of factors.Is cost a primary driver? Does your industry vertical haveunique regulatory constraints? Is security critical for the typeof data you are storing? Do you want a system that you cancustomize without limitations? Or are you happy using aone-size-fits-all system?At FusionAuth, we believe that each customer has uniquebusiness cases that often require customization to solve.Security is a core focus of our business. Therefore, FusionAuth,unlike other CIAM solutions, is single-tenant. This architectureprovides each of our customers with their own infrastructure.They remain in complete control of their data, upgradeschedule and can rest assured their data is separateand secure.Concerns oversecurity inmulti-tenantenvironmentshave led to manyorganizationschoosing to switchto single tenantinfrastructure as aservice to mitigatethe risks ofco-located data.Despite the extracost, this is asensible andadvisable solution.TechTargetAuth for Any App.FusionAuth provides authentication, authorization, and user management for any app. Builtfor developers, FusionAuth easily integrates with any language and framework and can bedeployed anywhere in minutes. Every feature is exposed as an API giving you completeflexibility to handle any use case.Learn more at Copyright 2020 FusionAuth. All rights reserved.7

software or hardware issues are found on a multi-tenant database, it can cause an outage for all customers. Security risk If a hacker gains access to one tenant's data, they can access data from every tenant because all data resides in a single database. Single point of failure If the multi-tenant system goes down, EVERYONE goes down.

Related Documents:

When creating a tenant, the root administrator can: Label the tenant user interface with a tenant logo Change the tenant user interface look and feel (colors and fonts) Enable all or a subset of parent tenant clouds for the tenant The root administrator controls the following global permissions for each tenant organization and tenant

Architecture approaches for Microsoft 365 tenant-to-tenant migrations This topic is 1 of 5 Contoso users will continue to be known as user@contoso.com. Tenant-to-tenant migration without rebranding Architecture scenario Identities will migrate to a target tenant and will keep the existing domain as part of the migration. Single-event migration

100% compatible with the Tenant File software. Tenant File compatible check styles: Tenant File also provides supplies: Tenant File compatible envelopes: 29 For specific questions on how to use the Tenant File, click into the HELP icon from the MAIN MENU and select USER GUIDE. The complete

Wide area virtual network Data Cente r 1 Data Cente r 2 Data Cente r 3 L2 over L3 tunnel Virtual Network A (Low-latency) Virtual Network B (Bandwidth reserved)networks on an existing L3 network by Virtual Network C (Low-cost, best effort) Tenant A Tenant B Tenant C Tenant A Tenant B Tenant C Data Center 21 Data Center 3 Benefit

Management service to provision these instances at the same time. Cleanup of instances if the tenant is deleted. If a tenant is no longer required, deleting the tenant also deletes the service instances related to the tenant. Note: The service instances are deleted only if they were created using the Tenant Management

THIS SINGLE TENANT LEASE AGREEMENT dated the day of (month) 201 , is made and executed by and between (LANDLORD), whose address is 1350 Orange Avenue, Suite 100, Winter Park, Florida 32789, hereinafter called Landlord, and (TENANT), whose address is, hereinafter called Tenant. (Whenever used herein the terms "Landlord" and "Tenant" include all .

Tenant Selection Plan HUD Occupancy Handbook 4-6 8/13 Chapter 4: Waiting List and Tenant Selection 4350.3 REV-1 C. Required Contents of the Tenant Selection Plan The tenant selection plan helps to ensure that tenants are selected for occupancy in accordance with HUD requirements and established management policies.

Principles of Animal Nutrition Applied Animal Science Research Techniques for Bioscientists Principles of Animal Health and Disease 1 Optional Physiology of Electrically Excitable Tissues Animal Behaviour Applied Agricultural and Food Marketing Economic Analysis for Agricultural and Environmental Sciences Physiology and Biotechnology option Core Endocrine Control Systems Reproductive .