Multi-tenancy with Orgs
If your deployment requires logical separation of departments within your organization, or if it involves supporting many distinct organizations from a single application instance, use the Orgs feature.
Using Orgs, you can set boundaries within the ThoughtSpot system and isolate each tenantβs data in such a way that it is independent of and invisible to other tenant workspaces configured on the same application instance.
The following figure illustrates the primary difference between a single-tenant and multi-tenant deployment:
|
Important
|
|
Orgs in ThoughtSpotπ
If the Orgs feature is enabled on your instance, a Primary Org will be created as Org 0.
The Primary Org behaves as the administration Org for all other Orgs in the cluster.
Each Org other than the Primary Org serves as an independent container with its own set of users, groups, and data objects, and provides the same user experience as that of a regular ThoughtSpot instance.
If a user only belongs to a single Org, their experience of ThoughtSpot is as if it were single-tenant.
If a user belongs to multiple Orgs, they will see a menu allowing them to switch between the Orgs they belong to.
All activity within ThoughtSpot is always within the context of one Org, even if the user has access to multiple Orgs. They can switch between Orgs but not do any actions across Orgs.
Orgs deployment and administrationπ
The cluster administrator can create an Org for each tenant account, configure groups and assign users, and define access to data objects within that org.
The following figure depicts the Orgs presentation on a multi-tenant ThoughtSpot instance.
User rolesπ
On a multi-tenant instance, ThoughtSpot supports the following user roles:
-
Cluster administrator
By default, the administrator of the primary Org (Org 0) is assigned the privileges of a cluster administrator. The cluster administrator can access all Orgs and perform the following CRUD operations:-
Create and manage Orgs
-
Add users to Orgs
-
Administer cluster
-
Manage user identity and access management (IAM)
The cluster administrator can also act as an individual Org administrator and perform administration tasks within an Org context.
-
-
Org administrator
An Org administrator administers and manages users, groups, and data objects of their respective Org. Typically, Org administrators create groups within their Org and assign privileges to the users of their Org. -
Org users
An Org user can access only the Orgs to which they belong. A user can belong to more than one Org and access data objects and metadata based on the privileges assigned to the groups to which they belong.
All Orgs scopeπ
On a multi-tenant ThoughtSpot instance, all operations are run in the context of the Org.
If a cluster administrator wants to perform a Create, Read, Update, or Delete (CRUD) operation or apply a configuration change to all Orgs, they must override the Org context and apply the changes at the All Orgs level via the UI or API calls. If using API, the cluster administrator must explicitly set the Org scope to ALL in their API requests.
|
Note
|
|
Per Org custom embed URL (for custom link settings)π
Early Access
A user belonging to multiple Orgs can share ThoughtSpot objects such as Liveboards and Answers, with users of another Org. This will require the object to have share permissions, and both users to be part of the parent Org of the shared object.
Starting with ThoughtSpot Cloud 10.5.0.cl release, developers embedding ThoughtSpot in their application will be able to edit their custom link settings for their application users to allow seamless access to content from another different Org. For example, a user has access to Org1, Org2 and Org3. While the user is logged in to Org1, they can access a Liveboard shared by another user in Org3 without using the Org switcher.
This feature is turned off by default. To enable this feature on your instance, contact ThoughSpot Support. When this feature is enabled, the Org ID will be passed as an additional query parameter in the {ts-query-param} in the URL.
For example, if you have set the custom link as:
https://www.mysite.com/liveboard/{object-id}?{ts-query-params}
The resulting URL will be:
https://www.mysite.com/liveboard/22946f4b-b4ce-4643-be50-66afcd5177?orgId=0
The Org ID will be passed in the URL depending on the placement of {ts-query-params} in the custom URL.
|
Note
|
|
Feature availability on a multi-tenant instanceπ
On an Orgs-enabled cluster, certain UI and API operations are allowed only at the cluster level. The following table lists the features and configuration operations allowed at the cluster or individual Org level.
| Feature category | At the cluster level (All Orgs) | At the Org level |
|---|---|---|
User management | β User creation and management β User association to Orgs | β User creation and management β User association to groups |
Group provisioning, Roles and privileges | β | β |
Authentication | β Local authentication configuration β Trusted authentication β SAML authentication configuration β OIDC authentication | β Trusted authentication |
Access to | β | β |
Security settings (CORS settings) | β | β |
Security settings (CSP settings) | β |