Managing Tenants
Learn more at Stellar Cyber Academy.
The following link takes you to a course on the Stellar Cyber Academy technical training portal where you can learn more about this topic by watching the suggested lessons.
(2024) ADMIN - Admin Essentials for Tenants Users and System (03h:46m)
Understand multi-tenant architecture within the Stellar Cyber Platform, including data segregation, machine learning customization per tenant, and operational views for managed security service providers (MSSPs). Learn how to create and configure tenants for security monitoring and data processing across multiple organizations or business units.
Watch a demonstration on creating tenants and configuring access levels. Set up a tenant admin user with two-factor authentication and explore how tenant-specific data is managed and secured within the Stellar Cyber Platform.
The first time you access a link on the portal during a session, you must log in to access content.
The Stellar Cyber multi-tenant feature allows all the features and capabilities of Stellar Cyber, including machine learning, to be applied to any number of independent networks.
See the Tenants overview page for general information about tenants.
Tenants Table
When you select the System | Tenants option, Stellar Cyber displays a table of the existing tenants similar to the example below.
The columns are:
-
Name – The name of the tenant.
-
ID – The unique ID number for the tenant. This number is often required for sensor and software setup functions to precisely identify the tenant.
-
Contact Name – The name of the person responsible, as entered.
-
Contact Phone – The phone number of the person responsible, as entered.
-
Address – The address of the tenant, as entered.
-
Last Ingestion Volume (GB) – The amount of data ingested on behalf of the tenant as of the previous day. This value is updated every midnight, local system time.
-
Number of Users – The number of tenant users.
-
Number of Sensors – The number of sensors installed for the tenant.
-
Date Created – The timestamp of when the tenant was created.
-
Action – The actions you can take.
The actions you can take are:
-
Click Create to create a new tenant.
The Add Tenant dialog box (described below) appears.
-
Click to edit the corresponding tenant.
The Edit Existing Tenant dialog box appears.
-
Click to delete the corresponding tenant.
For details on this, see:
See the Tables page for more information on working with tables.
Adding or Editing Tenants
All fields other than the tenant name are stored in the record without further processing. Their values can be defined by the system owner's policy.
-
When you either add a new tenant or edit an existing tenant, a panel similar to the following appears:
Here you can enter or update the following:
-
Tenant Name – A unique name that identifies the tenant. This field is required.
-
Contact Name – The name of the party responsible for the tenant.
-
Contact Email – The email address of the party responsible for the tenant.
-
Contact Phone – The phone number of the tenant.
-
Address – The address of the tenant.
-
Enable Custom DHCP Lease Period – Toggle this on to specify a custom DHCP lease period for this tenant. Stellar Cyber uses this period to release IP addresses from the asset IDs, preventing the accumulation of multiple asset IDs for a single asset (due to changing IP addresses). If you do not enable this, Stellar Cyber uses the global DHCP Lease Period.
-
Retention Group – Choose a retention group for this tenant. This defines custom data retention times for a group of tenants. You can create retention groups under System | Data Management.
If you move a tenant to a different retention group, the tenant uses the new data retention times immediately.
-
Ingestion Target – Use this field to create a target ingestion limit for this tenant. The value you specify here is for your reference only and is not enforced.
-
-
After modifying the above fields, select Next to proceed.
The Authentication Method panel enables you to configure tenant-specific overrides to the global authentication strategy.
Choose the Authentication Method for the tenant:
-
Choose Default for the tenant to use the same settings as the global authentication (set in System | Settings). If you choose this option, no further configuration steps are required other than optionally enabling two-factor authentication (2FA).
-
You might choose Local authentication if the server is globally using Single Sign-On (SSO), but you want a specific tenant to use the Local authentication from the Stellar Cyber server. If you choose this option, no further configuration steps are required other than optionally enabling 2FA.
-
Choose SSO (SAML) if you want the tenant to use a different SSO from the global configuration, or the global configuration is Local but that tenant wishes to use SSO. To configure tenant-specific SSO (Authentication Only), you must first set up the Identity Provider (IdP) that will provide SSO authentication for Stellar Cyber users. For a list of IdPs that Stellar Cyber supports, see Configuring Users, Roles and Authentication.
-
A Global selection of Authentication and Authorization applies to all users (root, partner, and tenant), so the option to change authentication method for a specific tenant is not applicable when the Global method is set to Authentication and Authorization. You cannot log in to Tenant SSO when Global SSO is set to Authentication and Authorization. If you want to use SSO but also allow local users and tenant override, you must set the Global authentication method either to Local or to use the IdP with Authentication Only.
-
Although you can customize SSO configuration on a per-tenant basis, the Authorization capability is only supported at the global level. Overrides you make at the tenant level are for Authentication only, so the toggle for Authentication and Authorization is not offered in the tenant editor.
-
The root tenant must be configured to use either Default (same method as the Global authentication), or Local. It is not supported for configuration with an independent SSO.
-
The authentication method for partners is the same as that for root users. Any authentication overrides for tenant-level users in a tenant group have no effect on the authentication method for the partners who manage the group.
-
-
SaaS tenant –
https://your.stellar.cyber.address/saml/login/callback/org_id/<org-id>/cust_id/<tenant-id>
Example
https://1.1.1.1/saml/login/callback/org_id/51408620/cust_id/59125044
-
On-premises tenant –
https://your.stellar.cyber.address/saml/login/callback/cust_id/<tenant-id>
Example
https://1.1.1.1/saml/login/callback/cust_id/59125044
If you choose SSO (SAML) as the authentication method for the tenant, configure your IdP to include the customer ID in the tenant callback. The ID you use is for a single tenant. Most IdPs support the following syntax:
-
-
If you select SSO (SAML), then select Metadata URL or Manual Config:
If you select Metadata URL:
-
Issuer URL: Leave this empty. The IdP provides the Issuer URL as part of the metadata it returns.
-
Metadata URL: Paste the URL you copied from the IdP. The URL must begin with either
https://
orhttp://
. Different vendors use different names for the Metadata URL:Identity Provider
Term for Metadata URL
Active Directory Federation Services Federation Metadata URL Microsoft Entra ID App Federation Metadata URL Okta Metadata URL OneLogin Issuer URL Rippling Metadata URL
If you select Manual Config:
-
Issuer URL: Paste the issuer URL that you previously copied from the IdP when configuring it.
-
Entry Point: Paste the entry point URL you previously copied from the IdP.
You must include http:// or https:// before the URLs. Different vendors use different names:
Identity Provider
Term for Issuer URL
Term for Entry Point URL
Active Directory Federation Services Federation Service Identifier SAML Endpoint Microsoft Entra ID Identifier (Entity ID) Login URL or SAML-P Sign-on Endpoint Okta Issuer Sign on URL OneLogin Issuer URL SAML 2.0 Endpoint (HTTP) Rippling Issuer or SAML Issuer URL SAML 2.0 Endpoint (HTTP) -
IDP Certificate: Upload the certificate file you previously downloaded from the IdP.
-
-
If you select SSO (SAML), then also select Allow Clock Skew to allow for system time differences between Stellar Cyber and the IdP. Authentication messages have an expiration. If the system times on Stellar Cyber and your IdP are not synchronized, the messages might expire before they even get to Stellar Cyber. The result is that users cannot log in, because they cannot authenticate.
-
Choose a Two-Factor Authentication option that matches your IdP configuration:
-
Off: If you choose this option, Stellar Cyber user accounts are not offered a 2FA option.
-
Mandatory: If you choose this option, all users for every tenant are required to use 2FA when logging in to Stellar Cyber.
-
Optional: If you choose this option:
-
The 2FA option can be customized for individual tenants under System | Tenants.
-
Individual users can choose to enable 2FA under their User Profile in the Stellar Cyber UI.
-
You can enforce 2FA for specific users under System | Users when adding or editing a user
-
The overall Global Settings for 2FA affect authentication for partners and tenant users. For example, if 2FA is Mandatory, all users must use 2FA.
-
Enabling 2FA here is independent of what you have configured on your SSO service. Enabling it here causes a separate 2FA prompt to be displayed upon logging in to Stellar Cyber.
-
The 2FA page from Stellar Cyber refers to use of Google Authenticator, but other authenticator applications also work.
-
-
-
Select Next and then Submit your configuration to save the tenant.
Tenant Groups
You can add tenants to groups on the Tenant Groups page. See Tenant Groups for more information.