tenant

datatype tenant

Tenants represent individual customers or organizations that use the omniac Business service. Each tenant has its own set of users, data, and configurations, allowing for tailored security monitoring and management. Cross tenant access of data is not allowed, ensuring that each tenant’s information remains private and secure.

Configuration

Initially a tenant will be provided to you by omniac Business. You or a representative of omniac Business can then configure the tenant to your needs. The configuration includes:

  • Contact: The contact information (name, email) for one or more contact persons in your organization.
  • Push Endpoint: The URL to which omniac Business will send notifications about alerts.
  • Hash Algorithm: Omniac Business supports hashing either on the client or server side. From a security point of view we highly recommend client side hashing. We use SHA256 as hashing algorithm.
  • Encryption Key: If you choose to encrypt your data, we provide this encryption key. This key is used to encrypt your data before it is sent to omniac Business for monitoring. Please use the RSA PKCS#1 v1.5 algorithm for encryption.
  • Allowed ACLs: You can specify which Access Control Lists (ACLs) are allowed for your tenant. Each ACL config consists of a name and an ACL IP address. This allows you to control which IP addresses can access your tenant’s data and services.
  • Availabe Attributes: Depending on your contract this will be a list of attributes that omniac Business will monitor for your tenant. Each customer/employee can then monitor 0-n attributes. The attributes are defined and maintained by omniac Business.
  • Rate-Limits: Defines how many requests per time are accepted by the omniac Business service for your tenant. This is used to prevent abuse and ensure fair usage of the service. The rate-limits are maintained by omniac Business.

Authentication

To access the omniac Business service, each tenant must authenticate using a unique API key. This key is provided by omniac Business and should be kept secure. The API key is used to identify the tenant and authorize access to the service.