SlideShare a Scribd company logo
Tenancy Design Patterns
Fermin Ordaz (@fermin_ordaz) –
Application Security
Dave Chen (@DaveXChen) – Machine
2PREDIX TRANSFORM
Agenda
Understanding Multi-tenancy1
Multi-tenancy in CF2
4 Multi-tenancy Patterns
5 EdgeManager Demo
3 Multi-tenancy Pillars
3PREDIX TRANSFORM
Picture
Here
Understanding Multi-tenancy
Motivation
•Develop and maintain one application, serve multiple customers.
•Sharing storage and computational resources.
•Cost reduction (ideally).
Implications
•Increased complexity, configuration and customization.
•Data isolation and access control.
•Affects how we expose and consume services.
•Authentication, Authorization, User Management, Provisioning, Billing,
Metering, Rate limiting, etc.
4PREDIX TRANSFORM
Multi-tenancy in CF – Org/Space
5PREDIX TRANSFORM
Provisioning Spectrum
Provisioning in CF
•Handled via Service Broker (and Service Implementation)
•Create and Bind.
•Service Plan and Custom parameters.
•Many choices.
6PREDIX TRANSFORM
Picture
Here
Multi-tenancy Pillars
Data Partition
•Who is your tenant ?
•Partition Key.
•Label your Data.
•Targeting partition.
Authentication
•Type of credentials
•Credentials storage.
•Authentication all the time.
Authorization
•Owner controls.
•Who != What’s allowed
•Privileges, scopes, attributes.
•Privileges and Data Labels.
Provisioning/Scope
•Service Broker/Static
•Service discovery
•Credentials lookup
7PREDIX TRANSFORM
Picture
Here
Multi-tenancy Patterns - I
Authentication
Mechanism
•Binding Credentials
Partitioning Scheme
•Instance id VS Instance/app id
Provisioning/Scope
•Instance in tenant
org/space.
•Shared in org/space.
•Not visible outside.
Authorization Mechanism
•Who drives access.
•Control per instance, or per App.
•No built in privileges.
8PREDIX TRANSFORM
Multi-tenancy Patterns - I
9PREDIX TRANSFORM
Picture
Here
Multi-tenancy Patterns - II
Authentication Mechanism
•OAuth token from tenant UAA
•Store credentials ? No
•Clients can get credentials from
TMS.
Partitioning Scheme
•Instance id VS Instance/client id (OAuth)
•Fine grained access via Data labeling
Scope
•Instance in tenant org/space.
•No binding. Visible from other
org/spaces via (TMS)
Authorization Mechanism
•OAuth authorities or ACS
attributes.
•Service instance protection via
ZAC.
10PREDIX TRANSFORM
Multi-tenancy Patterns - II
11PREDIX TRANSFORM
Multi-tenancy Patterns - III
12PREDIX TRANSFORM
Picture
Here
Building Blocks
TMS – Tenancy Management
Services
•Service instance provisioning.
•Service instance registry.
•Lookup of Client Credentials.
•Tenant Onboard and Subscription.
ZAC – Zone Access
Control
•ZAC protects your services.
•ZAC checks tokens.
•ZAC checks token authorities.
ACS – Access Control
Services
•ACS for API protection (Policies)
•ACS for storing subject attributes.
•ACS for storing resource
attributes.
13PREDIX TRANSFORM
Picture
Here
EdgeManager Demo
General Electric reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do
not constitute a representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ.
This information does not constitute legal, financial, coding, or regulatory advice in connection with your use of the product or service. Please consult your professional advisors for any such
advice. GE, Predix and the GE Monogram are trademarks of General Electric Company. ©2016 General Electric Company – All rights reserved.

More Related Content

PDF
E3: Edge and Cloud Connectivity (Predix Transform 2016)
PDF
IIA8: Smartsignal Goes Microservices (Predix Transform 2016)
PDF
IND3: Predix for Transportation (Predix Transform 2016)
PDF
D4: Predix Cool Features (Predix Transform 2016)
PDF
PAM1: Managing Assets at Scale
PDF
IIA1: Industrial Control Systems 101 (Predix Transform 2016)
PDF
PEM2: Control Applications Portfolio from GE Power
PDF
D02: Performance Engineering and Testing of Predix Apps (Predix Transform 2016)
E3: Edge and Cloud Connectivity (Predix Transform 2016)
IIA8: Smartsignal Goes Microservices (Predix Transform 2016)
IND3: Predix for Transportation (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016)
PAM1: Managing Assets at Scale
IIA1: Industrial Control Systems 101 (Predix Transform 2016)
PEM2: Control Applications Portfolio from GE Power
D02: Performance Engineering and Testing of Predix Apps (Predix Transform 2016)

What's hot (19)

PDF
PCF1: Cloud Foundry Diego ( Predix Transform 2016)
PDF
E4: Building Your First Predix App (Predix Transform 2016)
PDF
D2: Predix Migration & IT Integration (Predix Transform 2016)
PDF
Predix Builder Roadshow
PDF
S1: Predix ISV Partner Program (Predix Transform 2016)
PDF
Experiments in Predix: Ramping up by Mixing Theory and Practice
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
F5 Automation Toolchain
PPTX
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
PDF
F5 Cloud Solutions
PPTX
How to use SDN to Innovate, Expand and Deliver for your business
PDF
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
PPTX
NetScout nGeniusONE overview
PPTX
Realising the Immediate Benefits of SDN and NFV
PDF
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
PDF
Security as an Accelerator for Cloud Adoption
PDF
GE Predix 新手入门 赵锴 物联网_IoT
PPTX
IoT Platform Meetup - GE
PDF
vSEC pro CISCO ACI
PCF1: Cloud Foundry Diego ( Predix Transform 2016)
E4: Building Your First Predix App (Predix Transform 2016)
D2: Predix Migration & IT Integration (Predix Transform 2016)
Predix Builder Roadshow
S1: Predix ISV Partner Program (Predix Transform 2016)
Experiments in Predix: Ramping up by Mixing Theory and Practice
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
F5 Automation Toolchain
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
F5 Cloud Solutions
How to use SDN to Innovate, Expand and Deliver for your business
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
NetScout nGeniusONE overview
Realising the Immediate Benefits of SDN and NFV
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Security as an Accelerator for Cloud Adoption
GE Predix 新手入门 赵锴 物联网_IoT
IoT Platform Meetup - GE
vSEC pro CISCO ACI
Ad

Viewers also liked (17)

PPTX
Etiqueta de jabon "JC"
PPTX
Multi-Tenancy with Spring Boot
PDF
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PDF
D6: Cloud Directions ( Predix Transform 2016)
PPTX
Cross Section and Deep Dive into GE Predix
PDF
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
PPTX
GE Predix - The IIoT Platform
PPTX
Cloudproject
PDF
OpenStack London Meetup, 18 Nov 2015
PPTX
A Multi-tenant Architecture for Business Process Executions
PDF
Master thesis presentation on 'Cloud Service Broker'
PPTX
Cloud Foundry - How Service broker integrates with AppDirect to provide catal...
PDF
Stargel - Multi-Scale Structural Mechanics and Prognosis - Spring Review 2013
PDF
Implement Service Broker with Spring Boot #cf_tokyo
PPTX
20160903predix_cognitiveservices
PDF
Predix Certified Developer
Etiqueta de jabon "JC"
Multi-Tenancy with Spring Boot
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
D6: Cloud Directions ( Predix Transform 2016)
Cross Section and Deep Dive into GE Predix
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
GE Predix - The IIoT Platform
Cloudproject
OpenStack London Meetup, 18 Nov 2015
A Multi-tenant Architecture for Business Process Executions
Master thesis presentation on 'Cloud Service Broker'
Cloud Foundry - How Service broker integrates with AppDirect to provide catal...
Stargel - Multi-Scale Structural Mechanics and Prognosis - Spring Review 2013
Implement Service Broker with Spring Boot #cf_tokyo
20160903predix_cognitiveservices
Predix Certified Developer
Ad

Similar to Pas3 Tenancy Design Patterns (Predix Transform 2016) (20)

PDF
Layer 7 and Oracle -
PPTX
Micro services - Practicalities & things to watch out for
PPTX
Micro services
PPTX
Trust and Cloud Computing, removing the need to trust your cloud provider
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PPTX
Citrix Synergy 2014 - Syn231 Why cloud projects fail
PDF
Webinar: Cloud Data Masking - Tips to Test Software Securely
PPT
Cloud computing-2 (1)
PDF
How to Isolate Tenants in a Data Distribution Platform with Joanna Eriksson
PPTX
ISTIO Deep Dive
PPTX
Acceleration_and_Security_draft_v2
PPT
Cloud Environment (Cloud Computing Course)
PPTX
Cloud computing
PDF
Presentation cloud orchestration solution overview
PPTX
Large scale, distributed access management deployment with aruba clear pass
PDF
Thinking about SDN and whether it is the right approach for your organization?
PDF
Vue d'ensemble Dremio
PDF
f5_synthesis_cisco_connect.pdf
PPTX
Horizontal Scaling for Millions of Customers!
Layer 7 and Oracle -
Micro services - Practicalities & things to watch out for
Micro services
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Webinar: Cloud Data Masking - Tips to Test Software Securely
Cloud computing-2 (1)
How to Isolate Tenants in a Data Distribution Platform with Joanna Eriksson
ISTIO Deep Dive
Acceleration_and_Security_draft_v2
Cloud Environment (Cloud Computing Course)
Cloud computing
Presentation cloud orchestration solution overview
Large scale, distributed access management deployment with aruba clear pass
Thinking about SDN and whether it is the right approach for your organization?
Vue d'ensemble Dremio
f5_synthesis_cisco_connect.pdf
Horizontal Scaling for Millions of Customers!

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative study of natural language inference in Swahili using monolingua...
Reach Out and Touch Someone: Haptics and Empathic Computing
1. Introduction to Computer Programming.pptx
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology
Accuracy of neural networks in brain wave diagnosis of schizophrenia

Pas3 Tenancy Design Patterns (Predix Transform 2016)

  • 1. Tenancy Design Patterns Fermin Ordaz (@fermin_ordaz) – Application Security Dave Chen (@DaveXChen) – Machine
  • 2. 2PREDIX TRANSFORM Agenda Understanding Multi-tenancy1 Multi-tenancy in CF2 4 Multi-tenancy Patterns 5 EdgeManager Demo 3 Multi-tenancy Pillars
  • 3. 3PREDIX TRANSFORM Picture Here Understanding Multi-tenancy Motivation •Develop and maintain one application, serve multiple customers. •Sharing storage and computational resources. •Cost reduction (ideally). Implications •Increased complexity, configuration and customization. •Data isolation and access control. •Affects how we expose and consume services. •Authentication, Authorization, User Management, Provisioning, Billing, Metering, Rate limiting, etc.
  • 5. 5PREDIX TRANSFORM Provisioning Spectrum Provisioning in CF •Handled via Service Broker (and Service Implementation) •Create and Bind. •Service Plan and Custom parameters. •Many choices.
  • 6. 6PREDIX TRANSFORM Picture Here Multi-tenancy Pillars Data Partition •Who is your tenant ? •Partition Key. •Label your Data. •Targeting partition. Authentication •Type of credentials •Credentials storage. •Authentication all the time. Authorization •Owner controls. •Who != What’s allowed •Privileges, scopes, attributes. •Privileges and Data Labels. Provisioning/Scope •Service Broker/Static •Service discovery •Credentials lookup
  • 7. 7PREDIX TRANSFORM Picture Here Multi-tenancy Patterns - I Authentication Mechanism •Binding Credentials Partitioning Scheme •Instance id VS Instance/app id Provisioning/Scope •Instance in tenant org/space. •Shared in org/space. •Not visible outside. Authorization Mechanism •Who drives access. •Control per instance, or per App. •No built in privileges.
  • 9. 9PREDIX TRANSFORM Picture Here Multi-tenancy Patterns - II Authentication Mechanism •OAuth token from tenant UAA •Store credentials ? No •Clients can get credentials from TMS. Partitioning Scheme •Instance id VS Instance/client id (OAuth) •Fine grained access via Data labeling Scope •Instance in tenant org/space. •No binding. Visible from other org/spaces via (TMS) Authorization Mechanism •OAuth authorities or ACS attributes. •Service instance protection via ZAC.
  • 12. 12PREDIX TRANSFORM Picture Here Building Blocks TMS – Tenancy Management Services •Service instance provisioning. •Service instance registry. •Lookup of Client Credentials. •Tenant Onboard and Subscription. ZAC – Zone Access Control •ZAC protects your services. •ZAC checks tokens. •ZAC checks token authorities. ACS – Access Control Services •ACS for API protection (Policies) •ACS for storing subject attributes. •ACS for storing resource attributes.
  • 14. General Electric reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do not constitute a representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ. This information does not constitute legal, financial, coding, or regulatory advice in connection with your use of the product or service. Please consult your professional advisors for any such advice. GE, Predix and the GE Monogram are trademarks of General Electric Company. ©2016 General Electric Company – All rights reserved.