Multitenancy Configuration Overview

Use the following workflow to enable and configure the ability to manage multiple tenants in a single Panorama appliance.
  1. Enable multitenancy. If you have an existing Prisma Access instance, enabling multitenancy automatically migrates your existing Prisma Access configuration to the first tenant.
    You give the first (migrated) tenant a name and specify an access domain. Prisma Access migrates the templates, template stacks, and device groups associated with the existing configuration and associates them with the access domain you create.
    After you migrate your initial configuration, the administrative user in Panorama becomes a superuser with the ability to create and manage all Prisma Access tenants.
    multi-tenant-migrate-1st-tenant.png
  2. If you deploy Prisma Access for remote networks in multi-tenancy mode, you must have a minimum of 200 Mbps available in your license for each tenant. If you deploy Prisma Access for mobile users in multi-tenancy mode, you must have a minimum of 200 mobile users available in your license for each tenant. In both types of Prisma Access configurations, you can add additional licensing (above these minimums) of either type. You can increase or decrease the bandwidth or mobile user allocation for any tenants after onboarding, as long as you keep the minimum required allocation per tenant, and the overall licensed capacity is not exceeded.
    You can set up a multi-tenant configuration for only remote networks, only mobile users, or both. You allocate licenses accordingly to each tenant when you enable multi-tenancy.
    If you have a license for remote networks and mobile users, you can set up an individual tenant with only mobile users or only remote networks. For example, if your Prisma Access deployment has a license for mobile users and remote networks, you could set up a tenant for mobile users only, as long as you specify a minimum of 200 mobile users for the tenant.
    For each tenant you create after the first, Prisma Access automatically creates templates, template stacks, and device groups for each tenant and associates them to the access domain you create. Prisma Access creates this environment to allow you to create a tenant-level administrative user using an administrative role based on the tenant’s device groups and templates, then creating an administrative user based on that role. In this way, you create an administrative user that has access to a single tenant without allowing that user access to the other tenants that are managed by the Panorama appliance.
    Prisma Access creates template stacks, templates, and device group using the following naming convention:
    • A service connection template stack with the name of
      sc-stk-
      tenant
      , where
      tenant
      is the tenant’s name.
    • A service connection template with the name of
      sc-tpl-
      tenant
      .
    • A service connection device group with the name of
      sc-dg-
      tenant
      .
    • A mobile user template stack with the name of
      mu-stk-
      tenant
      .
    • A mobile user template with the name of
      mu-tpl-
      tenant
      .
    • A mobile user device group with the name of
      mu-dg-
      tenant
      .
    • A remote network template stack with the name of
      rn-stk-
      tenant
      .
    • A mobile user template with the name of
      rn-tpl-
      tenant
      .
    • A mobile user device group with the name of
      rn-dg-
      tenant
      .
    • A Clean Pipe template stack with the name of
      cp-stk-
      tenant
      .
    • A Clean Pipe template with the name of
      cp-tpl-
      tenant
      .
    • A Clean Pipe device group with the name of
      cp-dg-
      tenant
      .
    Prisma Access creates template stacks, templates, and device groups for all Prisma Access types, even those for which you might not be licensed. For example, if you purchase a license for remote networks, Prisma Access automatically creates template stacks, templates, and device groups for remote networks, mobile users, and Clean Pipe.
    If you add custom templates, they cannot take precedence over the Prisma Access-created templates.
    You allocate remote network and mobile user license resources for each tenant based on the license that is associated with the Cloud Services plugin in Panorama.
    The following figure shows a sample Prisma Access deployment using a license with a 20,000 Mbps remote network bandwidth pool and 20,000 mobile users. The administrator allocated 5,000 Mbps in remote network bandwidth and 5,000 mobile users for the existing configuration. After the administrator enabled multitenancy, the license allocation migrated along with all other configuration to the first tenant. The administrator then created additional tenants, each with a 5,000 Mbps bandwidth pool for remote networks and 5,000 mobile users for each tenant. Prisma Access allocates the license resources from the overall license allocation. After you complete this configuration, there is 5,000 Mbps of remote network bandwidth and 5,000 mobile users available in the license.
    Each tenant can use up to 3 service connections with no cost to the license. You can add more than 3 service connections to each tenant, however each additional service connection takes 300 Mbps from your remote network license.
    multi-tenant-licenses.png

Recommended For You