Multi-tenancy model for VMware Aria Suite Lifecycle products
VMware Aria Suite Lifecycle
products This section describes multi-tenancy model explaining how tenants can be accessed
through tenant FQDNs and the importance of enabling multi-tenancy along with the
certificate, and DNS requirements by using
VMware Aria Suite Lifecycle
.Enabling Multi-Tenancy
The master tenant is now referred to as
primary tenant. Even though on day-0, the out-of-the-box
VMware Workspace ONE Access
includes a primary
tenant already available, this is kept at a minimal configuration and further
creation of tenants below the primary tenant is not possible. A sequence of
configurations and API calls are to be performed on the VMware Workspace ONE Access
to enable
multi-tenancy. There must be an alias name created for the primary tenant when you
enable multi-tenancy. For more information on enabling multi-tenancy, see Enable multi-tenancy for VMware Aria Suite Lifecycle products.For example, a
VMware Workspace ONE Access
with FQDN
idm1.vmwlab.local
can already have a primary tenant with
name idm1
. Before enabling multi-tenancy, you must create an
alias for the primary (example, primary-tenant
) set and use the
same alias name everywhere the primary tenant is referenced. Tenant FQDNs
By default, tenants created on
VMware Workspace ONE Access
are
accessed through tenant URLs which are nothing but FQDNs mapped to the VMware Workspace ONE Access
server. Every tenant
has its own tenant FQDN. For example, on a single node VMware Workspace ONE Access
with hostname
idm1.vmwlab.local
, with the primary tenant name
(idm1
) and primary tenant alias
(primary-tenant
), the primary tenant should be accessed
through its FQDN primary-tenant.vmwlab.local
. If a new tenant
(tenant1
) is created, it must be accessed only through
tenant1.vmwlab.local
.Since every tenant requires a dedicated
FQDN, creating tenants on
VMware Workspace ONE Access
requires a A-type DNS record mapping the tenant FQDN to
the VMware Workspace ONE Access
server IP
address. For a clustered VMware Workspace ONE Access
deployment, every tenant FQDN must have an A-type record
mapping to the VMware Workspace ONE Access
load balancer IP address. The same model applies to
VMware Aria Automation
. When VMware Aria Automation
is associated with a
tenant, the VMware Aria Automation
tenant
must be accessed by VMware Aria Automation
tenant FQDNs. For example, VMware Workspace ONE Access
with FQDN
idm1.vmwlab.local
has a tenant tenant1
accessible through tenant1.vmwlab.local
and VMware Aria Automation
vra1.vmwlab.local
integrated with this VMware Workspace ONE Access
and associated with
tenant1
. As mentioned, the VMware Aria Automation
tenant and VMware Workspace ONE Access
tenant maps 1:1, so the primary tenant
VMware Aria Automation
can still be
accessed by vra1.vmwlab.local
and tenant1
VMware Aria Automation
must be accessed
by tenant1.vra1.vmwlab.local
.There is a difference between
VMware Workspace ONE Access
and
VMware Aria Automation
tenant FQDNs.
For a VMware Workspace ONE Access
instance, the tenant FQDN format is tenant name (tenant1) followed by the
VMware Workspace ONE Access
domain
name (vmwlab.local
). For example,
tenant1.vmwlab.local
. Since it is tenant name followed by
domain, it remains the same even for clustered VMware Workspace ONE Access
. For a VMware Aria Automation
, the VMware Aria Automation
tenant FQDN format is tenant name (tenant1) followed
the VMware Aria Automation
server FQDN
(vra1.vmwlab.local
) For example,
tenant1.vra1.vmwlab.local
. For a clustered VMware Aria Automation
behind a load-balancer
vra-lb.vmwlab.local
, tenant1 must be accessed through
tenant1.vra-lb.vmwlab.local
.Similar to
VMware Workspace ONE Access
, even VMware Aria Automation
tenant FQDNs require DNS
mapping. But for a VMware Aria Automation
it should be CNAME type record mapping the VMware Aria Automation
tenant FQDNs to the VMware Aria Automation
server FQDN. For a clustered VMware Aria Automation
deployment, all
VMware Aria Automation
tenant FQDNs
must be having a CNAME type DNS record pointing to the VMware Aria Automation
load balancer FQDN. Apart from having DNS mappings as a
mandatory pre-requisite, certificates are also mandatory for tenancy to work. Both
VMware Workspace ONE Access
,
VMware Aria Automation
servers and
its load balancers depending on the deployment architecture should have their
corresponding certificates holding all the required tenant FQDNs. Tenant FQDNs on a single node
setup
- VMware Workspace ONE AccessNode:idm1.vmwlab.localVMware Aria AutomationNode:vra1.vmwlab.localPrimary tenant alias name:primary-tenantTenants: tenant-1, tenant-2
Tenant Names | VMware Workspace ONE Access
Tenant FQDNs | VMware Aria Automation
Tenant FQDNs |
---|---|---|
primary-tenant | https://primary-tenant.vmwlab.local | https://vra1.vmwlab.local |
tenant-1 | https://tenant-1.vmwlab.local | https://tenant-1.vra1.vmwlab.local |
tenant-2 | https://tenant-2.vmwlab.local | https://tenant-2.vra1.vmwlab.local |
Tenant FQDNs on a clustered
setup
- VMware Workspace ONE AccessLoad balancer:idm-lb.vmwlab.localVMware Workspace ONE AccessNodes:idm1.vmwlab.local, idm2.vmwlab.local,idm3.vmwlab.localVMware Aria AutomationLoad balancer:vra-lb.vmwlab.localVMware Aria AutomationNodes:vra1.vmwlab.local, vra2.vmwlab.local,vra3.vmwlab.localPrimary tenant alias name:primary-tenantTenants: tenant-1, tenant-2
Tenant Names | VMware Workspace ONE Access
Tenant FQDNs | VMware Aria Automation Tenant
FQDNs |
---|---|---|
primary-tenant | https://primary-tenant.vmwlab.local | https://
vra-lb.vmwlab.local |
tenant-1 | https://tenant-1.vmwlab.local | https://tenant-1.vra-lb.vmwlab.local |
tenant-2 | https://tenant-2.vmwlab.local | https://tenant-2.vra-lb.vmwlab.local |
After you enable
multi-tenancy,
VMware Workspace ONE Access
should only be accessed through its tenant FQDNs. The old FQDNs and hostnames
(idm1.vmwlab.local, idm2.vmwlab.local, idm3.vmwlab.local
and idm-lb.vmwlab.local)
become invalid.Mandatory Certificate
Requirements
Depending on the deployment type of
VMware Workspace ONE Access
and
VMware Aria Automation
, their
corresponding server certificates should have all the tenant FQDNs present within
itself. Since each tenant forms its own tenant FQDN (both VMware Workspace ONE Access
tenant FQDN and
VMware Aria Automation
tenant FQDN),
every created tenant requires its tenant FQDN to be added as part of both
VMware Workspace ONE Access
and
VMware Aria Automation
certificates.
Enabling multi-tenancy on VMware Workspace ONE Access
also requires VMware Workspace ONE Access
certificates updated as the primary tenant gets a
new alias name and primary tenant FQDN undergoes a change. - When you change the certificates onVMware Workspace ONE Accessto enable multi-tenancy or creating tenants, this brings down the service and leads to a downtime. IfVMware Workspace ONE Accesscertificate is changed, then it goes for a service downtime. The products or services integrated withVMware Workspace ONE Accessfor their authentication purpose cannot useVMware Workspace ONE Accessauth log-in during the downtime. Also, changingVMware Workspace ONE Accesscertificate requires re-trust on all product or services which again lead to a downtime for the products.For information about changing your VMware Identity Manager certificate, see Replace your Workspace ONE Access certificate by using VMware Aria Suite Lifecycle.For related information about replacing certificates forVMware Aria Suite Lifecycle, see Replace certificate for VMware Aria Suite Lifecycle products.
- For every new tenant that is created and associated withVMware Aria Automation, evenVMware Aria Automationcertificates must be changed and this causes service downtime forVMware Aria Automation.
- To avoid service down-times onVMware Aria Automation,VMware Workspace ONE Accessand other products or services integrated withVMware Workspace ONE Access, it is generally recommended to have wild-card certificates. For a new tenant, any change made in theVMware Workspace ONE Accesscertificate orVMware Aria Automationcertificate, can create a downtime inVMware Aria Automation.
- If wild-card certificates are not used, then specific SAN entries are to be created for each tenant FQDN on all required certificates.
- TheVMware Aria Suite Lifecyclelocker service helps in managing certificates on theVMware Workspace ONE AccessandVMware Aria Automationserver nodes. WithVMware Aria Suite Lifecycle, when you replaceVMware Workspace ONE Accesscertificate, the re-trust ofVMware Workspace ONE Accesscertificate on all products is performed automatically.
- Products or services external toVMware Aria Suite Lifecycleis handled manually. Locker service does not handle updating load balancer certificates. They are to be done by the user manually. Whenever load-balancer certificates are changed, the same had to be re-trusted on the products.
- ForVMware Workspace ONE Access, theVMware Workspace ONE AccessCertificate update or replace operation inVMware Aria Suite Lifecycleinternally makes sure theVMware Workspace ONE Accessload balancer certificate is re-trusted before updating theVMware Workspace ONE Accessserver certificates. So, it is recommended to first change theVMware Workspace ONE Accessload balancer certificate manually and then do aVMware Workspace ONE Accesscertificate to update or replace throughVMware Aria Suite Lifecyclelocker service.
- ForVMware Aria Automation, when SSL is terminated at aVMware Aria Automationload balancer and the load balancer certificate is changed manually, you must clickRe-trust Load Balancerunder theVMware Aria Automationproduct card to re-trust the load-balancer certificate inVMware Aria Automation. For more details, see Day 2 operations with other products in VMware Aria Suite Lifecycle.
Mandatory DNS
Requirements
For a single node
VMware Workspace ONE Access
, you require A-type DNS
records highlighting the tenant FQDNs to the VMware Workspace ONE Access
server IP address. And for a clustered
VMware Workspace ONE Access
, A-type
DNS records are required pointing the tenant FQDNs to the VMware Workspace ONE Access
load-balancer IP
address.For
VMware Aria Automation
, for a single node, CNAME type DNS records
are required pointing VMware Aria Automation
tenant FQDNs to the VMware Aria Automation
server FQDN. And for a clustered VMware Aria Automation
, CNAME type DNS records
pointing VMware Aria Automation
tenant
FQDNs to the VMware Aria Automation
load-balancer FQDN. Requirements for
multi-tenancy
Single node
Workspace ONE Access and VMware Aria Automation ![]() | Both Workspace ONE Access and
VMware Aria Automation Cluster![]() |
Workspace ONE Access Single
and VMware Aria Automation Clustered![]() | Workspace ONE Access Cluster
and VMware Aria Automation Single![]() |