multi-tenant-saas-architecture
Multi-Tenant SaaS Architecture
Acknowledgement: Shared by Peter Bamuhigire, techguypeter.com, +256 784 464178.
Use When
- Designing tenancy for a new SaaS, or hardening an existing SaaS against cross-tenant leakage.
- Splitting a SaaS into three panels (super admin, tenant/franchise admin, end user) with distinct scopes.
- Designing per-tenant role overrides, permission priority ordering, and audit trails for privileged access.
- Planning the session, JWT, and
tenant_idplumbing that downstream database, API, security, and delivery skills rely on.
Do Not Use When
- The task is a single-tenant app with no plan for tenancy — this skill's constraints add overhead with no benefit.
- The work is about business-module composition rather than tenant boundaries — use
modular-saas-architecture. - The work is pure schema shaping inside an already-defined tenant model — use
database-design-engineeringandmysql-best-practices.
Required Inputs
- Context map and critical-flow table from
system-architecture-design. - Access-pattern list from
database-design-engineering(so isolation model matches real queries). - Threat model / abuse cases from
vibe-security-skill. - Panel and user-type list from product requirements (super admin, tenant admin, end user, and their sub-types).
Workflow
- Read this
SKILL.mdfirst, then load only the referenced deep-dive files that are necessary for the task. - Apply the ordered guidance, checklists, and decision rules in this skill instead of cherry-picking isolated snippets.
- Produce the tenant-isolation map, panel layout, permission model, and audit plan as the deliverables named in Outputs.
Quality Standards
- Keep outputs execution-oriented, concise, and aligned with the repository's baseline engineering standards.
- Preserve compatibility with existing project conventions unless the skill explicitly requires a stronger standard.
- Prefer deterministic, reviewable steps over vague advice or tool-specific magic.
Anti-Patterns
- Treating examples as copy-paste truth without checking fit, constraints, or failure modes.
- Loading every reference file by default instead of using progressive disclosure.
Outputs
- Tenant-isolation map, panel definitions, permission priority model, and audit plan (see the Outputs table below).
- Clear assumptions, tradeoffs, or unresolved gaps when the task cannot be completed from available context alone.
- References used, companion skills, or follow-up actions when they materially improve execution.
Evidence Produced
| Category | Artifact | Format | Example |
|---|---|---|---|
| Data safety | Tenant isolation note | Markdown doc covering row-level vs schema-level isolation, RLS policies, and tenant-scoped indexes | docs/saas/tenant-isolation-note.md |
| Security | Tenant authorization audit | Markdown doc covering super-admin vs tenant-admin vs user privilege boundaries and authz tests | docs/saas/tenant-authz-audit.md |
References
- Use the
references/directory for deep detail after reading the core workflow below. - Use the
documentation/directory for supporting implementation detail or migration notes.
Production-grade multi-tenant SaaS architecture with three-panel separation, zero-trust enforcement, strict tenant isolation, and comprehensive audit trails. This skill defines the tenant and auth boundaries that every downstream module, API, and data query inherits.
Prerequisites
Load these first, in order:
world-class-engineering— repository-wide quality bar.system-architecture-design— produces the context map and critical flows this skill consumes.database-design-engineering— produces the access-pattern list that shapes the isolation model.vibe-security-skill— produces the threat model and auth rules this skill encodes.
When this skill applies
- Designing tenancy for a new SaaS from scratch.
- Converting a single-tenant app to multi-tenant (see
documentation/migration.md). - Auditing an existing SaaS for cross-tenant leakage, missing
tenant_idfilters, or un-audited admin actions. - Planning the three-panel file and route layout (
/,/adminpanel/,/memberpanel/). - Designing the permission priority ladder (user deny > user grant > tenant override > role > default deny).
- Defining what actions must be audited and how long audit records are retained.
Inputs
| Artifact | Produced by | Required? | Why |
|---|---|---|---|
| Context map | system-architecture-design |
required | defines services, panels, ownership |
| Critical-flow table | system-architecture-design |
required | shapes auth and session boundaries |
| Access-pattern list | database-design-engineering |
required | chooses shared-DB-with-tenant_id vs DB-per-tenant |
| Threat model | vibe-security-skill |
required | informs audit rules and abuse cases |
| Panel and user-type list | product requirements | required | determines role and scope per panel |
Outputs
| Artifact | Consumed by | Template |
|---|---|---|
Tenant-isolation map (isolation model + tenant_id rules per table) |
database-design-engineering, api-design-first |
inline (this skill) |
| Panel definitions (super admin, tenant admin, end user) | api-design-first, kubernetes-saas-delivery |
inline |
| Permission priority model (user/tenant override/role/default deny) | vibe-security-skill, api-design-first |
inline + references/permission-model.md |
| Session and JWT plan (prefixing, lifetimes, rotation) | api-design-first, vibe-security-skill |
inline |
| Audit event set and retention policy | observability-monitoring, reliability-engineering |
inline |
| Migration plan (single-tenant to multi-tenant) | database-design-engineering, deployment-release-engineering |
documentation/migration.md |
Non-negotiables
- Every franchise/tenant-scoped table has
tenant_id(orfranchise_id)NOT NULLwith a foreign key totenants. - Every query on a tenant-scoped table includes
tenant_idin theWHEREclause. tenant_idis always extracted from session or JWT — never from client input (body, query, header).- Default authorisation decision is deny. Every action requires an explicit permission check.
- Every super-admin action that touches tenant data is audited with actor, target tenant, and justification.
- Cross-tenant access that should not exist returns
404 Not Found, never403 Forbidden(403 confirms the resource exists).
Decision rules
Isolation model
Tenants share data schema AND tenants < ~10k AND regulated data not tenant-partitioned
-> Shared DB, row-level tenant_id (default choice for this skill)
Strong regulatory boundary (HIPAA/PCI) per tenant
-> Schema-per-tenant OR DB-per-tenant; app injects connection by tenant
Single very large tenant needs isolation from the rest
-> Hybrid: shared DB for small tenants, dedicated DB for large tenant
Wrong choice failure modes:
- Shared DB without tenant_id discipline -> data leakage, impossible to audit
- DB-per-tenant at small scale -> migration and operational cost explodes
- Schema-per-tenant without tooling -> migrations drift across schemas
Panel placement of a new feature
Feature controls platform config, billing, tenant lifecycle, or impersonation
-> /adminpanel/ (super_admin only, audited)
Feature is tenant-admin workspace (manage own tenant, staff, catalogue)
-> /public/ root (tenant owners/staff, scoped by tenant_id)
Feature is self-service for end user (customer/member/student/patient)
-> /memberpanel/ (own records only, scoped by tenant_id AND user_id)
Wrong choice failure modes:
- Admin feature in /public/ -> tenant users see platform levers
- Tenant feature in /memberpanel/ -> end users escalate to admin-only data
- End-user feature in /public/ -> collides with tenant admin routes
Permission resolution priority
1. actor is super_admin -> ALLOW (always audit)
2. user_permissions.denied match -> DENY
3. user_permissions.granted match -> ALLOW
4. tenant_role_overrides match -> ALLOW/DENY per is_enabled
5. role -> permission via template -> ALLOW
6. no match -> DENY
Wrong ordering failure mode: if role is checked before user deny, an
explicit revocation never takes effect. Always deny-before-grant at each tier.
Session prefix vs no prefix
One SaaS codebase hosts multiple apps on the same origin -> prefix required
Only one app on origin AND no shared subdomain sessions -> prefix optional
SSO / impersonation across apps planned -> prefix required
Without a prefix, two SaaS apps on the same host collide in $_SESSION and the
bug only appears in production when both apps are logged in.
Three-panel architecture
+-------------------------------------------------------------+
| Shared Infrastructure Layer |
| Data (tenant isolated) | Business Logic | Session system |
+-------------------------------------------------------------+
| | |
+--------v--------+ +---------v------+ +---------v-------+
| /public/ | | /adminpanel/ | | /memberpanel/ |
| (ROOT) | | | | |
| Tenant Admin | | Super Admin | | End User |
| Workspace | | System | | Portal |
| owner, staff | | super_admin | | member/student |
+-----------------+ +----------------+ +-----------------+
Important: /public/ root is the tenant-admin workspace, not an end-user panel. Confusing the two is the most common mistake.
File layout:
public/
index.php # Landing
sign-in.php # Login
dashboard.php # Tenant admin dashboard
adminpanel/ # Super admin panel
includes/
memberpanel/ # End user portal
includes/
includes/ # Shared includes
assets/
Panel definitions
| Panel | Path | Users | Scope | Notes |
|---|---|---|---|---|
| Tenant Admin | /public/ |
owner, staff | single tenant | all queries include tenant_id = ?; cannot touch platform config |
| Super Admin | /public/adminpanel/ |
super_admin | cross-tenant | tenant_id may be NULL; every action audited |
| End User | /public/memberpanel/ |
member, student, customer, patient | own records within tenant | queries scoped by tenant_id AND user_id |
Tenant isolation model
tenant_id rules per user type
| User type | tenant_id column |
|---|---|
| super_admin | nullable |
| tenant owner | required, NOT NULL |
| tenant staff | required, NOT NULL |
| member / student / customer / patient | required, NOT NULL |
Table pattern
CREATE TABLE students (
id BIGINT UNSIGNED AUTO_INCREMENT PRIMARY KEY,
tenant_id BIGINT UNSIGNED NOT NULL,
first_name VARCHAR(100) NOT NULL,
last_name VARCHAR(100) NOT NULL,
email VARCHAR(100),
FOREIGN KEY (tenant_id) REFERENCES tenants(id) ON DELETE CASCADE,
INDEX idx_tenant (tenant_id),
INDEX idx_tenant_email (tenant_id, email)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
Composite indexes lead with tenant_id. utf8mb4_unicode_ci everywhere. Match file case exactly (Linux file systems are case-sensitive).
Query enforcement
// Extract tenant from session/JWT. Never from client input.
$tenantId = getSession('tenant_id');
// Regular users: filter by tenant_id
$stmt = $db->prepare('SELECT * FROM students WHERE tenant_id = ? AND id = ?');
$stmt->execute([$tenantId, $studentId]);
// Super admin: cross-tenant access is allowed but always audited
if (getSession('user_type') === 'super_admin') {
auditLog('CROSS_TENANT_ACCESS', [
'admin_user_id' => getSession('user_id'),
'target_tenant_id' => $requestedTenantId,
'action' => 'VIEW_STUDENTS',
'justification' => $request['justification'] ?? null,
]);
}
Session and JWT plan
Session prefix system
define('SESSION_PREFIX', 'saas_app_'); // e.g. 'school_', 'restaurant_'
setSession('user_id', $userId); // writes $_SESSION['saas_app_user_id']
$userId = getSession('user_id'); // reads $_SESSION['saas_app_user_id']
Session cookie settings
| Setting | Value |
|---|---|
| HttpOnly | true |
| Secure | auto-detect HTTPS (port 443 or $_SERVER['HTTPS']) |
| SameSite | Strict |
| Lifetime | 30 min idle |
| Regeneration | on login and on privilege change |
$isHttps = (!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] !== 'off')
|| (int) $_SERVER['SERVER_PORT'] === 443;
ini_set('session.cookie_secure', $isHttps ? '1' : '0');
JWT for mobile and API
| Setting | Value |
|---|---|
| Access token lifetime | 15 min |
| Refresh token lifetime | 30 days |
| Rotation | on every refresh |
| Revocation | persisted table keyed by jti |
Permission model
Priority (highest first): user deny > user grant > tenant override > role permission > default deny. See references/permission-model.md for full schema, resolution algorithm, caching strategy, and seed data.
function hasPermission(userId, tenantId, permission) {
if (user.type === 'super_admin') {
auditLog('PERMISSION_BYPASS', { userId, permission });
return true;
}
if (userPermissions.denied(userId, tenantId, permission)) return false;
if (userPermissions.granted(userId, tenantId, permission)) return true;
for (const role of getUserRoles(userId, tenantId)) {
const override = tenantRoleOverride(tenantId, role.id, permission);
if (override !== null) return override.isEnabled;
if (roleHasPermission(role, permission)) return true;
}
return false; // default deny
}
Zero-trust checklist
tenant_idin every query on a tenant-scoped table (except super_admin with audit).- Prepared statements only — no string concatenation into SQL.
- Permission check before every mutating operation.
- MFA required for super-admin access.
- Passwords stored as Argon2ID with per-user salt (32 chars) and server-wide pepper (64+ chars).
- Account lockout after 5 failed attempts with exponential backoff.
- Rate limiting: tenant 1000 req/min, user 100 req/min.
- HTTPS + HSTS on all panels.
- Super-admin actions audited with justification.
- Cross-tenant access returns 404, not 403.
API design
# Tenant-scoped (default)
GET /api/v1/orders # list within tenant
POST /api/v1/orders # create within tenant
GET /api/v1/orders/{id} # show; 404 if wrong tenant
DELETE /api/v1/orders/{id} # delete; 404 if wrong tenant
# Super admin (cross-tenant, audited)
GET /api/v1/admin/tenants
POST /api/v1/admin/impersonate
Response envelope:
{ "success": true, "data": {}, "meta": { "page": 1, "total": 100 } }
Error envelope:
{ "success": false, "error": { "code": "PERMISSION_DENIED", "message": "..." } }
Audit and compliance
Always audit: all super-admin actions, impersonation, permission changes, tenant creation/suspension, data exports, failed auth, cross-tenant access attempts.
{
"id": "uuid",
"timestamp": "2026-04-07T10:30:00Z",
"actor_user_id": 123,
"actor_type": "super_admin",
"action": "IMPERSONATE_USER",
"target_tenant_id": 456,
"justification": "Support request #12345",
"ip_address": "203.0.113.1",
"changes": { "before": {}, "after": {} }
}
Retention: security logs 1 year, audit trails 7 years, operational logs 90 days.
Monitoring alerts
- Cross-tenant access attempt (target = zero).
- Super-admin login from new IP.
- Failed auth spike > 100/min.
- Database query without
tenant_idon a tenant-scoped table. - API error rate > 5%.
Tenant lifecycle
PENDING -> ACTIVE -> SUSPENDED -> ARCHIVED
Archival is reversible until a configured retention cut-off; archived tenants are then hard-deleted via cascade.
Anti-patterns
- Client-supplied tenant identifier.
$franchiseId = $_POST['franchise_id'];— any user can set this to another tenant. Fix: alwaysgetSession('tenant_id')or read from the verified JWT claim. - Missing tenant scope on a query.
SELECT * FROM students WHERE id = ?— returns any student across any tenant. Fix:SELECT * FROM students WHERE tenant_id = ? AND id = ?and treat a missing row as 404. - Super-admin mutation without audit.
deleteStudent($studentId);run from the super-admin panel with no log. Fix: wrap every super-admin mutation withauditLog('ADMIN_DELETE_STUDENT', [...])capturing actor, target tenant, and justification. - Returning 403 for cross-tenant access. Confirms the resource exists and enables tenant-ID enumeration. Fix: map cross-tenant misses to 404 so the existence of the resource is hidden.
tenant_idnullable on a business table.tenant_id BIGINT NULL— allows rows with no owner, which every tenant query then excludes silently. Fix:tenant_id BIGINT UNSIGNED NOT NULLwith a foreign key; backfill before flipping NOT NULL.- Session keys without a prefix in a multi-app host. Two apps on the same origin overwrite each other's
$_SESSION['user_id']. Fix:SESSION_PREFIXper app, always go throughsetSession()/getSession(). - Index order
(status, tenant_id)instead of(tenant_id, status). Query planner cannot use the composite index to isolate one tenant's slice. Fix: lead every composite index withtenant_id. - Big-bang migration of every table at once. Raises rollback risk and produces hours of downtime. Fix: migrate one domain at a time with the six-step pattern in
documentation/migration.mdand verify no NULLtenant_idbefore flipping the column to NOT NULL.
Read next
database-design-engineering— schema, indexes, migration discipline once the isolation model is chosen.api-design-first— REST conventions, auth model, and error envelope that this skill's panels depend on.vibe-security-skill— threat modelling, abuse cases, and auth/authz matrix that feed this skill.kubernetes-saas-delivery— per-tenant deploy, namespace isolation, and progressive rollout on top of this model.modular-saas-architecture— when the platform also composes pluggable business modules inside the tenancy defined here.mysql-best-practices— MySQL engine-specific execution of the schema patterns here.
References
references/database-schema.md— tenant, user, audit, and tenant-scoped table schemas with indexes and partitioning.references/permission-model.md— RBAC schema, permission resolution algorithm, caching, middleware, hierarchical and conditional permissions.documentation/migration.md— addingtenant_idsafely, zero-downtime migration, single-to-multi-tenant phases, rollback.
More from peterbamuhigire/skills-web-dev
google-play-store-review
Google Play Store compliance and review readiness for Android apps. Use
76jetpack-compose-ui
Jetpack Compose UI standards for beautiful, sleek, minimalistic Android
49gis-mapping
Use for web apps that need Leaflet-first GIS mapping, location selection,
48saas-accounting-system
Implement a complete double-entry accounting system inside any SaaS app.
47manual-guide
Generate end-user manuals and reference guides for ERP modules. Use when
38healthcare-ui-design
Design world-class clinical and patient-facing healthcare UIs for web,
38