Default to Encapsulation
Use VergeOS’s built-in network encapsulation for all tenants. Only configure Layer 2 pass-through when there is a specific requirement for direct VLAN access.
VergeOS multi-tenancy is built on architectural isolation — not just policy-based separation. Every tenant is a fully encapsulated Virtual Data Center (VDC) with its own networking stack, exclusive storage volumes, and independent administrative boundary. This stands in contrast to platforms that rely on VLANs, resource pools, or RBAC rules to separate tenants within a shared management plane.
The isolation model rests on four pillars:
Network encapsulation is the foundation of tenant isolation. When a tenant is created, VergeOS automatically provisions a virtual network that aggregates and encapsulates all of that tenant’s traffic. From the tenant’s perspective, this is their physical network — they cannot see or interact with any other tenant’s traffic.
Unlike VLAN-based segmentation — where a misconfigured VLAN tag or a compromised switch could expose traffic between tenants — VergeOS network encapsulation provides zero-trust network isolation by default. A tenant cannot reach another tenant’s network even if they share the same physical infrastructure.
Each tenant receives exclusive storage volumes within the vSAN. Tenant storage is tracked independently, including per-tenant deduplication statistics. There is no cross-tenant data access — a tenant’s storage is as isolated as a physically separate storage system.
Key characteristics:
Each tenant manages its own user accounts and authentication independently. Three authentication models are available:
| Model | Description | Use Case |
|---|---|---|
| Local users | Tenant admin creates and manages user accounts directly within the tenant UI | Small tenants, standalone environments |
| Parent-delegated | Tenant authenticates users against the parent (host) system’s user directory | Managed service providers who control tenant access centrally |
| Third-party IdP / OIDC | Tenant integrates with an external identity provider (Okta, Azure AD/Entra, Google Cloud Identity, etc.) via OIDC | Enterprise tenants with existing identity infrastructure |
The OIDC integration is configured per tenant during creation or modification. When an OIDC application is selected, the tenant uses the external identity provider for authentication while maintaining local authorization (permissions and roles).
In some scenarios, a tenant needs direct Layer 2 access to a physical VLAN — for example, to connect to a dedicated WAN link, a physical storage network, or legacy applications requiring L2 adjacency.
VergeOS provides Tenant Layer 2 Networks (v26.0+) for streamlined VLAN pass-through:
VergeOS automatically creates three components inside the tenant:
| Level | Check |
|---|---|
| Host | Layer 2 network appears in tenant’s Layer2 Networks list, Enabled = ON |
| Tenant | External and Physical networks appear in tenant’s Networks list |
| Infrastructure | Physical switch ports carry the VLAN to the correct nodes |
| Connectivity | Test VM on the tenant’s External network can reach devices on the VLAN |
Removing a Tenant Layer 2 Network requires a specific order:
Each tenant can implement its own micro-segmentation strategy using the same networking tools available at the host level:
This enables zero-trust principles within each tenant — workloads are isolated by default and communicate only through explicitly permitted paths.
Tenant resource allocation is enforced at the platform level:
The host (parent) system has comprehensive visibility into tenant operations without violating tenant isolation.
The All-Tenants Dashboard provides an overview of all tenants with:
Each tenant’s dashboard shows:
VergeOS stores usage statistics per tenant to support 95th percentile billing:
Alternatively, configure a Subscription (System → Subscriptions → New) with:
This delivers automated usage reports via email on your configured schedule.
When the Expose System Snapshots option is enabled on a tenant, the tenant can browse the host’s available snapshots and self-serve download their own tenant snapshot from the provider’s snapshot timestamps. This gives tenants the ability to restore their own systems without requiring host administrator intervention.
Each tenant can be independently snapshotted and restored:
Default to Encapsulation
Use VergeOS’s built-in network encapsulation for all tenants. Only configure Layer 2 pass-through when there is a specific requirement for direct VLAN access.
Document VLAN Assignments
Maintain clear documentation of which VLANs are passed to which tenants, including VLAN IDs, purposes, and switch port configurations.
Least-Privilege Networking
Within each tenant, start with default-secure internal networks and open access only through explicit firewall rules. Follow zero-trust principles.
Monitor Storage Thresholds
Configure subscriptions to alert on tenant storage approaching provisioned limits. Thin provisioning means allocated can far exceed used — monitor “used” to track actual consumption.
Use OIDC for Enterprise Tenants
For enterprise tenants with existing identity infrastructure, configure OIDC integration rather than managing local user accounts within each tenant.
L2 Removal Order
When removing Layer 2 pass-through, always disable and delete from the host first, then clean up External before Physical networks inside the tenant.