Is There A Way To Limit A User Visibility To Only One Tenant In An Organization With Multiple Tenants ?

Is there a way to limit a user's visibility to only one tenant in an organization with multiple tenants?

Issue Description: Is there a way to limit a user's visibility to only one tenant in an organization with multiple tenants?

Resolution: Unfortunately, there is no current filter option available to limit access to tenants for a specific user.

  • As a temporary solution, remove the user from all groups in Admin > Accounts & Groups, except the "Everyone" group, and grant access to the desired tenant in Tenant > Manage Access.

  • Alternatively, bookmark the respective organization URL or use the standard URL that includes the tenant name to directly access the desired tenant.

Do not restrict to use the drop-down menu, especially if it is for automated testing. An alternative is to use the standard URL, which includes the tenant name in the URL, for navigation purposes.

This improvement request has been forwarded to UiPath development team and, as per their latest updates, is now being considered for implementation.

It is also recommended to ask corresponding Account Manager for any progress on this or keep an eye out for the feature to be mentioned in UiPath release notes.

Yes, it is possible to limit a user’s visibility to only one tenant within an organization that has multiple tenants. This can be achieved through careful configuration and access control settings. Here are a few approaches that can be considered:

  1. Single-tenant user account: Create a dedicated user account specifically for accessing and managing the desired tenant. This account should have limited or no access to other tenants within the organization. By providing this user account with the necessary permissions only for the desired tenant, you can restrict visibility to that particular tenant.
  2. Role-based access control: Utilize role-based access control (RBAC) to assign roles and permissions to users. Create a custom role that is specific to the desired tenant and assign it to the user. This role should grant access only to the resources and data within that tenant while restricting access to other tenants.
  3. Resource grouping and isolation: Implement resource grouping and isolation mechanisms within your organization’s infrastructure. This involves segregating resources associated with each tenant and ensuring that users can only access resources within their assigned tenant. This can be achieved through resource tagging, virtual private networks (VPNs), or network segmentation techniques.
  4. Identity and access management (IAM): Leverage IAM tools and services provided by your organization’s infrastructure or cloud platform. Configure user identities and access policies to restrict user visibility to specific tenants. This might involve configuring directory services, user groups, or custom policies that enforce tenant-specific access restrictions.
  5. Tenant-specific applications: If you have custom applications or services within your organization, design them to enforce tenant-specific access controls. This way, users accessing these applications will only have visibility and permissions within the designated tenant.
    It’s important to carefully plan and implement these solutions, taking into account the specific requirements of your organization, the available infrastructure, and the tools and services you are using. Consulting with your organization’s IT administrators or security team can help ensure that the appropriate access controls and restrictions are put in place.