Skip to main content
SecureAuthSecureAuth
Multi-Tier Organizations

Identity That Mirrors How Your Business Is Actually Structured.

Holding companies, subsidiaries, reseller tiers, regional divisions — enterprise identity doesn't fit in a flat tenant. SecureAuth gives you an N-level org tree with policy inheritance, delegated administration, and per-node isolation. No workarounds, no duplicated config.

Core capabilitiesN-level hierarchyPolicy inheritanceDelegated adminREST API
The problem with flat tenancy

Single-tenant IAM Can't Model Real Enterprise Structures

Most identity platforms assume a flat organizational model. But enterprises operate as hierarchies — holding companies with subsidiaries, SaaS platforms with customer tenants, global companies with regional divisions. When the IAM can't represent this, teams resort to duplicated tenants, custom SCIM middleware, and manually synced policies — creating drift, audit gaps, and deployment friction that compounds with every new org node.

The SecureAuth difference

One Org Tree — Isolated Tenants, Cascading Policy, Scoped Admin

SecureAuth models your real org structure as a tree with unlimited depth. Each node gets its own user directory, IdP configuration, MFA policy, app catalog, and admin console — all while inheriting parent policy by default. Admins at each level manage only their subtree. The parent retains escalation and override. One platform, one API, one audit pipeline — no duplication.

Where multi-tier matters

Real Environments SecureAuth Is Built For

The organizations with the most complex identity needs aren't edge cases — they're holding companies, SaaS platforms, franchise networks, and any company managing identity across organizational boundaries.

Holding companies

Subsidiaries with autonomy, parent with oversight

A holding company acquires a new subsidiary. The subsidiary has its own IdP, user base, and compliance requirements. With flat IAM, you either force migration (months of disruption) or create a separate tenant (no centralized governance).

SecureAuth approach

Add the subsidiary as a child org node. It keeps its existing IdP and user directory while automatically inheriting parent security policy. Parent admin retains visibility and escalation. Day-one integration, zero migration.

Policy inheritanceParent escalationIdP-per-node
SaaS platforms

Customer tenants with branded, isolated identity

Your SaaS platform needs to give each customer their own branded login, user directory, and admin console. With flat IAM, you duplicate infrastructure per customer — or build a custom multi-tenancy layer on top.

SecureAuth approach

Each customer is an org node with their own branding, SSO config, user directory, and scoped admin. Self-service onboarding lets new customers configure themselves. You manage the platform; they manage their users.

Per-tenant brandingSelf-service onboardingScoped admin
Reseller & partner tiers

Delegated management across partner hierarchies

Your channel partners manage their own sub-customers. Each tier needs admin access to its own scope — but not to sibling partners or the parent org. Flat IAM has no concept of this kind of delegated hierarchy.

SecureAuth approach

Model reseller tiers as nested org nodes. Each reseller admin manages only their subtree — their own sub-customers, users, and policies. Sibling resellers are invisible to each other. You retain top-level oversight across the entire tree.

Subtree isolationDelegated user mgmtPer-org audit
Regional compliance

Different regions, different rules, one platform

Your EMEA division needs EU data residency and GDPR-specific policies. APAC needs localized branding and different MFA requirements. With flat IAM, you either apply the strictest policy globally (poor UX) or manage exceptions manually (audit risk).

SecureAuth approach

Regional divisions are org nodes that inherit global policy but override locally where compliance demands it. EMEA enforces EU data residency; APAC sets local branding and language. The parent enforces what must be universal; regions customize the rest.

Policy overrideRegional brandingEnforce + inherit modes

Policy inheritance engine

Cascading Policy With Per-node Control.

Policies flow from parent to child with four configurable modes. Each org node can inherit, override, or be locked by its parent — giving you centralized governance with local flexibility.

1

Inherit — child uses parent value

Default behavior. Child nodes receive parent policy automatically. No config needed at the child level.

2

Override — child replaces parent value

The child sets its own value for a policy attribute. Useful for regional MFA requirements or session durations.

3

Enforce — parent locks, child cannot change

Critical policies (e.g., MFA required) are locked at the parent level. No child node can weaken them.

4

Merge — combine parent + child values

Additive combination — e.g., allowed IdPs from parent plus child’s own IdP. Both sets apply.

5

Scoped admin with parent escalation

Each org node has its own admin roles, audit trail, and branding. Parent admin can always escalate and act on any child org.

Organization Hierarchy — Policy View
AFApex Financial Group
MFA: EnforcedSession: 12h
RBRetail Banking
Inherits MFASession: 8h
NANorth America
Inherits allIdP: Azure AD
EUEurope Division
EU ResidencyIdP: Okta
UKUK Retail
Inherits EUScoped admin
WMWealth Management
FIDO2 requiredSession: 4h
N-levelOrg hierarchy depth — no hard limit
4Policy cascade modes (inherit, override, enforce, merge)
Per-orgIdP, MFA, branding, admin, audit
0Duplicated tenants or custom sync scripts

Industry solutions

Built For How Your Industry Works

Multi-tier identity governance for the structures that matter in your sector.

Healthcare Systems

Hospital networks with regional facilities, each needing separate compliance scopes, user directories, and EHR access policies — managed from a single platform with HIPAA-grade audit trails per org.

Financial Services

Holding companies with broker-dealer subsidiaries, each requiring distinct MFA policies, FAPI-grade auth for financial APIs, and isolated compliance reporting for regulators.

SaaS Platforms

Give each customer tenant their own branded login, scoped admin console, and isolated user directory. Self-service onboarding so new customers configure themselves.

Retail & Franchise

Central brand identity with local franchise autonomy. Each location gets its own admin, user management, and localized branding while inheriting corporate security policies.

Enterprise M&A

Onboard acquired companies as new org nodes instantly — preserve their existing IdP and user base while inheriting parent governance. No migration, no disruption.

Customer Story
“We replaced 14 duplicated tenants with a single org tree. Policy inheritance eliminated our custom sync scripts, and the scoped admin API let us automate subsidiary onboarding end-to-end.”

Director of Identity Architecture — Fortune 500 Financial Services

See How Much Risk And Revenue Friction Exists In Your Identity Stack

Get a 30-minute technical assessment of your current environment. No pitch deck, just actionable insights.

Book a Technical Assessment