Quick Summary
How to use this template
This page is meant to be scanned quickly and then adapted to your own system.
- Use the live diagram as a starting point, not a final answer.
- Focus first on the main actors, systems, and critical dependencies.
- Adapt the model to your product, team boundaries, and technical constraints.
How to Build Template 5: Multi-Tenant SaaS Platform
This template shows how to model a multi-tenant SaaS platform at the System Context level. It is especially useful when you need to explain how one product simultaneously serves many distinct customers — called tenants — while maintaining the data isolation, access controls, billing boundaries, and compliance postures that each tenant expects.
Multi-tenancy is one of the most broadly applicable architectural patterns in modern software. Whether you are building project management tools, CRM systems, HR platforms, developer tooling, vertical industry software, or data analytics products, the structural challenges are the same: one codebase and one infrastructure serving hundreds or thousands of organizations, each of whom expects their data to be invisible to others, their identity model to integrate with their corporate directory, and their billing to match their contract.
Getting the three-layer actor model visible in the first diagram is the most important thing this template does. The distinction between a platform administrator, a tenant administrator, and an end user is not just a permission level — it is a fundamentally different relationship with the system, with different goals, different workflows, different support needs, and different failure consequences.
What This Template Shows
- Three distinct user populations with fundamentally different relationships to the platform
- Tenant administrators governing access, configuration, and policy within their organization's boundary
- End users performing their daily work inside the product, unaware of and uninterested in the multi-tenancy infrastructure beneath them
- Platform operations administrators who manage the entire service across all tenants
- The identity, billing, analytics, support, audit, and notification systems that are the non-negotiable dependencies of a production SaaS business
This is the right level when you want to explain the business and control boundary of a SaaS platform before any conversation about tenancy models, database isolation strategies, or service decomposition.
Embedded Diagram
Why This Context Diagram Works
The most important signal this diagram delivers is that not all users are equal — and not in the usual sense of permissions. The three actor populations have fundamentally different goals:
End users want to get their work done. They think of the product as a tool. They are largely unaware that it is serving other organizations simultaneously. Their experience should be fast, reliable, and contained within their tenant's context. If an end user at Company A can see Company B's data, the platform has failed at its most fundamental promise.
Tenant administrators want to govern their organization's use of the product. They configure which users have access, what roles they hold, how the product integrates with their corporate identity provider, what data can be exported, and what the audit trail looks like. For compliance-sensitive tenants (financial services, healthcare, legal), the administrator's ability to run access reviews, download audit logs, and enforce data retention policies is not a nice-to-have — it is a procurement requirement. The platform must make these capabilities first-class, not an afterthought.
Platform operations administrators want the entire service to be healthy across all tenants. They provision new tenants, manage plan and limit changes, investigate cross-tenant issues (a noisy tenant consuming disproportionate resources, a spike in errors from one tenant's integration), and operate the infrastructure. Critically, platform administrators can see across tenant boundaries in ways no tenant administrator can — which means their access must be controlled, audited, and exercised only through defined operational interfaces.
The diagram also surfaces the systems that become architectural constraints as the product grows beyond its initial user base:
- Identity federation becomes mandatory once enterprise customers want SSO. It is not a feature request — it is a blocker for signing contracts with companies that require their employees to authenticate exclusively via the company directory.
- Subscription and billing infrastructure becomes complex as soon as the product has more than one pricing plan, usage-based charges, annual versus monthly billing, multi-seat licensing, or contract-based pricing. Attempting to build this in-house is almost always a mistake.
- Audit logging becomes a legal requirement for tenants in regulated industries. A healthcare tenant needs to prove who accessed what data and when. A financial services tenant may need to demonstrate that only authorized users viewed certain records.
Core Elements To Include
People
Tenant Administrator The organizational owner of the platform deployment within their company. In a typical B2B SaaS product, this role is held by an IT administrator, a department head, or a designated system administrator. Their responsibilities include: provisioning and deprovisioning user accounts within the tenant, configuring the integration between the platform and the company's identity provider (SAML or OIDC configuration for SSO), setting role-based access policies that govern what different user groups can do, managing API keys and integrations with other tools the company uses, reviewing audit logs for access anomalies, and controlling data export or deletion requests. For enterprise customers, the tenant administrator is often the person who signed off on the security review and vendor evaluation — they care deeply about data residency, encryption, access controls, and audit capabilities.
End User The day-to-day user of the product. End users rarely know or care about the multi-tenancy architecture. They log in (through their company's SSO provider if federation is configured), do their work, and log out. Their experience must be scoped entirely within their tenant — they should never see other tenants' data, other tenants' users, or any indication that the product serves other organizations. End user experience depends on the platform being fast (shared infrastructure must not allow noisy neighbors to degrade performance), reliable (a failure in one tenant's unusual usage pattern should not affect other tenants), and consistent with their company's access policies.
Platform Operations Administrator The internal Uxxu / platform team member responsible for the health of the entire service. Platform admins provision new tenant accounts, manage plan changes, investigate platform-level incidents, respond to billing and contract issues escalated from the support team, and operate the infrastructure. They have cross-tenant visibility that no customer user has — they can look at any tenant's configuration, resource consumption, and error rates. This elevated access must be exercised through defined operational tooling, logged exhaustively, and subject to internal access control policies to prevent misuse.
Main System
Multi-Tenant SaaS Platform The central product. It enforces tenant isolation across all layers — data storage, caching, background jobs, and API responses. It presents a single product experience to end users that is scoped to their tenant context. It exposes a tenant administration interface for configuring access, integration, and policy. It provides a platform operations interface for managing the service across all tenants. All of this happens in a single deployed system — tenants are logical partitions, not separate deployments (in a shared-infrastructure multi-tenancy model), which is what creates the efficiency and the complexity simultaneously.
External Systems
Identity Provider / SSO (Auth0 / Okta / Azure AD) Identity federation is the defining external system for enterprise SaaS. When a tenant wants their employees to log in using the company's existing directory — Microsoft Entra ID, Okta, Google Workspace, or a custom SAML identity provider — the platform must support SAML 2.0 or OIDC federation. This means: the tenant administrator configures the SAML metadata or OIDC configuration in the platform's tenant settings, the platform registers as a Service Provider in the tenant's identity provider, and user sessions are established via the IdP's authentication flow. From the end user's perspective, they click "Log in with SSO" and are redirected to their company login page — they never set a password in the SaaS platform. For the platform, this shifts authentication responsibility to the IdP but introduces complexity: the platform must handle IdP-initiated flows, session lifetime management aligned with the IdP's policies, and group-to-role mapping (so that Active Directory groups become platform roles automatically). Auth0 and Okta provide enterprise connection management that abstracts the per-tenant IdP configuration complexity.
Billing Platform (Stripe Billing / Chargebee / Zuora) Subscription billing for SaaS is significantly more complex than one-time e-commerce payments. A mature SaaS billing model includes: monthly and annual subscription plans with annual discounts, seat-based pricing where the charge depends on the number of active users, usage-based pricing where the charge depends on consumption metrics (API calls, storage, events processed), mid-cycle upgrades and downgrades with prorated charges, trial periods with automatic conversion, tax calculation and invoicing for multiple jurisdictions, dunning management for failed payments (retries, grace periods, account suspension), and enterprise contracts with custom payment terms. Attempting to build all of this in-house diverts enormous engineering capacity from the product. Stripe Billing, Chargebee, and Zuora all provide configurable billing engines designed for SaaS scenarios. Chargebee and Zuora add revenue recognition and financial reporting capabilities important for SaaS companies at scale.
Support CRM (Zendesk / Intercom / HubSpot Service) Support tooling for multi-tenant SaaS must be aware of tenant context. When a support ticket arrives, the support agent needs to know: which tenant the user belongs to, what plan the tenant is on, what their recent activity was, whether there are open incidents affecting their region, and the history of prior support interactions for that tenant. This context typically requires integration between the support platform and the SaaS product — ticket creation enriched with tenant metadata, the ability for support agents to log in as the tenant for troubleshooting, and automated escalation based on tenant tier. Intercom is popular for in-product chat support with built-in user context. Zendesk is dominant for ticketing-based support workflows.
Product Analytics Platform (Amplitude / Mixpanel / PostHog) Product analytics in a multi-tenant context must be handled carefully: individual tenant data must be kept private, but aggregate behavioral insights across the user population are essential for product decisions. The analytics platform receives events from the product — feature usage, workflow completion rates, error events, session lengths — and provides funnel analysis, retention cohorts, A/B test results, and feature adoption metrics. For internal business analytics, events are also routed to a data warehouse where tenant-level aggregations can be run for customer success reporting and expansion revenue identification.
Audit Logging / SIEM (Splunk / AWS CloudWatch / Datadog) Every significant action in the platform — user login, data access, configuration change, data export, permission change — must be written to an audit log with the actor identity, timestamp, tenant context, and action details. This is required for tenants in regulated industries and is increasingly a standard enterprise procurement requirement regardless of regulation. Audit logs must be tamper-evident, retained for defined periods (often 1–3 years for enterprise tenants), and exportable by tenant administrators for their own compliance reviews. On the platform side, the same audit infrastructure enables security incident investigation and anomaly detection.
Notification Delivery (SendGrid / AWS SES / Postmark) Outbound notifications from a multi-tenant SaaS platform must be correctly attributed: emails must arrive from a domain the tenant's users trust, with content that reflects the tenant's context. For basic notifications, the platform sends from its own domain. For enterprise tenants, custom email domains (where emails arrive from the tenant's own domain) may be a product requirement. Transactional notification types include: invitation emails for new users, password reset flows (for non-SSO tenants), in-app notification digests, billing receipts and invoices, usage alerts when approaching plan limits, and system status notifications during incidents.
Tenant Isolation as an Architectural Contract
Tenant isolation is not a feature — it is the foundational contract of multi-tenancy. Every architectural decision in the platform must be evaluated against this contract.
Data isolation is the most critical layer. Depending on the tenancy model chosen, isolation is enforced through separate databases per tenant (silo model — maximum isolation, maximum cost), a shared database with tenant-keyed schemas (bridge model), or a shared database with tenant ID columns on every table with row-level security policies enforced at the database or ORM layer (pool model — minimum cost, maximum care required). The pool model is the most common for SaaS products at scale, but it requires rigorous enforcement: every data access query must include a tenant ID filter, and the absence of that filter is a data leak waiting to happen.
Compute isolation matters at scale. A tenant running an expensive bulk export or a poorly-optimized query should not degrade response times for other tenants. This requires rate limiting, job queue prioritization by tenant tier, and query timeout enforcement.
Configuration isolation is often overlooked. Tenant-specific settings — feature flags, integration configuration, role definitions, API rate limits — must be stored and applied consistently per tenant. A misconfigured feature flag that leaks a preview feature to the wrong tenant, or a misconfigured rate limit that gives one tenant an unintended advantage, are both isolation failures.
How To Adapt It
You can specialize this template for many B2B product types:
- B2B workflow software (project management, CRM, HR): keep the full shape as described. Tenant isolation and SSO are the defining concerns.
- Vertical SaaS (legal practice management, veterinary clinic software, dental billing): add a domain-specific regulatory system — state bar licensing API, veterinary drug database, insurance clearinghouse — as an additional external system.
- Internal enterprise platforms (developer portals, internal tooling): remove the billing platform if the tool is cost-center funded rather than subscription-based. Add an enterprise SIEM integration and tighten audit logging requirements.
- Partner portals with delegated administration: add a Partner tier between the platform administrator and the tenant administrator. Partners provision and manage multiple tenant accounts on behalf of their clients.
If your tenants do not bring their own identity provider — common in SMB-focused SaaS — simplify the SSO component to email-and-password authentication with optional MFA, and note that SSO is a future enterprise tier requirement.
When To Use This Template
Use this template when you need to explain:
- who the product actually serves, and why platform administrator, tenant administrator, and end user are three structurally different actors with different goals
- where tenant responsibilities begin and end, and how that boundary shapes product design decisions
- why identity federation is a contract-blocking enterprise requirement, not a roadmap nice-to-have
- how subscription billing, audit logging, and support tooling become first-class architectural dependencies as the product grows beyond early adopters
- how tenant isolation is enforced as an architectural contract, not just a permission check
- why a SaaS platform is more complex than a single-tenant application even when the product surface looks identical