SecureGate Docs

White-Label

Multi-tenant branding, per-org configuration, data isolation, and how white-label partners use SecureGate

Overview

SecureGate supports white-label deployment through Satschel IAM's multi-tenant organization model. Each white-label partner (org) gets their own branding, domain, feature flags, and data isolation — all running on shared infrastructure.

Branding Configuration

Org-specific branding is resolved at boot time from IAM or environment variables:

SourcePriorityConfiguration
IAM1 (highest)GET /api/v1/orgs/[org]/branding
Environment variables2APP_NAME, APP_URL, APP_LOGO_URL, APP_SENDER_NAME, APP_SENDER_ADDRESS
Defaults3"SecureGate", securegate.dev.satschel.com

Branding sets the hanzo/base Settings.Meta which controls:

  • Admin UI title and logo
  • Email templates (sender name, address, logo)
  • API response metadata
  • Dashboard theming

Per-Org Configuration

Each white-label org can customize:

SettingDescriptionExample
DomainCustom domain for the dashboardsecurity.acme-events.com
LogoLogo URL (wordmark recommended)https://cdn.acme.com/logo.svg
ColorsPrimary and accent colors#1a1a2e, #e94560
FeaturesEnabled feature flagsweapon detection, deepfake, enhance
Detection thresholdsDefault confidence thresholdsface match: 0.65, weapon: 0.30
RetentionData retention period90 days

Domain Routing

White-label domains are routed via Hanzo Ingress SNI-based routing:

security.acme-events.com
    |
    v
Hanzo Ingress (TLS termination, SNI routing)
    |
    v
Hanzo Gateway (resolves org from hostname -> X-Org-Id: acme-events)
    |
    v
Same API Gateway (multi-tenant, stateless)
  1. DNS: Point the custom domain to the Hanzo Ingress load balancer IP.
  2. TLS: Certificates are auto-provisioned via Let's Encrypt.
  3. IAM: Register the domain in the org's IAM configuration.
  4. Gateway: Hostname-to-org mapping resolves the tenant context.

Data Isolation

White-label orgs receive the same isolation guarantees as any tenant:

LevelIsolatedMechanism
OrgBranding, features, billing, encryption rootIAM org config + OEK in HSM
TenantCustomer data, events, embeddingsSeparate SQLite DB + TEK
CustomerFace embeddings, PIIPer-customer CEK
StorageFace crops, enhanced imagesPer-tenant S3 prefix + CEK encryption

A white-label partner cannot access another partner's data. The isolation is enforced at every layer:

  • IAM: JWT contains org claim. Gateway injects X-Org-Id.
  • Database: Each tenant has separate SQLite files.
  • Encryption: Each org has its own OEK in HSM. Each tenant has its own TEK.
  • Storage: S3 prefixes are scoped by tenant ID.

How White-Label Partners Use SecureGate

1. Onboarding

Partner signs white-label agreement
    |
    v
IAM creates org for partner
    +-- Branding (logo, domain, colors)
    +-- Feature flags (which capabilities enabled)
    +-- OEK generated in HSM
    |
    v
Partner gets admin dashboard at their domain
    +-- Create tenants (their customers)
    +-- Configure per-tenant settings
    +-- Manage users and roles

2. Tenant Setup

The partner creates tenants for their customers:

Partner Org: Acme Events
+-- Tenant: Madison Square Garden
|   +-- Events, cameras, attendees
|   +-- Own TEK, own CEK per customer
+-- Tenant: Staples Center
|   +-- Events, cameras, attendees
|   +-- Own TEK, own CEK per customer

3. Daily Operations

  • Partner's operators use the branded dashboard at their custom domain
  • All API calls carry the partner's org context via JWT
  • Events, cameras, and attendees are scoped to the partner's tenants
  • Detection results and timeline data are isolated per-tenant

4. Billing

White-label billing is per-org:

ComponentBilling Model
Platform feeMonthly SaaS fee to partner
Face detectionsPer-detection metered
Enhance jobsPer-job metered
StoragePer-GB for face crops and enhanced images
CamerasPer-concurrent-stream

Self-Hosted Option

For partners requiring on-premises deployment:

  1. Deploy the same K8s manifests to the partner's cluster
  2. Configure IAM to use the partner's IdP (SAML/OIDC federation)
  3. Point Hanzo KMS to the partner's HSM (or use software KMS with reduced security guarantees)
  4. All data stays within the partner's infrastructure

Self-hosted deployments use the same images and configuration as the SaaS deployment. The only differences are infrastructure endpoints (KMS, HSM, S3, IAM).

On this page