Skip to main content

About domains

Domains are used to segregate your ThingPark Enterprise subscription to serve multiple tenants and restrict the visibility of base stations, devices, multicast groups and connections by non-administrator users. Each tenant would have access to resources bound to their perimeter. The visibility restriction also applies to the related traffic and alarms.

Regarding connections, two use cases are supported:

  • Cross-domain connections: when a connection is shared by all tenants, it must not be associated with any domain to remain cross-domain.
  • Domain-specific connections: when a connection is managed by a specific tenant, its visibility must be restricted to this tenant using domains.

News, catalogs and the license cannot be associated with domains and therefore remain cross-domain and shared by all tenants.

note

Regardless of the associated domains, every base station operating under the ThingPark Enterprise subscription continues to serve LoRaWAN® traffic from any device under this same subscription without any exclusion.

The following video gives you a quick outlook of domains and shows you the key steps to have your segregation use case up and running:

Important Note

Tags and domains are 2 distinct attributes supported by devices and base stations. The main differences are summarized in the following table:

TagsDomains
UsageLike free-text stickers, essentially used for resource categorization and filtering.

Additionally, base station tags may be used for multicast purposes.

Device tags are reported through connections to external IoT applications to allow segregated traffic processing.
User permission management.

Note The domains associated with each device are also reported through connections.
Who can assign it?Freely assigned by administrator and non-administrator users having write access to the resource in question.Only pre-defined domains (created by an administrator user) can be associated with resources.

While administrator users can associate a resource with any domain (except assigning several domains from the same group), non-administrator users can only assign domains in accordance with their own domain restrictions.
Can be used for permission management?No, because tag addition/removal is freely opened for non-administrator users so it cannot be controlled by administrator users.Yes, because domains are strictly controlled by administrator users.

Basic segregation

A typical example of segregation is the segregation based on geographical location. In this example, one domain is created for each possible geographical location as illustrated in the figure below.

Basic segregation

Each domain is represented by a green badge in the above domains list. Domains are grouped in a Geography domain group that materialize the segregation based on geographical location.

Each base station, device, multicast group and connection can be associated with at most one domain matching its geographical location.

The visibility of these resources can be restricted by configuring a domain restriction for non-administrator users. A domain restriction is composed of an exact domain or a domain prefix. In the latter case, hierarchical domain names must be defined by using the / character to define a parent/child hierarchy.

When a domain restriction is configured in a non-administrator user account, only the following base stations, devices, multicast groups and connections are visible to the user:

  • Base stations, devices, multicast groups and connections whose domain matches the domain restriction;
  • Cross-domain connections (connections without any domain).

Administrator users cannot have a domain restriction and always have access to all the resources of the subscription.

The following table provides an example of visibility rules depending on the configured domain restriction.

User scopeDomain restrictionVisible resources
Operates IoT network in GermanyEMEA/Germany- Base stations, devices, multicast groups and connections associated with the EMEA/Germany domain.
- All cross-domain connections.
Operates IoT network in USAUSA- Base stations, devices, multicast groups and connections associated with the USA/East-Coast domain or the USA/West-Coast domain.
- All cross-domain connections.
Operates IoT network worldwideNo domain restriction- All base stations, devices, multicast groups and connections regardless of associated domains.
- All cross-domain connections

Advanced segregation with more than one domain group

More advanced segregation can be achieved by adding domain groups to introduce additional segregation scopes (i.e. segregation dimensions). For example, resources can be partitioned based on the use-case in addition to the geographical location, as illustrated in the figure below.

Advanced segregation with more than one domain group

A second Use-case domain group is created to materialize the segregation based on the use-case. In this domain group, one domain is created for each possible use-case. These new domains are represented by orange badges in the above domains list. Each domain group may be assigned a distinct color to be easily identifiable.

In the example above (with 2 domain groups), each base station, device, multicast group and connection can be associated with at most two domains (one from each group):

  • At most one domain belonging to the Geography domain group: this domain matches the geographical location of the resource.
  • At most one domain belonging to the Use-case domain group: this domain matches the use-case of the resource.
note

Each domain belongs to a domain group. A domain group defines a segregation scope. All the domains grouped under the same scope are mutually exclusive to avoid segregation conflicts, i.e., a given resource cannot be associated with more than one domain from the same group. For instance, a device cannot be associated with both EMEA/France/Paris and EMEA/Germany domains that are grouped under the same Geography domain group.

In the same way, each non-administrator user can be associated with at most two domain restrictions:

  • At most one domain restriction matching an exact domain or a domain prefix in the Geography domain group. If defined, only resources associated with a Geography domain matching the domain restriction are visible by the user. Otherwise, no restriction applies regarding the Geography domain group.
  • At most one domain restriction matching an exact domain or a domain prefix in the Use-case domain group. If defined, only resources associated with a Use-case domain matching the domain restriction are visible by the user. Otherwise, no restriction applies regarding the Use-case domain group.
Important note

Domain restrictions may consist of several domains or domain prefixes, but they must belong to distinct domain groups. For each domain group, only the resources matching the related domain restriction can be accessed by the user.

If no domain restriction is defined for a given domain group, the user does not have any restriction for this group.

The following table provides an example of visibility rules depending on configured domain restrictions.

User scopeDomain restrictionsVisible resources
Operates IoT network in Paris for the Asset Tracking use-caseEMEA/France/Paris, Asset Tracking- Base stations, devices, multicast groups and connections associated with both EMEA/France/Paris domain and Asset Tracking domain.
- All cross-domain connections.
Operates IoT network in Germany for all use-casesEMEA/Germany- Base stations, devices, multicast groups and connections associated with the EMEA/Germany domain regardless of associated domain in the Use-case domain group.
- All cross-domain connections.
Operates IoT network in USA for the Smart Building use-caseUSA, Smart BuildingBase stations, devices, multicast groups and connections associated with the USA/East-Coast domain or the USA/West-Coast domain, and the Smart Building domain.
- All cross-domain connections.
Operates IoT network worldwide for all use-casesNo domain restriction- All base stations, devices, multicast groups and connections regardless of associated domains.
- All cross-domain connections.

Interaction with user's roles

When domain restrictions are defined for a non-administrator user, the access rights granted by the user's roles only apply to the resources matching the domain restrictions. All other resources are not accessible at all.

All resources added or updated by a non-administrator user must match the domain restrictions. For example, if the user has the Base stations manager role:

  • Base stations added by the user must match his/her domain restrictions to be successfully provisioned in the system. In other words, a user is not authorized to add a resource that does not comply with its own domain restrictions, otherwise this same user will not be able to access it afterwards.
  • Likewise, updating the domains associated to a base station by the user must match his/her domain restrictions before and after the targeted update.
  • Base stations deleted by the user must match his/her domain restrictions before it can be deleted.

A special case applies to connections without domains that remain cross-domain:

  • Cross-domain connections are visible to all users having the Viewer role regardless of their domain restrictions.
  • Cross-domain connections can only be added, updated or deleted by users having the Devices, multicast groups and connections manager role and no domain restrictions.