Overview
RAXE supports multi-tenant deployments where a single installation serves multiple customers, each with their own security policies. This is ideal for:- CDN/Platform Providers: Serve multiple customers from a central router
- Enterprise Organizations: Different divisions with different security requirements
- SaaS Applications: Per-customer policy customization
Quick Start
Policy Modes
RAXE provides three built-in policy presets:Monitor
Never blocksLogs all detections for analysis. Perfect for new deployments and learning phases.
Balanced
Smart blockingBlocks CRITICAL always, blocks HIGH with confidence ≥ 0.85. Recommended for production.
Strict
Maximum protectionBlocks CRITICAL, HIGH, and MEDIUM severity. For high-security environments.
Entity Hierarchy
Policy Resolution
When scanning, RAXE resolves the effective policy using this fallback chain:1
Request Override
If
policy_id is passed to scan(), use that policy2
App Default
If the app has a configured default policy, use it
3
Tenant Default
If the tenant has a configured default policy, use it
4
System Default
Fall back to
balanced modePolicy Attribution
Every scan result includes policy attribution for billing and audit:CLI Usage
Tenant Management
App Management
Policy Management
SDK Multi-Tenant Scanning
Basic Usage
Gateway/Router Pattern
For CDN providers or API gateways routing requests for multiple customers:Per-Request Override
Tenant-Scoped Suppressions
Each tenant can have their own false positive suppressions:JSON Output
All commands support--output json for automation:
Limits (Community Edition)
| Resource | Community | Enterprise |
|---|---|---|
| Tenants | 5 | Unlimited |
| Apps per tenant | 10 | Unlimited |
| Custom policies | 3 per tenant | Unlimited |
Best Practices
Start with Monitor Mode
Start with Monitor Mode
Deploy new tenants in monitor mode to build detection baselines before enabling blocking.
Use App-Level Policies
Use App-Level Policies
Configure policies at the app level for granular control. Different apps may have different risk tolerances.
Check Policy Attribution
Check Policy Attribution
Always log
effective_policy_id and resolution_source for debugging and audit trails.Tenant-Scope Suppressions
Tenant-Scope Suppressions
Keep suppressions tenant-scoped to avoid cross-tenant effects.
