Encryption Keys
Per-organization encryption keys. One org’s tokens cannot be decrypted with another org’s key.
Fp Switchboard supports multi-tenant isolation through organizations. Each organization has its own users, encryption keys, service access controls, and audit logs.
user@acme.com maps to acme.comorg_domains table returns the org_idorg_id — users only see their own org’s data| Role | Scope | Capabilities |
|---|---|---|
| Platform Admin | All organizations | Create/manage orgs, view all data, manage all users, configure platform settings |
| Org Admin | Own organization | Manage org users, view org audit logs, configure DLP, manage service access |
| User | Own data | Connect services, generate tokens, view own usage and activity |
| Flag | Table | Effect |
|---|---|---|
is_platform_admin = 1 | users | Full platform access, bypasses org filtering |
is_super_admin = 1 | users | Org-level admin for their organization |
| Neither flag | users | Standard user with own-data access |
Organizations can restrict which services their users can access:
organizations.allowed_services (JSON array)user_service_access tableEach organization’s data is cryptographically separated:
Encryption Keys
Per-organization encryption keys. One org’s tokens cannot be decrypted with another org’s key.
Database Isolation
All database queries include org_id filter. Cross-organization data access is structurally impossible.
Audit Logs
Audit trails are org-scoped. Org admins see only their organization’s activity.
DLP Configuration
DLP patterns, overrides, and allowlists are configured per-organization.
Platform admins create organizations through the admin panel:
| Domain | Organization |
|---|---|
acme.com | Acme Corp |
acme.co.uk | Acme Corp |
partner.io | Partner Inc |
Multiple domains can map to the same organization. A domain can only belong to one organization.
Org admins can:
| Feature | Org-Scoped? | Details |
|---|---|---|
| Encryption keys | Yes | Separate AES-256-GCM keys per org |
| DLP patterns | Yes | Custom pattern overrides and allowlists |
| Service access | Yes | Allowed services list per org |
| Audit logs | Yes | Org admins see org-only logs |
| Usage metering | Yes | Per-org usage tracking and analytics |
| Bundle templates | Yes | Org-scoped templates visible to org members only |
| Credential storage | Yes | Some services use org-level credentials (shared OAuth apps) |
Some services use org-level credentials (a shared OAuth app configured once by an admin), while others use user-level credentials (each user connects individually):
| Credential Type | Services | Who Configures |
|---|---|---|
| Org-level | Cloudflare, n8n, ManyChat, Fathom, WordPress, Sage, WhatsApp, Fathom AI, n8n MCP, Fp Design | Org admin or platform admin |
| User-level | Google, Slack, Notion, HubSpot, GitHub, Jira, Microsoft 365, and others | Each user individually |