Control who, what, when and where
for all of your users, tenants, and clouds

Control cloud access via RBAC for groups and policies in Morpheus

Apply fine-grained access control

Roles determine Feature, Cloud, and Catalog access. Entire UI and API sections can be disabled based on access levels. 

Morpheus supports authentication and role mapping via identity management integration to Active Directory, Azure AD, SAML, OKTA, etc. including SSO and MFA.

Integrate identity management providers with Morpheus to map cloud control to user types.

Organize clouds into groups

Define access by adding clouds to groups which could represent projects, development phases, or organizational units.

Group permissions apply to resources like networks, data stores, resource pools, and folders.  Lifecycle, usage, and compliance policies get assigned to complete the RBAC picture.

Example of Morpheus white label interface.  Control how tenants view the cloud management portal.

Share multi-tenant resources

Tenants can have their own identity providers, white label settings, user roles, and clouds defined.

Morpheus can even add multi-tenant sharing to typically single-tenant platforms like VMware ESX and Nutanix AHV.

For example, add a VMware cluster to the master tenant then split access securely across isolated tenants including storage and network access.

Learn how Morpheus enabled secure cloud access for
a multi-country European satellite agency

A powerful policy engine to help everyone sleep well at night

Scope policies to Users, Roles, Groups, Clouds, Tenants and Global to give Admins full control of their hybrid and multi-cloud environments. 

  • Lifecycle Policy

    Naming, Provisioning Approval, Expiration, Shutdown, Removal, Power Schedules, etc.

  • Usage Policy

    Max containers, cores, memory, storage, VMs as well as budgets and resource quotas.

  • Compliance Policy

    Tag enforcement, User Creation, User Groups, Backups, Delayed Removal, Message Alerts, etc.

  • Workflow Policy

    Force execution of workflows to apply custom policies for security, compliance, and more.

X