# Organisation

1. [Home](https://www.agilicus.com/)
2. Organisation

![Agilicus AnyX Resources Overview: Secure access to ClickOnce applications. Learn how to deploy and manage ClickOnce apps with enhanced security using Agilicus AnyX. Simplify ClickOnce deployment.](https://www.agilicus.com/www/90cf7af9-clickonce.svg)Segmented Ownership

---

## Organisation

An organisation (tenant, project in some other systems) is a span of control, of permissions, of users.

[CONTACT](/contact-us/)

## Organisation

[![](https://www.agilicus.com/www/16cfb265-image-1024x636.png)](https://www.agilicus.com/www/16cfb265-image.png)An organisation (tenant, project in some other systems) is a span of control, of permissions, of users. Each organisation has:

- Identity [Issuers](https://www.agilicus.com/anyx-guide/authentication-issuer/) (for authentication)
- [Administrative](https://www.agilicus.com/anyx-guide/administraive-users/) users (sysgroups)
- [Billing](https://www.agilicus.com/anyx-guide/billing/)

For sophisticated use cases, an Organisation can have sub-organisations. This allows delegating control or segregating use cases.

Organisations can share users (e.g. the same user id can exist in multiple), but they will have unique permissions.

### Unique Identity Issuer

In some cases you will wish a sub-organisation to have a unique set of 'sign-in' options (e.g. on-premise Microsoft Active Directory, or e.g. Sign-in with Yahoo, or a custom identity provider). This also allows a unique theme for the sign-in experience of that sub-organisation.

![](https://www.agilicus.com/www/2d74abb0-image-1024x303.png)    ### Sub-organisation Authentication Policy

Organisations with a unique issuer allow configuring a unique authentication policy for the sub-organisation. When you first access the Authentication Policy page for the sub-organisation, it will show that the policy is inherited.

![](https://www.agilicus.com/www/95b090f3-image-1024x487.png)    To apply your own policy, configure one of the presets:

![](https://www.agilicus.com/www/aea2ab24-image-1024x487.png)    This will then allow you to further configure details of the policy, such as the allow Multi-factor methods:

![](https://www.agilicus.com/www/6c42e431-image-1024x487.png)    ### Audit Records

Each organisation has a set of authentication audit records, indicating who has created an Identity Token (authenticated), from where, when, etc.

Audit records may also be forwarded to external webhooks. This might include a 3rd-party SIEM or logging system.

[![](https://www.agilicus.com/www/9bff47ae-image-1024x545.png)](https://www.agilicus.com/www/9bff47ae-image.png)[![](https://www.agilicus.com/www/2444eec2-image-1024x605.png)](https://www.agilicus.com/www/2444eec2-image.png)---