

The client domains feature enables Relativity
Using client domains,
Note: Client Domains are targeted for the above use case only and it is important to consider all the limitations outlined in
Implementing client domains requires an additional license from Relativity ODA LLC. Each client domain license is unique, and client domains can have different terms encoded on their license keys. The license for a client domain is unrelated to any other license for Relativity (e.g., number of seats). Client domain licenses are not transferable from one client to another.
Note: Client domains (formerly multi-tenancy) requires Relativity version 9.1 or later.
See the following related pages:
You're approached by an Enterprise customer who wants to use your services to facilitate an important litigation. The customer wants to be able to add and remove users, matters, groups, and workspaces as needed throughout the litigation process without having to contact a system admin. They also want to be sure that other clients in the environment don't have visibility to the objects related to their case.
You create the client in Relativity (verifying that no workspaces are currently assigned to the client and then submit a RelativityOne request via the Community site as detailed in the following knowledge article.
You assign the resource pools available to the client. Next, assign existing workspaces or create new workspaces under the new client domain-associated client record. Finally, you can add the users the client has elected to be client domain admins to their client domain admin group. Now the client domain admins can add and remove users, groups, matters, and workspaces as needed, and other clients in the environment can't view or edit any of the objects within the client domain, unless they are system admins or have been granted this permission by a system admin.
Consider the following before enabling client domains:
Note: You must set the
Note: The Everyone - [Client's Name] group should not be assigned as the workspace administrator group for a given workspace that is part of a Client Domain.
Note: Permissions assigned to groups override client domain isolation. If a non-client domain group has permissions to see a client domain's workspace or users, then those non-client domain users in the non-client domain group can still access client domain items. Enabling client domains does not change previously configured item level security settings applied to any objects within the client domain.
Note: After enabling client domains, system administrators needing to make group or permission changes should be extra cautious and thoroughly investigate the potential impact to client domain separation before implementing any new group/permission changes.
To enable client domain on a client, you first generate a client domain request key in Relativity.
After you receive an activation key from us, you enable client domains by applying it to the client.
Note: You must select the client that you originally used to generate the request key. If you attempt to apply the activation key to a different client, Relativity displays an error message.
Note: If Relativity displays an error message, verify that you copied the activation key correctly. Contact Customer Support if you have any questions about applying your activation key.
Once client domains functionality is enabled for the client, you must assign a client domain admin.
Client domain admins are essentially workspace admins for workspaces within the client domain. Any limitations are based on the permissions you set for the user group in Relativity that the client domain admin belongs to. The administrative actions available to client domain admins are only in the scope of the client domain. For example, client domain admins can edit or delete users belonging to that client domain, but they cannot do the same action for users part of a different client domain or users not associated with a client domain.
Client domain admins can do things like:
Consider the following when assigning a client domain admin:
We recommend users review Client Domain, and other Administrative type permissions for item-level security based on the workflow within your instance. Relativity recommends applying item-level security to all views for the following types within the Admin landing page, removing access from all non-administrative users:
Authentication Provider
Note: Client Domain specific views can be used and configured to enable Client Domain administrators to configure and view their own users more easily. Ensure you have properly reviewed and tested all relevant permissions before doing so.
Authentication Provider Type
Code
Errors
Resource Pools
Resource Servers
The following table provides a breakdown of the default instance permissions for a client domain admin:
Group | Permission | Type |
---|---|---|
Client Domain Admin for <Client> | View Admin Repository | Admin Operations |
Client Domain Admin for <Client> | Add Matter | Add |
Client Domain Admin for <Client> | Add User | Add |
Client Domain Admin for <Client> | View View | View |
Client Domain Admin for <Client> | View Choice | View |
Client Domain Admin for <Client> | Add Group | Add |
Client Domain Admin for <Client> | Add Workspace | Add |
Client Domain Admin for <Client> | View Error | View |
Client Domain Admin for <Client> | Add Error | Add |
Client Domain Admin for <Client> | Edit Error | Edit |
Client Domain Admin for <Client> | View Relativity Script | View |
Client Domain Admin for <Client> | View Server | View |
Client Domain Admin for <Client> | View Tab Type | View |
Client Domain Admin for <Client> | Authentication Provider* | View |
Client Domain Admin for <Client> | Login Method | View, Edit, Delete, Add |
* The View Authentication Provider permission is required for Client Domain admins to add login methods to their users. Because the Authentication Provider object is not client-bound, it is highly recommended that you apply item-level security to ensure that Client Domain admins can see only the necessary Authentication Providers.
Once you enable client domains on a client, you must assign a client domain admin.
Use the following steps to assign a client domain admin.
A system admin can make any user a client domain admin by adding them to the client domain admin group. You can tailor the permission settings of a client domain admin group the same way you manage permissions for all other groups. See Setting instance permissions for more information. See Client domain admin considerations for more information on default permissions.
The following items are features and operations that are not available when using client domains (if a feature or operation isn't listed, it is available when using client domains):
The following items are features and operations that are have limitations in client domains or can only be used or performed by top-level system admins or a Relativity staff resource.
Note: If a feature, capability, or operation isn't listed, then there are no limitations on them when using client domains. For example, Relativity Legal Hold isn't listed and has full functionality when operating client domains.
Item |
Limitation |
Client domain admin |
System admin |
---|---|---|---|
Client domains setup and configuration |
|||
SSO setup |
A system admin can configure client domain user accounts to use an SSO provider provided that the provider is configured correctly. |
No access |
Yes |
Client domain setup |
|
No access |
No access |
Instance settings |
Not available per client domain. |
No access |
No access |
Feature access |
|||
ARM |
ARM is not available to Client Domain Admins. Note: ARM archives can be restored directly to a client domain. |
No access |
Has access |
Creating / editing Relativity scripts |
Not available to Client Domain Admin.
|
No access |
Has access |
Migrate | Migrate (similar to ARM) is supported for client domains, but migrations can only be performed by a Relativity System Admin. Migrate cannot be used by a client domain administrator due to security restrictions. | N/A | Has access |
Relativity applications |
|
No access |
Has access |
SFTP for Data Transfer | SFTP is not available for client domain users. | No access | Has access |
Tabs | We do not recommend entering sensitive data in a tab name because it cannot be secured with client domains. | Has access | Has access |
User and Group Synchronization application | The User and Group Synchronization application is not compatible with Client Domains. | No access | Has access |
View, edit or cancel jobs / queues |
Jobs / queue status not available to Client Domain Admins. Since client domain admins can't see or modify jobs in the queue, a system admin may need to inform client domain admins of the status of jobs they've start or if the job is still waiting in the queue. |
No access |
Has access |
Views | We do not recommend entering sensitive data in a view name because it cannot be secured with client domains. | Has access | Has access |
Workspace Portal |
The Workspace Portal tab is not be accessible by default to client domain users. Permissions to view this tab can be technically be granted to client domain admins. However, adding a non-admin client domain group to the necessary instance level permissions violates client domain security restrictions for this group. |
No access | Has access |
Any workspaces, users, groups, matters,
See the following pages for more information on moving objects to and from client domains:
Why was this not helpful?
Check one that applies.
Thank you for your feedback.
Want to tell us more?
Great!