← All insights
Architecture Multi-Tenant 8 min read

One Deployment, Many Operators

How PAM serves multiple operators and brands from a single deployment — with full data isolation, independent compliance, and no cross-contamination.

W
WebPrefer Engineering
March 2026

What multi-tenant means in iGaming

Multi-tenant in most SaaS products means multiple customers sharing the same infrastructure. In iGaming, that description barely scratches the surface. Multi-tenant here means multiple operators — each a licensed entity with its own regulatory obligations — sharing a single platform deployment. Each operator may run multiple brands. Each brand may operate in a different jurisdiction. Each jurisdiction has its own compliance rules, responsible gaming requirements, payment provider restrictions, and reporting obligations.

This is not the same as multiple users on a shared app. An operator in Sweden has different deposit limit enforcement rules than an operator in Ontario. A brand targeting the UK market needs GamStop integration; a brand in Curacao does not. A single operator might run a casino-focused brand and a sportsbook-focused brand, each with different game providers, different bonus structures, different CMS content, and different customer support workflows — all under the same license.

The platform has to support all of this simultaneously. Not by running separate instances. Not by maintaining separate codebases. By running a single deployment that understands the full hierarchy: platform, operator, brand, jurisdiction. Every feature, every rule, every query has to be aware of where it sits in that hierarchy.

Most platforms solve this by deploying separate instances per operator. It works — until you have ten operators, each with three brands, each needing independent upgrades, patches, and monitoring. Then it becomes an operational burden that scales linearly with your customer count. PAM was designed from the start to avoid that trap.

The isolation requirement

Data isolation in a multi-tenant iGaming platform is not a nice-to-have. It is a regulatory requirement. When a support agent for Operator A logs into the back office, they must not be able to see, query, or export any data belonging to Operator B. Not even accidentally. Not even through a reporting tool. Not even through a poorly scoped API call.

This requirement extends deeper than most people expect. A brand's compliance configuration — its deposit limits, its self-exclusion propagation rules, its KYC verification thresholds — must not leak into another brand's configuration. A payment provider integration configured for one operator must not be visible to another operator's admin. A bonus campaign created by one brand must not appear in another brand's CMS.

The isolation is not just about player data. It covers configuration, content, integrations, reports, audit trails, and back-office access. Every layer of the system that stores or serves data has to respect tenant boundaries. And the enforcement cannot happen after the data is retrieved — filtering results in the application layer is not isolation. It is a bug waiting to happen.

What happens when isolation fails

A support agent for Operator A runs a player search and sees results from Operator B. Even if they do nothing with that data, the breach has occurred. The regulator does not care that it was a UI bug or a missing filter. Cross-operator data exposure is a license-threatening event. In regulated markets, the platform vendor is liable — not just the operator. One leaked query can trigger an investigation, a fine, or a suspension. Isolation is not a feature. It is the foundation everything else depends on.

How PAM isolates

PAM enforces tenant isolation at the query level. Every database query is scoped to the current operator and brand context before it executes. This is not a middleware that appends a WHERE clause after the fact. The query is constructed with the tenant scope as a fundamental parameter. Data that does not belong to the current context is never fetched, never loaded into memory, never serialized into a response.

The RBAC (Role-Based Access Control) model enforces these boundaries simultaneously across three surfaces:

The enforcement is structural. It is not a policy that developers remember to apply. It is built into the data access layer itself. A developer writing a new feature does not need to remember to add tenant filtering — the repository layer applies it automatically. Forgetting to scope a query does not produce unscoped results. It produces an error.

Independent configuration per tenant

Isolation is not only about data separation. Each operator and brand needs its own independent configuration — and that configuration must be modifiable without affecting any other tenant on the platform.

In PAM, each operator independently configures:

All of this runs on a single deployment. There is no per-operator infrastructure. There are no per-operator builds. When the platform is updated, every operator receives the update simultaneously — but their configurations remain independent and untouched.

Adding a new operator

Onboarding a new operator to PAM is a configuration task, not a development project. The platform does not change. The deployment does not change. What changes is the configuration layer.

The process follows a predictable sequence:

No code is written. No deployment is triggered. No other operator is affected. The new operator is live on the same infrastructure, with full isolation, within the time it takes to complete the configuration. This is how multi-tenancy should work — the platform scales by adding configuration, not by adding infrastructure.

Trustplay as proof

Trustplay Technology Sweden AB runs on the same PAM deployment model described in this article. Licensed by the Swedish Gambling Authority (Spelinspektionen), regulated, and live. Trustplay operates with full data isolation, independent compliance configuration, and its own back-office access — all on shared infrastructure. This is not a proof of concept or a roadmap item. It is a production system serving real players in a regulated market, demonstrating that single-deployment multi-tenancy works at the level regulators require.

The principle

Multi-tenancy in iGaming is harder than in most industries because the isolation requirements are regulatory, not just operational. A data leak between tenants is not an inconvenience — it is a compliance violation. A configuration bleed between brands is not a bug — it is a licensing risk.

The only architecture that satisfies these requirements without operational overhead that scales linearly with customer count is one where isolation is structural — enforced at the query level, the RBAC level, and the configuration level simultaneously. Where adding a new operator is configuration, not development. Where the platform deployment is singular, but the tenant experience is fully independent.

PAM was built this way from the start. Not because multi-tenancy is a selling point — but because the alternative, deploying and maintaining separate instances per operator, is an operational model that breaks down the moment you have more than a handful of customers. Single deployment, full isolation, independent configuration. That is how you scale an iGaming platform without scaling your infrastructure team at the same rate.

Share this insight
Share on LinkedIn
Preview post text
More insights
Get in Touch

Ready to see it?

We offer live demos scoped to your specific operation type — whether you're launching a new brand, migrating from an existing platform, or evaluating options for a white-label deployment.

Address
Wahlbecksgatan 8, 582 13 Linköping, Sweden
Mikael Lindberg Castell
mikael@webprefer.com
CEO & Founder, WebPrefer AB