Warning

You are reading a development version of the Zulip documentation. These instructions may contain changes that are not yet present in a supported Zulip Server release. See documentation for the latest stable release.

Hosting multiple organizations

The vast majority of Zulip servers host just a single organization (or “realm”, as the Zulip code calls organizations). This article documents what’s involved in hosting multiple Zulip organizations on a single server.

Throughout this article, we’ll assume you’re working on a Zulip server with hostname zulip.example.com. You may also find the more technically focused article on realms to be useful reading.

Subdomains

Zulip’s approach for supporting multiple organizations on a single Zulip server is for each organization to be hosted on its own subdomain. E.g. you’d have org1.zulip.example.com and org2.zulip.example.com.

Web security standards mean that one subdomain per organization is required to support a user logging into multiple organizations on a server at the same time.

When you want to create a new organization, you need to do a few things:

  • Make sure you have SSL certificates for all of the subdomains you’re going to use. If you’re using our Let’s Encrypt instructions, it’s easy to just specify multiple subdomains in your certificate request.

  • If necessary, modify your nginx configuration to use your new certificates.

  • Use ./manage.py generate_realm_creation_link again to create your new organization. Review the install instructions if you need a refresher on how this works.

  • If you’re planning on using GitHub auth or another social authentication method, review the notes on SOCIAL_AUTH_SUBDOMAIN below.

SSL certificates

You’ll need to install an SSL certificate valid for all the (sub)domains you’re using your Zulip server with. You can get an SSL certificate covering several domains for free by using our Certbot wrapper tool, though if you’re going to host a large number of organizations, you may want to get a wildcard certificate. You can also get a wildcard certificate for free using Certbot, but because of the stricter security checks for acquiring a wildcard cert, it isn’t possible for a generic script like setup-certbot to create it for you; you’ll have to do some manual steps with your DNS provider.

Other hostnames

If you’d like to use hostnames that are not subdomains of each other, you can set the REALM_HOSTS setting in /etc/zulip/settings.py to a Python dictionary, like this:

REALM_HOSTS = {
    "mysubdomain": "hostname.example.com",
}

This will make hostname.example.com the hostname for the realm that would, without this configuration, have been mysubdomain.zulip.example.com. To create your new realm on hostname.example.com, one should enter mysubdomain as the “subdomain” for the new realm.

The value you choose for mysubdomain will not be displayed to users; the main constraint is that it will be impossible to create a different realm on mysubdomain.zulip.example.com.

In a future version of Zulip, we expect to move this configuration into the database.

The root domain

Most Zulip servers host a single Zulip organization on the root domain (e.g. zulip.example.com). The way this is implemented internally involves the organization having the empty string ('') as its “subdomain”.

You can mix having an organization on the root domain and some others on subdomains (e.g. subdivision.zulip.example.com), but this only works well if there are no users in common between the two organizations, because the auth cookies for the root domain are visible to the subdomain (so it’s not possible for a single browser/client to be logged into both). So we don’t recommend that configuration.

Changing subdomains

You can change the subdomain for an existing organization using a management command. Be sure you understand the implications of changing the organization URL before doing so, as it can be disruptive to users.

Authentication

Many of Zulip’s supported authentication methods (Google, GitHub, SAML, etc.) can require providing the third-party authentication provider with a whitelist of callback URLs to your Zulip server (or even a single URL). For those vendors that support a whitelist, you can provide the callback URLs for each of your Zulip organizations.

The cleaner solution is to register a special subdomain, e.g. auth.zulip.example.com with the third-party provider, and then set SOCIAL_AUTH_SUBDOMAIN = 'auth' in /etc/zulip/settings.py, so that Zulip knows to use that subdomain for these authentication callbacks.

The system bot realm

This is very much an implementation detail, but worth documenting to avoid confusion as to why there’s an extra realm when inspecting the Zulip database.

Every Zulip server comes with 1 realm that isn’t created by users: the zulipinternal realm. By default, this realm only contains the Zulip “system bots”. You can get a list of these on your system via ./scripts/get-django-setting INTERNAL_BOTS, but this is where bots like “Notification Bot”, “Welcome Bot”, etc. exist. In the future, we’re considering moving these bots to exist in every realm, so that we wouldn’t need the system realm anymore.

Migrating / troubleshooting

If you’re migrating from a configuration using the root domain to one with realms hosted on subdomains, be sure to clear cookies in any browsers that were logged in on the root domain; otherwise, those browsers will experience weird/confusing redirects.

Open realm creation

Installations like Zulip Cloud that wish to allow anyone on the Internet to create new Zulip organizations can do so by setting OPEN_REALM_CREATION = True in /etc/zulip/settings.py. Note that offering Zulip hosting to anyone on the Internet entails significant responsibility around security, abuse/spam, legal issues like GDPR/CCPA compliance, and more.