Yes. Vultr IAM enforces strict tenant isolation at the organization boundary. Each organization is a completely separate context. Resources, users, roles, groups, and permission policies in one organization are not accessible from another organization, regardless of whether the same user is a member of both. In practice, this means:
- No cross-org resource visibility — a user who belongs to multiple organizations cannot interact with resources from one organization while operating in another. Resources are always scoped to the organization in which they were created.
- One org context at a time — when using the Vultr Console, you always operate within a single active organization. Any actions you take (managing users, assigning policies, deploying resources) apply only within the organization you are currently switched into.
- Explicit switching required — moving between organizations is always a deliberate action. There is no automatic or implicit context switching that could cause you to accidentally perform actions in the wrong organization.
- Enforced isolation — tenant boundaries are enforced at the platform level, not just the Console level. This means cross-org access is prevented regardless of whether you are using the Vultr Console or the API.