Onboard all subscriptions in a management group

Azure Lighthouse allows delegation of subscriptions and/or resource groups, but not management groups. However, you can deploy an Azure Policy to delegate all subscriptions within a management group to an Azure Lighthouse managing tenant.

The policy uses the deployIfNotExists effect to check if each subscription within the management group has been delegated to the specified managing tenant. If a subscription is not already delegated, the policy creates the Azure Lighthouse assignment based on the values you provide in the parameters. You will then have access to all of the subscriptions in the management group, just as if they had each been onboarded manually.

When using this policy, keep in mind:

  • Each subscription within the management group will have the same set of authorizations. To vary the users and roles who are granted access, you'll have to onboard a subscription manually.
  • While every subscription in the management group will be onboarded, you can't take actions on the management group resource through Azure Lighthouse. You'll need to select subscriptions to work on, just as you would if they were onboarded individually.

Unless specified below, all of these steps must be performed by a user in the customer's tenant with the appropriate permissions.


Though we refer to service providers and customers in this topic, enterprises managing multiple tenants can use the same processes.

Register the resource provider across subscriptions

Typically, the Microsoft.ManagedServices resource provider is registered for a subscription as part of the onboarding process. When using the policy to onboard subscriptions in a management group, the resource provider must be registered in advance. This can be done by a Contributor or Owner user in the customer's tenant (or any user who has permissions to do the /register/action operation for the resource provider). For more information, see Azure resource providers and types.

You can use an Azure Logic App to automatically register the resource provider across subscriptions. This Logic App can be deployed in a customer's tenant with limited permissions that allow it to register the resource provider in each subscription within a management group.

We also provide an Azure Logic App that can be deployed in the service provider's tenant. This Logic App can assign the resource provider across subscriptions in multiple tenants by granting tenant-wide admin consent to the Logic App. Granting tenant-wide admin consent requires you to sign in as a user that is authorized to consent on behalf of the organization. Note that even if you use this option to register the provider across multiple tenants, the policy must still be deployed individually for each management group.

Create your parameters file

To assign the policy, you deploy the deployLighthouseIfNotExistManagementGroup.json file from our samples repo, along with a deployLighthouseIfNotExistsManagementGroup.parameters.json parameters file that you edit with your specific tenant and assignment details. These two files contain the same details that would be used to onboard an individual subscription.

The example below shows a parameters file which will delegate the subscriptions to the Relecloud Managed Services tenant, with access granted to two principalIDs: one for Tier 1 Support, and one automation account which can assign the delegateRoleDefinitionIds to managed identities in the customer tenant.

    "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", 
    "contentVersion": "", 
    "parameters": { 
        "managedByName": { 
            "value": "Relecloud Managed Services" 
        "managedByDescription": { 
            "value": "Relecloud provides managed services to its customers" 
        "managedByTenantId": { 
            "value": "00000000-0000-0000-0000-000000000000" 
        "managedByAuthorizations": { 
            "value": [ 
                    "principalId": "00000000-0000-0000-0000-000000000000", 
                    "principalIdDisplayName": "Tier 1 Support", 
                    "roleDefinitionId": "b24988ac-6180-42a0-ab88-20f7382dd24c" 
                    "principalId": "00000000-0000-0000-0000-000000000000", 
                    "principalIdDisplayName": "Automation Account - Full access", 
                    "roleDefinitionId": "18d7d88d-d35e-4fb5-a5c3-7773c20a72d9", 
                    "delegatedRoleDefinitionIds": [ 

Assign the policy to a management group

Once you've edited the policy to create your assignments, you can assign it at the management group level. For information about how to assign a policy and view compliance state results, see Quickstart: Create a policy assignment.

The PowerShell script below shows how to add the policy definition under the specified management group, using the template and parameter file you created. You need to create the assignment and remediation task for existing subscriptions.

New-AzManagementGroupDeployment -Name <DeploymentName> -Location <location> -ManagementGroupId <ManagementGroupName> -TemplateFile <path to file> -TemplateParameterFile <path to parameter file> -verbose

Confirm successful onboarding

You can confirm that the subscriptions were successfully onboarded in a number of ways. For more information, see Confirm successful onboarding.

If you keep the Logic App and policy active for your management group, any new subscriptions that are added to the management group will be onboarded as well.

Next steps