Configure a cross-tenant connection in Azure Virtual Network Manager Preview - CLI
In this article, you'll learn how to create cross-tenant connections in Azure Virtual Network Manager by using the Azure CLI. Cross-tenant support allows organizations to use a central network manager for managing virtual networks across tenants and subscriptions.
First, you'll create the scope connection on the central network manager. Then, you'll create the network manager connection on the connecting tenant and verify the connection. Last, you'll add virtual networks from different tenants and verify. After you complete all the tasks, you can centrally manage the resources of other tenants from your network manager.
- Two Azure tenants with virtual networks that you want to manage through Azure Virtual Network Manager. This article refers to the tenants as follows:
- Central management tenant: The tenant where an Azure Virtual Network Manager instance is installed, and where you'll centrally manage network groups from cross-tenant connections.
- Target managed tenant: The tenant that contains virtual networks to be managed. This tenant will be connected to the central management tenant.
- Azure Virtual Network Manager deployed in the central management tenant.
- These permissions:
- The administrator of the central management tenant has a guest account in the target managed tenant.
- The administrator guest account has Network Contributor permissions applied at the appropriate scope level (management group, subscription, or virtual network).
Need help with setting up permissions? Check out how to add guest users in the Azure portal and how to assign user roles to resources in the Azure portal.
Create a scope connection within a network manager
Creation of the scope connection begins on the central management tenant with a network manager deployed. This is the network manager where you plan to manage all of your resources across tenants.
In this task, you set up a scope connection to add a subscription from a target tenant. If you want to use a management group, modify the
–resource-id argument to look like
# Create a scope connection in the network manager in the central management tenant az network manager scope-connection create --resource-group "myRG" --network-manager-name "myAVNM" --name "ToTargetManagedTenant" --description "This is a connection to manage resources in the target managed tenant" --resource-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab" --tenant-id "24680975-1234-abcd-56fg-121314ab5643"
Create a network manager connection on a subscription in another tenant
After you create the scope connection, you switch to your target tenant for the network manager connection. In this task, you connect the target tenant to the scope connection that you created previously. You also verify the connection state.
Enter the following command to connect to the target managed tenant by using your administrative account:
# Log in to the target managed tenant # Change the --tenant value to the appropriate tenant ID az login --tenant "12345678-12a3-4abc-5cde-678909876543"
You're required to complete authentication with your organization, based on your organization's policies.
Enter the following commands to set the subscription and to create the cross-tenant connection on the central management tenant. The subscription is the same as the one that the connection referenced in the previous step.
# Set the Azure subscription az account set --subscription 87654321-abcd-1234-1def-0987654321ab # Create a cross-tenant connection to the central management tenant az network manager connection subscription create --connection-name "toCentralManagementTenant" --description "This connection allows management of the tenant by a central management tenant" --network-manager-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab/resourceGroups/myRG/providers/Microsoft.Network/networkManagers/myAVNM"
Verify the connection status
Enter the following command to check the connection status:
# Check connection status az network manager connection subscription show --name "toCentralManagementTenant"
Switch back to the central management tenant. Use the
showcommand for the network manager to show the subscription added via the property for cross-tenant scopes:
# View the subscription added to the network manager az network manager show --resource-group myAVNMResourceGroup --name myAVNM
Add static members to a network group
In this task, you add a cross-tenant virtual network to your network group by using static membership. In the following command, the virtual network subscription is the same as the one that you referenced when you created connections earlier.
# Create a network group with a static member from the target managed tenant az network manager group static-member create --network-group-name "CrossTenantNetworkGroup" --network-manager-name "myAVNM" --resource-group "myAVNMResourceGroup" --static-member-name "targetVnet01" --resource-id="/subscriptions/87654321-abcd-1234-1def-0987654321ab /resourceGroups/myScopeAVNM/providers/Microsoft.Network/virtualNetworks/targetVnet01"
Delete network manager configurations
Now that the virtual network is in the network group, configurations are applied. To remove the static member or cross-tenant resources, use the corresponding
# Delete the static member group az network manager group static-member delete --network-group-name "CrossTenantNetworkGroup" --network-manager-name " myAVNM" --resource-group "myRG" --static-member-name "targetVnet01” # Delete scope connections az network manager scope-connection delete --resource-group "myRG" --network-manager-name "myAVNM" --name "ToTargetManagedTenant" # Switch to a managed tenant if needed az network manager connection subscription delete --name "toCentralManagementTenant"
Learn more about security admin rules.
Check out the Azure Virtual Network Manager FAQ.