Skip to content

Commit 233127e

Browse files
authored
Merge pull request #98526 from JnHs/jh-azurelighthouse-links
update to relative links
2 parents 18da15d + 732ef89 commit 233127e

14 files changed

+69
-69
lines changed

articles/lighthouse/concepts/azure-delegated-resource-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can [publish the new Managed Services offer type to Azure Marketplace](../ho
2828

2929
At a high level, here's how Azure delegated resource management works:
3030

31-
1. As a service provider, you identify the access (roles) that your groups, service principals, or users will need to manage the customer's Azure resources. The access definition contains the service provider's tenant ID along with the required access for the offer, defined using **principalId** identities from your tenant mapped to [built-in **roleDefinition** values](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles) (Contributor, VM Contributor, Reader, etc.).
31+
1. As a service provider, you identify the access (roles) that your groups, service principals, or users will need to manage the customer's Azure resources. The access definition contains the service provider's tenant ID along with the required access for the offer, defined using **principalId** identities from your tenant mapped to [built-in **roleDefinition** values](../../role-based-access-control/built-in-roles.md) (Contributor, VM Contributor, Reader, etc.).
3232
2. You specify this access and onboard the customer to Azure delegated resource management in one of two ways:
3333
- [Publish an Azure Marketplace managed services offer](../how-to/publish-managed-services-offers.md) (private or public) that the customer will accept
3434
- [Deploy an Azure Resource Manager template to the customer's tenant](../how-to/onboard-customer.md) for one or more specific subscriptions or resource groups

articles/lighthouse/concepts/cloud-solution-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Onboarding a subscription that you created through the CSP program follows the s
2929
![Tenant management using AOBO and Azure delegated resource management](../media/csp-2.jpg)
3030

3131
> [!NOTE]
32-
> The [**My customers** page in the Azure portal](../how-to/view-manage-customers.md) now includes a **Cloud Solution Provider (Preview)** section, which displays billing info and resources for CSP customers who have [signed the Microsoft Customer Agreement (MCA)](https://docs.microsoft.com/partner-center/confirm-customer-agreement) and are under the Azure plan. For more info, see [Get started with your Microsoft Partner Agreement billing account](https://docs.microsoft.com/azure/billing/mpa-overview).
32+
> The [**My customers** page in the Azure portal](../how-to/view-manage-customers.md) now includes a **Cloud Solution Provider (Preview)** section, which displays billing info and resources for CSP customers who have [signed the Microsoft Customer Agreement (MCA)](https://docs.microsoft.com/partner-center/confirm-customer-agreement) and are under the Azure plan. For more info, see [Get started with your Microsoft Partner Agreement billing account](../../billing/mpa-overview.md).
3333
>
3434
> CSP customers may appear in this section whether or not they have been onboarded for Azure delegated resource management. If they have, then they'll also appear in the **Customers** section, as described in [View and manage customers and delegated resources](../how-to/view-manage-customers.md).
3535

articles/lighthouse/concepts/cross-tenant-management-experience.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ As a service provider, you can use [Azure delegated resource management](../conc
1414
1515
## Understanding customer tenants
1616

17-
An Azure Active Directory (Azure AD) tenant is a representation of an organization. It's a dedicated instance of Azure AD that an organization receives when they create a relationship with Microsoft by signing up for Azure, Microsoft 365, or other services. Each Azure AD tenant is distinct and separate from other Azure AD tenants, and has its own tenant ID (a GUID). For more info, see [What is Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis)
17+
An Azure Active Directory (Azure AD) tenant is a representation of an organization. It's a dedicated instance of Azure AD that an organization receives when they create a relationship with Microsoft by signing up for Azure, Microsoft 365, or other services. Each Azure AD tenant is distinct and separate from other Azure AD tenants, and has its own tenant ID (a GUID). For more info, see [What is Azure Active Directory?](../../active-directory/fundamentals/active-directory-whatis.md)
1818

1919
Typically, in order to manage Azure resources for a customer, service providers would have to sign in to the Azure portal using an account associated with that customer's tenant, requiring an administrator in the customer's tenant to create and manage user accounts for the service provider.
2020

@@ -38,43 +38,43 @@ We also provide APIs to perform Azure delegated resource management tasks. For m
3838

3939
Most tasks and services can be performed on delegated resources across managed tenants. Below are some of the key scenarios where cross-tenant management can be effective.
4040

41-
[Azure Arc for servers (preview)](https://docs.microsoft.com/azure/azure-arc/servers/overview):
41+
[Azure Arc for servers (preview)](../../azure-arc/servers/overview.md):
4242

43-
- [Connect Windows Server or Linux machines outside Azure](https://docs.microsoft.com/azure/azure-arc/servers/quickstart-onboard-portal) to delegated subscriptions and/or resource groups in Azure
43+
- [Connect Windows Server or Linux machines outside Azure](../../azure-arc/servers/quickstart-onboard-portal.md) to delegated subscriptions and/or resource groups in Azure
4444
- Manage connected machines using Azure constructs, such as Azure Policy and tagging
4545

46-
[Azure Automation](https://docs.microsoft.com/azure/automation/):
46+
[Azure Automation](../../automation/index.yml):
4747

4848
- Use automation accounts to access and work with delegated customer resources
4949

50-
[Azure Backup](https://docs.microsoft.com/azure/backup/):
50+
[Azure Backup](../../backup/index.yml):
5151

5252
- Back up and restore customer data in customer tenants
5353

54-
[Azure Kubernetes Service (AKS)](https://docs.microsoft.com//azure/aks/):
54+
[Azure Kubernetes Service (AKS)](../../aks/index.yml):
5555

5656
- Manage hosted Kubernetes environments and deploy and manage containerized applications within customer tenants
5757

58-
[Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/):
58+
[Azure Monitor](../../azure-monitor/index.yml):
5959

6060
- View alerts for delegated subscriptions, with the ability to view alerts across all subscriptions
6161
- View activity log details for delegated subscriptions
6262
- Log analytics: Query data from remote customer workspaces in multiple tenants
6363
- Create alerts in customer tenants that trigger automation, such as Azure Automation runbooks or Azure Functions, in the service provider tenant through webhooks
6464

65-
[Azure Policy](https://docs.microsoft.com/azure/governance/policy/):
65+
[Azure Policy](../../governance/policy/index.yml):
6666

6767
- Compliance snapshots show details for assigned policies within delegated subscriptions
6868
- Create and edit policy definitions within a delegated subscription
6969
- Assign customer-defined policy definitions within the delegated subscription
7070
- Customers see policies authored by the service provider alongside any policies they've authored themselves
7171
- Can [remediate deployIfNotExists or modify assignments within the customer tenant](../how-to/deploy-policy-remediation.md)
7272

73-
[Azure Resource Graph](https://docs.microsoft.com/azure/governance/resource-graph/):
73+
[Azure Resource Graph](../../governance/resource-graph/index.yml):
7474

7575
- Now includes the tenant ID in returned query results, allowing you to identify whether a subscription belongs to the customer tenant or service provider tenant
7676

77-
[Azure Security Center](https://docs.microsoft.com/azure/security-center/):
77+
[Azure Security Center](../../security-center/index.yml):
7878

7979
- Cross-tenant visibility
8080
- Monitor compliance to security policies and ensure security coverage across all tenants’ resources
@@ -91,27 +91,27 @@ Most tasks and services can be performed on delegated resources across managed t
9191
- Ensure servers are running only the applications and processes they should be with adaptive application controls
9292
- Monitor changes to important files and registry entries with File Integrity Monitoring (FIM)
9393

94-
[Azure Sentinel](https://docs.microsoft.com/azure/sentinel/multiple-tenants-service-providers):
94+
[Azure Sentinel](../../sentinel/multiple-tenants-service-providers.md):
9595

9696
- Manage Azure Sentinel resources in customer tenants
9797

98-
[Azure Service Health](https://docs.microsoft.com/azure/service-health/):
98+
[Azure Service Health](../../service-health/index.yml):
9999

100100
- Monitor the health of customer resources with Azure Resource Health
101101
- Track the health of the Azure services used by your customers
102102

103-
[Azure Site Recovery](https://docs.microsoft.com/azure/site-recovery/):
103+
[Azure Site Recovery](../../site-recovery/index.yml):
104104

105105
- Manage disaster recovery options for Azure virtual machines in customer tenants (note that you can't use RunAs accounts to copy VM extensions)
106106

107-
[Azure Virtual Machines](https://docs.microsoft.com/azure/virtual-machines/):
107+
[Azure Virtual Machines](../../virtual-machines/index.yml):
108108

109109
- Use virtual machine extensions to provide post-deployment configuration and automation tasks on Azure VMs in customer tenants
110110
- Use boot diagnostics to troubleshoot Azure VMs in customer tenants
111111
- Access VMs with serial console in customer tenants
112112
- Note that you can't use Azure Active Directory for remote login to a VM, and you can't integrate a VM with a Key Vault for passwords, secrets or cryptographic keys for disk encryption
113113

114-
[Azure Virtual Network](https://docs.microsoft.com/azure/virtual-network/):
114+
[Azure Virtual Network](../../virtual-network/index.yml):
115115

116116
- Deploy and manage virtual networks and virtual network interface cards (vNICs) within customer tenants
117117

@@ -123,9 +123,9 @@ Support requests:
123123
With all scenarios, please be aware of the following current limitations:
124124

125125
- Requests handled by Azure Resource Manager can be performed using Azure delegated resource management. The operation URIs for these requests start with `https://management.azure.com`. However, requests that are handled by an instance of a resource type (such as KeyVault secrets access or storage data access) aren’t supported with Azure delegated resource management. The operation URIs for these requests typically start with an address that is unique to your instance, such as `https://myaccount.blob.core.windows.net` or `https://mykeyvault.vault.azure.net/`. The latter also are typically data operations rather than management operations.
126-
- Role assignments must use role-based access control (RBAC) [built-in roles](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles). All built-in roles are currently supported with Azure delegated resource management except for Owner or any built-in roles with [DataActions](https://docs.microsoft.com/azure/role-based-access-control/role-definitions#dataactions) permission. The User Access Administrator role is supported only for limited use in [assigning roles to managed identities](../how-to/deploy-policy-remediation.md#create-a-user-who-can-assign-roles-to-a-managed-identity-in-the-customer-tenant). Custom roles and [classic subscription administrator roles](https://docs.microsoft.com/azure/role-based-access-control/classic-administrators) are not supported.
126+
- Role assignments must use role-based access control (RBAC) [built-in roles](../../role-based-access-control/built-in-roles.md). All built-in roles are currently supported with Azure delegated resource management except for Owner or any built-in roles with [DataActions](../../role-based-access-control/role-definitions.md#dataactions) permission. The User Access Administrator role is supported only for limited use in [assigning roles to managed identities](../how-to/deploy-policy-remediation.md#create-a-user-who-can-assign-roles-to-a-managed-identity-in-the-customer-tenant). Custom roles and [classic subscription administrator roles](../../role-based-access-control/classic-administrators.md) are not supported.
127127
- Currently, you can’t onboard a subscription (or resource group within a subscription) for Azure delegated resource management if the subscription uses Azure Databricks. Similarly, if a subscription has been registered for onboarding with the **Microsoft.ManagedServices** resource provider, you won’t be able to create a Databricks workspace for that subscription at this time.
128-
- While you can onboard subscriptions and resource groups for Azure delegated resource management which have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. [Deny assignments](https://docs.microsoft.com/azure/role-based-access-control/deny-assignments) that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can’t create their own deny assignments (user-assigned deny assignments).
128+
- While you can onboard subscriptions and resource groups for Azure delegated resource management which have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. [Deny assignments](../../role-based-access-control/deny-assignments.md) that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can’t create their own deny assignments (user-assigned deny assignments).
129129

130130
## Next steps
131131

articles/lighthouse/concepts/enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Either way, be sure to [follow the principle of least privilege when defining wh
3333

3434
Azure Lighthouse and Azure delegated resource management only provide logical links between a managing tenant and managed tenants, rather than physically moving data or resources. Furthermore, the access always goes in only one direction, from the managing tenant to the managed tenants. Users and groups in the managing tenant should continue to use multi-factor authentication when performing management operations on managed tenant resources.
3535

36-
Enterprises with internal or external governance and compliance guardrails can use [Azure Activity logs](https://docs.microsoft.com/azure/azure-monitor/platform/activity-logs-overview) to meet their transparency requirements. When enterprise tenants have established managing and managed tenant relationships, users in each tenant can monitor and gain visibility to actions taken by the users in the other tenant by viewing logged activity.
36+
Enterprises with internal or external governance and compliance guardrails can use [Azure Activity logs](../../azure-monitor/platform/activity-logs-overview.md) to meet their transparency requirements. When enterprise tenants have established managing and managed tenant relationships, users in each tenant can monitor and gain visibility to actions taken by the users in the other tenant by viewing logged activity.
3737

3838
## Onboarding process considerations
3939

articles/lighthouse/concepts/managed-services-offers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ After that, users in your organization will be able to perform administration ta
1919

2020
Each managed services offer includes one or more plans. These plans can be either private or public.
2121

22-
If you want to limit your offer to specific customers, you can publish a private plan. When you do so, the plan can only be purchased for the specific] subscription IDs that you provide. For more info, see [Private offers](https://docs.microsoft.com/azure/marketplace/private-offers).
22+
If you want to limit your offer to specific customers, you can publish a private plan. When you do so, the plan can only be purchased for the specific] subscription IDs that you provide. For more info, see [Private offers](../../marketplace/private-offers.md).
2323

2424
Public plans let you promote your services to new customers. These are usually more appropriate when you only require limited access to the customer's tenant. Once you've established a relationship with a customer, if they decide to grant your organization additional access, you can do so either by publishing a new private plan for that customer only, or by [onboarding them for further access using Azure Resource Manager templates](../how-to/onboard-customer.md).
2525

@@ -29,7 +29,7 @@ If appropriate, you can include both public and private plans in the same offer.
2929

3030
## Publish managed service offers
3131

32-
To learn how to publish a managed services offer, see [Publish a Managed Services offer to Azure Marketplace](../how-to/publish-managed-services-offers.md). For general info about publishing to Azure Marketplace using the Cloud Partner Portal, see [Azure Marketplace and AppSource Publishing Guide](https://docs.microsoft.com/azure/marketplace/marketplace-publishers-guide) and [Manage Azure and AppSource Marketplace offers](https://docs.microsoft.com/azure/marketplace/cloud-partner-portal/manage-offers/cpp-manage-offers).
32+
To learn how to publish a managed services offer, see [Publish a Managed Services offer to Azure Marketplace](../how-to/publish-managed-services-offers.md). For general info about publishing to Azure Marketplace using the Cloud Partner Portal, see [Azure Marketplace and AppSource Publishing Guide](../../marketplace/marketplace-publishers-guide.md) and [Manage Azure and AppSource Marketplace offers](../../marketplace/cloud-partner-portal/manage-offers/cpp-manage-offers.md).
3333

3434
## Next steps
3535

articles/lighthouse/concepts/recommended-security-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ When using Azure delegated resource management, it’s important to consider sec
1111

1212
## Require Azure Multi-Factor Authentication
1313

14-
[Azure Multi-Factor Authentication](../../active-directory/authentication/concept-mfa-howitworks.md) (also known as two-step verification) helps prevent attackers from gaining access to an account by requiring multiple authentication steps. You should require Multi-Factor Authentication for all users in your service provider tenant, including any users who will have access to customer resources.
14+
[Azure Multi-Factor Authentication](../../active-directory/authentication/concept-mfa-howitworks.md) (also known as two-step verification) helps prevent attackers from gaining access to an account by requiring multiple authentication steps. You should require Multi-Factor Authentication for all users in your service provider tenant, including any users who will have access to customer resources.
1515

1616
We suggest that you ask your customers to implement Azure Multi-Factor Authentication in their tenants as well.
1717

0 commit comments

Comments
 (0)