|
1 | 1 | ---
|
2 | 2 | title: 'Cross-tenant support in Azure Virtual Network Manager'
|
3 |
| -description: Learn about how cross-tenant connections are supported in Azure Virtual Network Manager. |
| 3 | +description: Learn how cross-tenant support in Azure Virtual Network Manager helps manage virtual networks across multiple tenants. Explore scenarios and benefits. |
4 | 4 | author: mbender-ms
|
5 | 5 | ms.author: mbender
|
6 | 6 | ms.service: azure-virtual-network-manager
|
7 | 7 | ms.topic: concept-article
|
8 |
| -ms.date: 03/22/2024 |
| 8 | +ms.date: 05/06/2025 |
9 | 9 | ---
|
10 | 10 |
|
11 | 11 |
|
12 |
| -# Cross-tenant support in Azure Virtual Network Manager |
| 12 | +# Cross-Tenant Support in Azure Virtual Network Manager |
13 | 13 |
|
14 |
| -In this article, you learn about cross-tenant support in Azure Virtual Network Manager. Cross-tenant supports allows organizations to use a central Network Manager instance for managing virtual networks across different tenants and subscriptions. |
| 14 | +Cross-tenant support in Azure Virtual Network Manager enables organizations to centrally manage virtual networks across multiple tenants and subscriptions. This article describes scenarios, benefits, and how to establish cross-tenant connections. |
15 | 15 |
|
16 |
| - ## Overview of Cross-tenant |
| 16 | +## Overview of cross-tenant support |
17 | 17 |
|
18 |
| -Cross-tenant support in Azure Virtual Network Manager allows you to add subscriptions or management groups from other tenants to your network manager. This is done by establishing a two-way connection between the network manager and target tenants. Once connected, the central manager can deploy connectivity and/or security admin rules to virtual networks across those connected subscriptions or management groups. This support assists organizations that fit the following scenarios: |
| 18 | +Cross-tenant support in Azure Virtual Network Manager allows you to add subscriptions or management groups from other tenants to your network manager. This is done by establishing a two-way connection between the network manager and target tenants. Once connected, the central manager can deploy connectivity and/or security admin rules to virtual networks across those connected subscriptions or management groups. |
| 19 | + |
| 20 | +This support assists organizations that fit the following scenarios: |
19 | 21 |
|
20 | 22 | - Acquisitions – In instances where organizations merge through acquisition and have multiple tenants, cross tenant support allows a central network manager to manage virtual networks across the tenants.
|
21 | 23 |
|
22 | 24 | - Managed service provider – In managed service provider scenarios, an organization can manage the resources of other organizations. Cross-tenant support allows central management of virtual networks by a central service provider for multiple clients.
|
23 | 25 |
|
24 |
| -## Cross-tenant connection |
| 26 | +## Establish cross-tenant connection |
25 | 27 |
|
26 | 28 | Establishing cross-tenant support begins with creating a cross tenant connection between two tenants. Cross-tenant support requires two-way consent--one from the network manager, the other from the target tenant's virtual network manager hub. The connections are as follows:
|
27 | 29 |
|
28 |
| -- Network manager connection - You create a cross-tenant connection from your network manager. The connection includes the exact scope of the tenant’s subscriptions or management groups to manage in your network manager. |
29 |
| -- Virtual network manager hub connection - the tenant creates a cross-tenant connection from their virtual network manager hub. This connection includes the scope of subscriptions or management groups to be managed by the central network manager. |
| 30 | +| Connection Type | Description | |
| 31 | +|----------------|-------------| |
| 32 | +| Network manager connection | You create a cross-tenant connection from your network manager. The connection includes the exact scope of the tenant's subscriptions or management groups to manage in your network manager. | |
| 33 | +| Virtual network manager hub connection | The tenant creates a cross-tenant connection from their virtual network manager hub. This connection includes the scope of subscriptions or management groups managed the central network manager. | |
30 | 34 |
|
31 | 35 | Once both cross-tenant connections exist and the scopes are exactly the same, a true connection is established. Administrators can use their network manager to add cross-tenant resources to their [network groups](concept-network-groups.md) and to manage virtual networks included in the connection scope. Existing connectivity and/or security admin rules are applied to the resources based on existing configurations.
|
32 | 36 |
|
33 |
| -A cross-tenant connection can only be established and maintained when both objects from each party exist. When one of the connections is removed, the cross-tenant connection is broken. If you need to delete a cross-tenant connection, you perform the following: |
| 37 | +A cross-tenant connection can only be established and maintained when both objects from each party exist. When one of the connections is removed, the cross-tenant connection is broken. If you need to delete a cross-tenant connection, you perform the following steps: |
34 | 38 |
|
35 | 39 | - Remove cross-tenant connection from the network manager side via Cross-tenant connections settings in the Azure portal.
|
36 | 40 | - Remove cross-tenant connection from the tenant side via Virtual network manager hub's Cross-tenant connections settings in the Azure portal.
|
37 | 41 |
|
38 | 42 | > [!NOTE]
|
39 |
| -> Once a connection is removed from either side, the network manager will no longer be able to view or manage the tenant's resources under that former connection's scope. |
| 43 | +> Once a connection is removed from either side, the network manager can't view or manage the tenant's resources under that former connection's scope. |
40 | 44 |
|
41 | 45 | ## Connection states
|
42 |
| -The resources required to create the cross-tenant connection contain a state, which represents whether the associated scope has been added to the Network Manager scope. Possible state values include: |
| 46 | +The resources required to create the cross-tenant connection contain a state, which represents whether the associated scope is added to the Network Manager scope. Possible state values include: |
43 | 47 |
|
44 |
| -* Connected: Both the Scope Connection and Network Manager Connection resources exist. The scope has been added to the Network Manager's scope. |
45 |
| -* Pending: One of the two approval resources hasn't been created. The scope hasn't yet been added to the Network Manager's scope. |
46 |
| -* Conflict: There's already a network manager with this subscription or management group defined within its scope. Two network managers with the same scope access can't directly manage the same scope, therefore this subscription/management group can't be added to the Network Manager scope. To resolve the conflict, remove the scope from the conflicting network manager's scope and recreate the connection resource. |
47 |
| -* Revoked: The scope was at one time added to the Network Manager scope, but the removal of an approval resource has caused it to be revoked. |
| 48 | +| State | Description | |
| 49 | +|-------|-------------| |
| 50 | +| Connected | Both the Scope Connection and Network Manager Connection resources exist. The scope is added to the Network Manager's scope. | |
| 51 | +| Pending | One of the two approval resources isn't created. The scope isn't added to the Network Manager's scope yet. | |
| 52 | +| Conflict | There's already a network manager with this subscription or management group defined within its scope. Two network managers with the same scope access can't directly manage the same scope, therefore this subscription/management group can't be added to the Network Manager scope. To resolve the conflict, remove the scope from the conflicting network manager's scope and recreate the connection resource. | |
| 53 | +| Revoked | The scope was at one time added to the Network Manager scope, but the removal of an approval resource caused revocation. | |
48 | 54 |
|
49 |
| -The only state that represents the scope has been added to the Network Manager scope is 'Connected'. |
| 55 | +The only state that represents the scope is added to the Network Manager scope is 'Connected'. |
50 | 56 |
|
51 | 57 | ## Required permissions
|
52 | 58 |
|
|
0 commit comments