Skip to content

Commit 75f3f82

Browse files
Update how-to-configure-cross-tenant-cli.md
Fixing list formatting
1 parent fc6e046 commit 75f3f82

File tree

1 file changed

+27
-23
lines changed

1 file changed

+27
-23
lines changed

articles/virtual-network-manager/how-to-configure-cross-tenant-cli.md

Lines changed: 27 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ In this article, you’ll learn how-to create cross-tenant connections in Azure
1818
> Azure Virtual Network Manager is currently in public preview.
1919
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2020
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
21+
2122
## Prerequisites
2223

2324
- Two Azure tenants with virtual networks needing to be managed by Azure Virtual Network Manager Deploy. During the how-to, the tenants will be referred to as follows:
@@ -29,6 +30,7 @@ In this article, you’ll learn how-to create cross-tenant connections in Azure
2930
- Administrator guest account has *Network Contributor* permissions applied at appropriate scope level(Management group, subscription, or virtual network).
3031

3132
Need help with setting up permissions? Check out how to [add guest users in the Azure portal](../active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md), and how to [assign user roles to resources in Azure portal](../role-based-access-control/role-assignments-portal.md)
33+
3234
## Create scope connection within network manager
3335

3436
Creation of the scope connection begins on the central management tenant with a network manager deployed, which is the network manager where you plan to manage all of your resources across tenants. In this task, you'll set up a scope connection to add a subscription from a target tenant. If you wish to use a management group, you'll modify the `–resource-id` argument to look like `/providers/Microsoft.Management/managementGroups/{mgId}`.
@@ -43,39 +45,41 @@ Once the scope connection is created, you'll switch to your target tenant for th
4345

4446
1. Enter the following command to connect to the target managed tenant with your administrative account:
4547

46-
```azurecli
48+
```azurecli
4749
48-
# Login to target managed tenant
49-
# Note: Change the --tenant value to the appropriate tenant ID
50-
az login --tenant "12345678-12a3-4abc-5cde-678909876543"
51-
```
52-
You'll be required to complete authentication with your organization based on your organizations policies.
50+
# Login to target managed tenant
51+
# Note: Change the --tenant value to the appropriate tenant ID
52+
az login --tenant "12345678-12a3-4abc-5cde-678909876543"
53+
```
54+
You'll be required to complete authentication with your organization based on your organizations policies.
5355

54-
1. Enter the following command to create the cross tenant connection on the central management
55-
Set the subscription (note it’s the same as the one the connection references in step 1)
56-
```azurecli
57-
# Set the Azure subscription
58-
az account set --subscription 87654321-abcd-1234-1def-0987654321ab
56+
1. Enter the following command to create the cross tenant connection on the central management.
57+
Set the subscription (note it’s the same as the one the connection references in step 1).
5958

59+
```azurecli
60+
# Set the Azure subscription
61+
az account set --subscription 87654321-abcd-1234-1def-0987654321ab
6062
61-
# Create cross-tenant connection to central management tenant
62-
az network manager connection subscription create --connection-name "toCentralManagementTenant" --description "This connection allows management of the tenant by a central management tenant" --network-manager-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab/resourceGroups/myRG/providers/Microsoft.Network/networkManagers/myAVNM"
63-
```
63+
64+
# Create cross-tenant connection to central management tenant
65+
az network manager connection subscription create --connection-name "toCentralManagementTenant" --description "This connection allows management of the tenant by a central management tenant" --network-manager-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab/resourceGroups/myRG/providers/Microsoft.Network/networkManagers/myAVNM"
66+
```
6467

6568
## Verify the connection state
6669

6770
1. Enter the following command to check the connection Status:
68-
```azurecli
69-
# Check connection status
70-
az network manager connection subscription show --name "toCentralManagementTenant"
71-
```
71+
72+
```azurecli
73+
# Check connection status
74+
az network manager connection subscription show --name "toCentralManagementTenant"
75+
```
7276

7377
1. Switch back to the central management tenant, and performing a get on the network manager shows the subscription added via the cross tenant scopes property.
7478

75-
```azurecli
76-
# View subscription added to network manager
77-
az network manager show --resource-group myAVNMResourceGroup --name myAVNM
78-
```
79+
```azurecli
80+
# View subscription added to network manager
81+
az network manager show --resource-group myAVNMResourceGroup --name myAVNM
82+
```
7983

8084
## Add static members to your network group
8185
In this task, you'll add a cross-tenant virtual network to your network group with static membership. The virtual network subscription used below is the same as referenced when creating connections above.
@@ -111,4 +115,4 @@ az network manager connection subscription delete --name "toCentralManagementTen
111115

112116
- Learn how to [create a mesh network topology with Azure Virtual Network Manager using the Azure portal](how-to-create-mesh-network.md)
113117

114-
- Check out the [Azure Virtual Network Manager FAQ](faq.md)
118+
- Check out the [Azure Virtual Network Manager FAQ](faq.md)

0 commit comments

Comments
 (0)