You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-configure-cross-tenant-cli.md
+27-23Lines changed: 27 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,7 @@ In this article, you’ll learn how-to create cross-tenant connections in Azure
18
18
> Azure Virtual Network Manager is currently in public preview.
19
19
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20
20
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
21
+
21
22
## Prerequisites
22
23
23
24
- Two Azure tenants with virtual networks needing to be managed by Azure Virtual Network Manager Deploy. During the how-to, the tenants will be referred to as follows:
@@ -29,6 +30,7 @@ In this article, you’ll learn how-to create cross-tenant connections in Azure
29
30
- Administrator guest account has *Network Contributor* permissions applied at appropriate scope level(Management group, subscription, or virtual network).
30
31
31
32
Need help with setting up permissions? Check out how to [add guest users in the Azure portal](../active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md), and how to [assign user roles to resources in Azure portal](../role-based-access-control/role-assignments-portal.md)
33
+
32
34
## Create scope connection within network manager
33
35
34
36
Creation of the scope connection begins on the central management tenant with a network manager deployed, which is the network manager where you plan to manage all of your resources across tenants. In this task, you'll set up a scope connection to add a subscription from a target tenant. If you wish to use a management group, you'll modify the `–resource-id` argument to look like `/providers/Microsoft.Management/managementGroups/{mgId}`.
@@ -43,39 +45,41 @@ Once the scope connection is created, you'll switch to your target tenant for th
43
45
44
46
1. Enter the following command to connect to the target managed tenant with your administrative account:
45
47
46
-
```azurecli
48
+
```azurecli
47
49
48
-
# Login to target managed tenant
49
-
# Note: Change the --tenant value to the appropriate tenant ID
50
-
az login --tenant "12345678-12a3-4abc-5cde-678909876543"
51
-
```
52
-
You'll be required to complete authentication with your organization based on your organizations policies.
50
+
# Login to target managed tenant
51
+
# Note: Change the --tenant value to the appropriate tenant ID
52
+
az login --tenant "12345678-12a3-4abc-5cde-678909876543"
53
+
```
54
+
You'll be required to complete authentication with your organization based on your organizations policies.
53
55
54
-
1. Enter the following command to create the cross tenant connection on the central management
55
-
Set the subscription (note it’s the same as the one the connection references in step 1)
56
-
```azurecli
57
-
# Set the Azure subscription
58
-
az account set --subscription 87654321-abcd-1234-1def-0987654321ab
56
+
1. Enter the following command to create the cross tenant connection on the central management.
57
+
Set the subscription (note it’s the same as the one the connection references in step 1).
59
58
59
+
```azurecli
60
+
# Set the Azure subscription
61
+
az account set --subscription 87654321-abcd-1234-1def-0987654321ab
60
62
61
-
# Create cross-tenant connection to central management tenant
62
-
az network manager connection subscription create --connection-name "toCentralManagementTenant" --description "This connection allows management of the tenant by a central management tenant" --network-manager-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab/resourceGroups/myRG/providers/Microsoft.Network/networkManagers/myAVNM"
63
-
```
63
+
64
+
# Create cross-tenant connection to central management tenant
65
+
az network manager connection subscription create --connection-name "toCentralManagementTenant" --description "This connection allows management of the tenant by a central management tenant" --network-manager-id "/subscriptions/13579864-1234-5678-abcd-0987654321ab/resourceGroups/myRG/providers/Microsoft.Network/networkManagers/myAVNM"
66
+
```
64
67
65
68
## Verify the connection state
66
69
67
70
1. Enter the following command to check the connection Status:
68
-
```azurecli
69
-
# Check connection status
70
-
az network manager connection subscription show --name "toCentralManagementTenant"
71
-
```
71
+
72
+
```azurecli
73
+
# Check connection status
74
+
az network manager connection subscription show --name "toCentralManagementTenant"
75
+
```
72
76
73
77
1. Switch back to the central management tenant, and performing a get on the network manager shows the subscription added via the cross tenant scopes property.
74
78
75
-
```azurecli
76
-
# View subscription added to network manager
77
-
az network manager show --resource-group myAVNMResourceGroup --name myAVNM
78
-
```
79
+
```azurecli
80
+
# View subscription added to network manager
81
+
az network manager show --resource-group myAVNMResourceGroup --name myAVNM
82
+
```
79
83
80
84
## Add static members to your network group
81
85
In this task, you'll add a cross-tenant virtual network to your network group with static membership. The virtual network subscription used below is the same as referenced when creating connections above.
0 commit comments