You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/transfer-subscription.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,24 +6,22 @@ manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.topic: how-to
8
8
ms.custom: devx-track-azurecli
9
-
ms.date: 06/16/2024
9
+
ms.date: 02/12/2025
10
10
ms.author: rolyon
11
11
---
12
12
13
13
# Transfer an Azure subscription to a different Microsoft Entra directory
14
14
15
-
Organizations might have several Azure subscriptions. Each subscription is associated with a particular Microsoft Entra directory. To make management easier, you might want to transfer a subscription to a different Microsoft Entra directory. When you transfer a subscription to a different Microsoft Entra directory, some resources are not transferred to the target directory. For example, all role assignments and custom roles in Azure role-based access control (Azure RBAC) are **permanently** deleted from the source directory and are not transferred to the target directory.
15
+
Organizations might have several Azure subscriptions. Each subscription is associated with a particular Microsoft Entra directory. To make management easier, you might want to transfer a subscription to a different Microsoft Entra directory. When you transfer a subscription to a different Microsoft Entra directory, some resources aren't transferred to the target directory. For example, all role assignments and custom roles in Azure role-based access control (Azure RBAC) are **permanently** deleted from the source directory and aren't transferred to the target directory.
16
16
17
17
This article describes the basic steps you can follow to transfer a subscription to a different Microsoft Entra directory and re-create some of the resources after the transfer.
18
18
19
-
If you want to instead **block** the transfer of subscriptions to different directories in your organization, you can configure a subscription policy. For more information, see [Manage Azure subscription policies](../cost-management-billing/manage/manage-azure-subscription-policy.md).
20
-
21
19
> [!NOTE]
22
20
> For Azure Cloud Solution Providers (CSP) subscriptions, changing the Microsoft Entra directory for the subscription isn't supported.
23
21
24
22
## Overview
25
23
26
-
Transferring an Azure subscription to a different Microsoft Entra directory is a complex process that must be carefully planned and executed. Many Azure services require security principals (identities) to operate normally or even manage other Azure resources. This article tries to cover most of the Azure services that depend heavily on security principals, but is not comprehensive.
24
+
Transferring an Azure subscription to a different Microsoft Entra directory is a complex process that must be carefully planned and executed. Many Azure services require security principals (identities) to operate normally or even manage other Azure resources. This article tries to cover most of the Azure services that depend heavily on security principals, but isn't comprehensive.
27
25
28
26
> [!IMPORTANT]
29
27
> In some scenarios, transferring a subscription might require downtime to complete the process. Careful planning is required to assess whether downtime will be required for your transfer.
@@ -73,9 +71,9 @@ Several Azure resources have a dependency on a subscription or a directory. Depe
73
71
| Azure Database for MySQL with Microsoft Entra authentication integration enabled | Yes | No || You cannot transfer an Azure database for MySQL (Single and Flexible server) with Microsoft Entra authentication enabled to a different directory. |
74
72
| Azure Database for PostgreSQL Flexible Server with Microsoft Entra authentication integration enabled or with Customer Managed Key enabled | Yes | No || You cannot transfer an Azure Database for PostgreSQL with Microsoft Entra authentication or with Customer Managed Key enabled to a different directory. You have to disable these features first, transfer the server, and then re-enable these features. |
75
73
| Azure Storage and Azure Data Lake Storage Gen2 | Yes | Yes || You must re-create any ACLs. |
76
-
| Azure Files | Yes | In most scenarios || You must re-create any ACLs. For storage accounts with Entra Kerberos authentication enabled, you must disable and re-enable Entra Kerberos authentication after the transfer. For Entra Domain Services, transferring to another Microsoft Entra directory where Entra Domain Services is not enabled is not supported. |
74
+
| Azure Files | Yes | In most scenarios || You must re-create any ACLs. For storage accounts with Microsoft Entra Kerberos authentication enabled, you must disable and re-enable Microsoft Entra Kerberos authentication after the transfer. For Microsoft Entra Domain Services, transferring to another Microsoft Entra directory where Microsoft Entra Domain Services is not enabled is not supported. |
77
75
| Azure File Sync | Yes | Yes || The storage sync service and/or storage account can be moved to a different directory. For more information, see [Frequently asked questions (FAQ) about Azure Files](../storage/files/storage-files-faq.md#azure-file-sync)|
78
-
| Azure Managed Disks | Yes | Yes || If you are using Disk Encryption Sets to encrypt Managed Disks with customer-managed keys, you must disable and re-enable the system-assigned identities associated with Disk Encryption Sets. And you must re-create the role assignments i.e. again grant required permissions to Disk Encryption Sets in the Key Vaults. |
76
+
| Azure Managed Disks | Yes | Yes || If you're using Disk Encryption Sets to encrypt Managed Disks with customer-managed keys, you must disable and re-enable the system-assigned identities associated with Disk Encryption Sets. And you must re-create the role assignments to again grant required permissions to Disk Encryption Sets in the Key Vaults. |
79
77
| Azure Kubernetes Service | Yes | No || You cannot transfer your AKS cluster and its associated resources to a different directory. For more information, see [Frequently asked questions about Azure Kubernetes Service (AKS)](/azure/aks/faq)|
80
78
| Azure Policy | Yes | No | All Azure Policy objects, including custom definitions, assignments, exemptions, and compliance data. | You must [export](../governance/policy/how-to/export-resources.md), import, and re-assign definitions. Then, create new policy assignments and any needed [policy exemptions](../governance/policy/concepts/exemption-structure.md). |
81
79
| Microsoft Entra Domain Services | Yes | No || You cannot transfer a Microsoft Entra Domain Services managed domain to a different directory. For more information, see [Frequently asked questions (FAQs) about Microsoft Entra Domain Services](../active-directory-domain-services/faqs.yml)|
@@ -85,15 +83,19 @@ Several Azure resources have a dependency on a subscription or a directory. Depe
85
83
| Azure Service Fabric | Yes | No || You must re-create the cluster. For more information, see [SF Clusters FAQ](/azure/service-fabric/service-fabric-common-questions) or [SF Managed Clusters FAQ](/azure/service-fabric/faq-managed-cluster)|
86
84
| Azure Service Bus | Yes | Yes ||You must delete, re-create, and attach the managed identities to the appropriate resource. You must re-create the role assignments. |
87
85
| Azure Synapse Analytics Workspace | Yes | Yes || You must update the tenant ID associated with the Synapse Analytics Workspace. If the workspace is associated with a Git repository, you must update the [workspace's Git configuration](../synapse-analytics/cicd/source-control.md#switch-to-a-different-git-repository). For more information, see [Recovering Synapse Analytics workspace after transferring a subscription to a different Microsoft Entra directory (tenant)](../synapse-analytics/how-to-recover-workspace-after-tenant-move.md). |
88
-
| Azure Databricks | Yes | No || Currently, Azure Databricks does not support moving workspaces to a new tenant. For more information, see [Manage your Azure Databricks account](/azure/databricks/administration-guide/account-settings/#move-workspace-between-tenants-unsupported). |
86
+
| Azure Databricks | Yes | No || Currently, Azure Databricks doesn't support moving workspaces to a new tenant. For more information, see [Manage your Azure Databricks account](/azure/databricks/administration-guide/account-settings/#move-workspace-between-tenants-unsupported). |
89
87
| Azure Compute Gallery | Yes | Yes || Replicate the image versions in the gallery to other regions or [copy an image from another gallery](/azure/virtual-machines/image-version). |
90
88
| Azure resource locks | Yes | Yes |[List resource locks](/cli/azure/resource/lock#az-resource-lock-list)| Export Azure resource locks manually using the Azure portal or [Azure CLI](/cli/azure/resource/lock). |
91
89
92
90
> [!WARNING]
93
-
> If you are using encryption at rest for a resource, such as a storage account or SQL database, that has a dependency on a key vault that is being transferred, it can lead to an unrecoverable scenario. If you have this situation, you should take steps to use a different key vault or temporarily disable customer-managed keys to avoid this unrecoverable scenario.
91
+
> If you're using encryption at rest for a resource, such as a storage account or SQL database, that has a dependency on a key vault that is being transferred, it can lead to an unrecoverable scenario. If you have this situation, you should take steps to use a different key vault or temporarily disable customer-managed keys to avoid this unrecoverable scenario.
94
92
95
93
To get a list of some of the Azure resources that are impacted when you transfer a subscription, you can also run a query in [Azure Resource Graph](../governance/resource-graph/overview.md). For a sample query, see [List impacted resources when transferring an Azure subscription](../governance/resource-graph/samples/samples-by-category.md#list-impacted-resources-when-transferring-an-azure-subscription).
96
94
95
+
### How to block subscription transfers
96
+
97
+
Depending on your organization, you might want to **block** the transfer of subscriptions to different directories in your organization. If you want to instead block the transfer of subscriptions, you can configure a subscription policy. For more information, see [Manage Azure subscription policies](../cost-management-billing/manage/manage-azure-subscription-policy.md).
98
+
97
99
## Prerequisites
98
100
99
101
To complete these steps, you will need:
@@ -130,13 +132,13 @@ To complete these steps, you will need:
130
132
az extension list
131
133
```
132
134
133
-
1. If you are using a preview version or an older version of the *resource-graph* extension, use [az extension update](/cli/azure/extension#az-extension-update) to update the extension.
135
+
1. If you're using a preview version or an older version of the *resource-graph* extension, use [az extension update](/cli/azure/extension#az-extension-update) to update the extension.
134
136
135
137
```azurecli
136
138
az extension update --name resource-graph
137
139
```
138
140
139
-
1. If the *resource-graph* extension is not installed, use [az extension add](/cli/azure/extension#az-extension-add) to install the extension.
141
+
1. If the *resource-graph* extension isn't installed, use [az extension add](/cli/azure/extension#az-extension-add) to install the extension.
140
142
141
143
```azurecli
142
144
az extension add --name resource-graph
@@ -156,7 +158,7 @@ To complete these steps, you will need:
156
158
157
159
1. Save the list of role assignments.
158
160
159
-
When you transfer a subscription, all of the role assignments are **permanently** deleted so it is important to save a copy.
161
+
When you transfer a subscription, all of the role assignments are **permanently** deleted so it's important to save a copy.
160
162
161
163
1. Review the list of role assignments. There might be role assignments you won't need in the target directory.
162
164
@@ -202,7 +204,7 @@ To complete these steps, you will need:
202
204
203
205
### List role assignments for managed identities
204
206
205
-
Managed identities do not get updated when a subscription is transferred to another directory. As a result, any existing system-assigned or user-assigned managed identities will be broken. After the transfer, you can re-enable any system-assigned managed identities. For user-assigned managed identities, you will have to re-create and attach them in the target directory.
207
+
Managed identities don't get updated when a subscription is transferred to another directory. As a result, any existing system-assigned or user-assigned managed identities will be broken. After the transfer, you can re-enable any system-assigned managed identities. For user-assigned managed identities, you will have to re-create and attach them in the target directory.
206
208
207
209
1. Review the [list of Azure services that support managed identities](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md) to note where you might be using managed identities.
208
210
@@ -298,7 +300,7 @@ In this step, you transfer the subscription from the source directory to the tar
298
300
299
301
1. In the target directory, sign in as the user that accepted the transfer request.
300
302
301
-
Only the user in the new account who accepted the transfer request will have access to manage the resources.
303
+
Only the user in the new account who accepted the transfer request has access to manage the resources.
302
304
303
305
1. Get a list of your subscriptions with the [az account list](/cli/azure/account#az-account-list) command.
0 commit comments