Skip to content

Commit b4ee930

Browse files
Merge pull request #234961 from asudbring/linux-fixes
Linux doc-athon fixes for Create peering different subscriptions how-to article
2 parents f3e900a + 4fe014d commit b4ee930

File tree

1 file changed

+46
-12
lines changed

1 file changed

+46
-12
lines changed

articles/virtual-network/create-peering-different-subscriptions.md

Lines changed: 46 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -30,21 +30,33 @@ This tutorial peers virtual networks in the same region. You can also peer virtu
3030

3131
## Prerequisites
3232

33+
# [**Portal**](#tab/create-peering-portal)
34+
3335
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3436

3537
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
3638

37-
- If the virtual networks are in different subscriptions and Active Directory tenants, and you intend to separate the duty of managing the network belonging to each tenant, then add the user from each tenant as a guest in the opposite tenant and assign them a reader role to the virtual network.
39+
- To separate the duty of managing the network belonging to each tenant, add the user from each tenant as a guest in the opposite tenant and assign them a reader role to the virtual network. This procedure applies if the virtual networks are in different subscriptions and Active Directory tenants.
3840

39-
- If the virtual networks are in different subscriptions and Active Directory tenants, and you do not intend to separate the duty of managing the network belonging to each tenant, then add the user from tenant A as a guest in the opposite tenant and assign them the correct permissions to establish a network peering. This user will be able to initiate and connect the network peering from each subscription.
41+
- To establish a network peering when you don't intend to separate the duty of managing the network belonging to each tenant, add the user from tenant A as a guest in the opposite tenant. Then, assign them the correct permissions to initiate and connect the network peering from each subscription. With these permissions, the user is able to establish the network peering from each subscription.
4042

4143
- For more information about guest users, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md?toc=%2fazure%2fvirtual-network%2ftoc.json#add-guest-users-to-the-directory).
4244

4345
- Each user must accept the guest user invitation from the opposite Azure Active Directory tenant.
4446

45-
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
47+
# [**PowerShell**](#tab/create-peering-powershell)
4648

47-
- This how-to article requires version 2.31.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
49+
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
50+
51+
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
52+
53+
- To separate the duty of managing the network belonging to each tenant, add the user from each tenant as a guest in the opposite tenant and assign them a reader role to the virtual network. This procedure applies if the virtual networks are in different subscriptions and Active Directory tenants.
54+
55+
- To establish a network peering when you don't intend to separate the duty of managing the network belonging to each tenant, add the user from tenant A as a guest in the opposite tenant. Then, assign them the correct permissions to initiate and connect the network peering from each subscription. With these permissions, the user is able to establish the network peering from each subscription.
56+
57+
- For more information about guest users, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md?toc=%2fazure%2fvirtual-network%2ftoc.json#add-guest-users-to-the-directory).
58+
59+
- Each user must accept the guest user invitation from the opposite Azure Active Directory tenant.
4860

4961
- Azure PowerShell installed locally or Azure Cloud Shell.
5062

@@ -54,7 +66,27 @@ This tutorial peers virtual networks in the same region. You can also peer virtu
5466

5567
If you choose to install and use PowerShell locally, this article requires the Azure PowerShell module version 5.4.1 or later. Run `Get-Module -ListAvailable Az` to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-Az-ps). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
5668

57-
In the following steps, you'll learn how to peer virtual networks in different subscriptions and Azure Active Directory tenants.
69+
# [**Azure CLI**](#tab/create-peering-cli)
70+
71+
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
72+
73+
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
74+
75+
- To separate the duty of managing the network belonging to each tenant, add the user from each tenant as a guest in the opposite tenant and assign them a reader role to the virtual network. This procedure applies if the virtual networks are in different subscriptions and Active Directory tenants.
76+
77+
- To establish a network peering when you don't intend to separate the duty of managing the network belonging to each tenant, add the user from tenant A as a guest in the opposite tenant. Then, assign them the correct permissions to initiate and connect the network peering from each subscription. With these permissions, the user is able to establish the network peering from each subscription.
78+
79+
- For more information about guest users, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md?toc=%2fazure%2fvirtual-network%2ftoc.json#add-guest-users-to-the-directory).
80+
81+
- Each user must accept the guest user invitation from the opposite Azure Active Directory tenant.
82+
83+
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
84+
85+
- This how-to article requires version 2.31.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
86+
87+
---
88+
89+
In the following steps, learn how to peer virtual networks in different subscriptions and Azure Active Directory tenants.
5890

5991
You can use the same account that has permissions in both subscriptions or you can use separate accounts for each subscription to set up the peering. An account with permissions in both subscriptions can complete all of the steps without signing out and signing in to portal and assigning permissions.
6092

@@ -282,7 +314,7 @@ Use [az ad user list](/cli/azure/ad/user#az-ad-user-list) to obtain the object I
282314
```azurecli-interactive
283315
az ad user list --display-name UserB
284316
```
285-
```bash
317+
```output
286318
[
287319
{
288320
"businessPhones": [],
@@ -368,7 +400,7 @@ echo $vnetidA
368400

369401
## Create virtual network - myVNetB
370402

371-
In this section, you'll sign in as **UserB** and create a virtual network for the peering connection to **myVNetA**.
403+
In this section, you sign in as **UserB** and create a virtual network for the peering connection to **myVNetA**.
372404

373405
# [**Portal**](#tab/create-peering-portal)
374406

@@ -583,7 +615,7 @@ Use [az ad user list](/cli/azure/ad/user#az-ad-user-list) to obtain the object I
583615
az ad user list --display-name UserA
584616
```
585617

586-
```bash
618+
```output
587619
[
588620
{
589621
"businessPhones": [],
@@ -667,7 +699,7 @@ echo $vnetidB
667699

668700
## Create peering connection - myVNetA to myVNetB
669701

670-
You'll need the **Resource ID** for **myVNetB** from the previous steps to set up the peering connection.
702+
You need the **Resource ID** for **myVNetB** from the previous steps to set up the peering connection.
671703

672704
# [**Portal**](#tab/create-peering-portal)
673705

@@ -837,11 +869,11 @@ az network vnet peering list \
837869

838870
---
839871

840-
The peering connection will show in **Peerings** in a **Initiated** state. To complete the peer, a corresponding connection must be set up in **myVNetB**.
872+
The peering connection shows in **Peerings** in a **Initiated** state. To complete the peer, a corresponding connection must be set up in **myVNetB**.
841873

842874
## Create peering connection - myVNetB to myVNetA
843875

844-
You'll need the **Resource IDs** for **myVNetA** from the previous steps to set up the peering connection.
876+
You need the **Resource IDs** for **myVNetA** from the previous steps to set up the peering connection.
845877

846878
# [**Portal**](#tab/create-peering-portal)
847879

@@ -1015,7 +1047,9 @@ For more information about using your own DNS for name resolution, see, [Name re
10151047
For more information about Azure DNS, see [What is Azure DNS?](../dns/dns-overview.md).
10161048

10171049
## Next steps
1018-
<!-- Add a context sentence for the following links -->
1050+
10191051
- Thoroughly familiarize yourself with important [virtual network peering constraints and behaviors](virtual-network-manage-peering.md#requirements-and-constraints) before creating a virtual network peering for production use.
1052+
10201053
- Learn about all [virtual network peering settings](virtual-network-manage-peering.md#create-a-peering).
1054+
10211055
- Learn how to [create a hub and spoke network topology](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke#virtual-network-peering) with virtual network peering.

0 commit comments

Comments
 (0)