You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Configure Cross-Tenant IPAM with Azure Virtual Network Manager
3
+
description: Manage IP addresses across tenants with IPAM pools. Follow this guide to deploy and verify cross-tenant allocations.
4
+
author: mbender-ms
5
+
ms.author: mbender
6
+
ms.service: azure-virtual-network-manager
7
+
ms.topic: tutorial
8
+
ms.date: 05/21/2025
9
+
ms.custom:
10
+
- ai-gen-docs-bap
11
+
- ai-gen-title
12
+
- ai-seo-date:05/21/2025
13
+
#customer intent: As an IT operator, I want to set up cross-tenant IPAM using Azure Virtual Network Manager so that I can simplify IP address management for multiple tenants.
14
+
---
15
+
16
+
# Configure cross-tenant IPAM with Azure Virtual Network Manager
17
+
18
+
Managing IP addresses across multiple Azure tenants can be complex, especially in large or distributed organizations. Azure Virtual Network Manager simplifies this process by enabling centralized IP address management (IPAM) across tenants. This article shows you how to deploy a virtual network in a managed tenant using an IP address allocation from an IPAM pool in a management tenant, all through the Azure portal. You'll learn about prerequisites, step-by-step configuration, and how to remove IPAM allocations when they're no longer needed.
19
+
20
+
## Prerequisites
21
+
22
+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
23
+
24
+
- Two Azure tenants: a management tenant (Tenant A) and a managed tenant (Tenant B)
25
+
- Management tenant (Tenant A) must have:
26
+
- An Azure Virtual Network Manager instance. If you don't have a network manager instance, see [Create a network manager instance](create-virtual-network-manager-portal.md).
27
+
- An IPAM pool created in the network manager instance. If you don't have an IPAM pool, see [Create an IPAM pool](how-to-manage-ip-addresses-network-manager.md#create-an-ip-address-pool).
28
+
- Network manager configured with cross-tenant connection to Tenant B. For more information, see [Add remote tenant scope in Azure Virtual Network Manager](how-to-configure-cross-tenant-portal.md).
29
+
- *IPAM Pool User* role assigned to your user or service principal.
30
+
- Managed tenant (Tenant B) must have:
31
+
-*Network Contributor* role assigned at the subscription or virtual network level.
32
+
33
+
## Deploy cross-tenant IPAM using the Azure portal
34
+
35
+
### Create an IPAM allocation in the management tenant
36
+
37
+
1. Sign in to the [Azure portal](https://portal.azure.com/) using credentials with access to Tenant A.
38
+
39
+
1. Navigate to **Azure Virtual Network Manager** and locate your network manager instance.
40
+
41
+
1. Select **IP address pools** under **IP address management**.
42
+
43
+
1. Select the IPAM pool where you want to create an allocation.
44
+
45
+
1. Select **+ Create** > **Allocate resources**.
46
+
47
+
1. In the **Allocate resources** pane, select the **Tenant :** dropdown and choose the managed tenant (Tenant B) where you want to allocate IP addresses.
48
+
49
+
1. Select **Apply** and then select **Authenticate**.
50
+
51
+
> [!NOTE]
52
+
> The authentication process requires you to sign in with a user or service principal that has the *Network Contributor* role in Tenant B at the subscription or resource level.
53
+
54
+
1. After authentication, select the virtual network, you want to associate with the IP address pool and select **Associate**.
55
+
56
+
### Verify the cross-tenant association
57
+
58
+
1. In Tenant A's portal view, navigate to your IP address pool and select **Allocations** under **Settings**.
59
+
60
+
1. Select **Resources** and verify that the virtual network from Tenant B is listed as an allocated resource.
61
+
62
+
1. Switch to Tenant B's portal view and navigate to the virtual network that received the allocation.
63
+
64
+
1. Select **Subnets** under **Settings** and verify the name listed under **IPAM pool** matches the name of the IPAM pool in the management tenant (Tenant A).
65
+
66
+
:::image type="content" source="media/deploy-cross-tenant-ip-address-management/managed-tenant-virtual-network-subnets-settings-thumb.png" alt-text="Screenshot of virtual network subnet settings to verify IPAM pool matches management tenant pool." lightbox="media/deploy-cross-tenant-ip-address-management/managed-tenant-virtual-network-subnets-settings.png":::
67
+
68
+
## Remove IPAM allocation
69
+
70
+
To remove an IP allocation from a cross-tenant resource:
71
+
72
+
1. Sign in to the [Azure portal](https://portal.azure.com/) with credentials for Tenant A.
73
+
74
+
1. Navigate to **Azure Virtual Network Manager** and locate your network manager instance.
75
+
76
+
1. Select **IP address pools** under **IP address management**.
77
+
78
+
1. On the **IP address pools** page, select **Allocations** under **Settings**.
79
+
80
+
1. Select the virtual network that you want to remove the IPAM allocation from.
81
+
82
+
1. Select **X Remove**.
83
+
84
+
1. Authenticate to Tenant B and complete authentication.
85
+
86
+
1. Once authenticated, select **Yes** to remove the IPAM allocation.
87
+
88
+
1. Refresh the page to verify that the IPAM allocation is removed.
89
+
90
+
91
+
## Next steps
92
+
93
+
-[Learn about IP address management in Azure Virtual Network Manager](./concept-ip-address-management.md)
94
+
95
+
-[Add remote tenant scope in Azure Virtual Network Manager](./how-to-configure-cross-tenant-portal.md)
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-configure-cross-tenant-portal.md
+35-17Lines changed: 35 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,45 +1,54 @@
1
1
---
2
-
title: Configure a cross-tenant connection in Azure Virtual Network Manager - Portal
3
-
description: Learn how to create cross-tenant connections in Azure Virtual Network Manager to support virtual networks across subscriptions and management groups in different tenants.
2
+
title: Configure Cross-Tenant Connections in Azure Virtual Network Manager
3
+
description: Learn how to create cross-tenant connections in Azure Virtual Network Manager to manage virtual networks across tenants. Centralize network management and get started today.
4
4
author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-virtual-network-manager
7
-
ms.topic: how-to
8
-
ms.date: 05/07/2024
9
-
ms.custom: template-how-to
10
-
# Customer intent: As a cloud admin, I need to manage multiple tenants from a single network manager so that I can easily manage all network resources governed by Azure Virtual Network Manager.
7
+
ms.topic: how-to
8
+
ms.date: 05/21/2025
9
+
ms.custom:
10
+
- template-how-to
11
+
- ai-gen-docs-bap
12
+
- ai-gen-title
13
+
- ai-seo-date:05/21/2025
14
+
#customer intent: As a network engineer, I want to connect virtual networks in different Azure tenants so that I can centralize network management and policies.
11
15
---
12
16
13
-
# Configure a cross-tenant connection in Azure Virtual Network Manager - portal
17
+
# Configure cross-tenant connections in Azure Virtual Network Manager
14
18
15
-
In this article, you'll learn how to create [cross-tenant connections](concept-cross-tenant.md) in Azure Virtual Network Manager by using the Azure portal. Cross-tenant support allows organizations to use a central network manager for managing virtual networks across tenants and subscriptions.
19
+
This article explains how to create [cross-tenant connections](concept-cross-tenant.md) in Azure Virtual Network Manager using the Azure portal. Cross-tenant connections let you centrally manage virtual networks across different tenants and subscriptions, streamlining network management and policy enforcement.
16
20
17
-
First, you'll create the scope connection on the central network manager. Then, you'll create the network manager connection on the connecting tenant and verify the connection. Last, you'll add virtual networks from different tenants to your network group and verify. After you complete all the tasks, you can centrally manage the resources of other tenants from a single network manager.
21
+
First, you create the scope connection on the central network manager. Then, you create the network manager connection on the connecting tenant and verify the connection. Last, you add virtual networks from different tenants to your network group and verify. After you complete all the tasks, you can centrally manage the resources of other tenants from a single network manager.
18
22
19
23
## Prerequisites
20
24
21
25
- Two Azure tenants with virtual networks that you want to manage through Azure Virtual Network Manager. This article refers to the tenants as follows:
22
26
-**Central management tenant**: The tenant where an Azure Virtual Network Manager instance is installed, and where you'll centrally manage network groups from cross-tenant connections.
23
-
-**Target managed tenant**: The tenant that contains virtual networks to be managed. This tenant will be connected to the central management tenant.
27
+
-**Target managed tenant**: The tenant that contains virtual networks to be managed. This tenant is connected to the central management tenant.
28
+
24
29
- Azure Virtual Network Manager deployed in the central management tenant.
25
30
- These permissions:
31
+
26
32
- The administrator of the central management tenant has a guest account in the target managed tenant.
27
33
- The administrator guest account has *Network Contributor* permissions applied at the appropriate scope level (management group, subscription, or virtual network).
28
34
29
-
Need help with setting up permissions? Check out how to [add guest users in the Azure portal](../active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md) and how to [assign user roles to resources in the Azure portal](../role-based-access-control/role-assignments-portal.yml).
35
+
Need help with setting up permissions? Check out how to [Add guest users in the Azure portal](/entra/external-id/b2b-quickstart-add-guest-users-portal) and how to [assign user roles to resources in the Azure portal](../role-based-access-control/role-assignments-portal.yml).
30
36
31
37
## Create a scope connection within a network manager
32
38
33
39
Creation of the scope connection begins on the central management tenant with a network manager deployed. This is the network manager where you plan to manage all of your resources across tenants.
34
40
35
41
In this task, you set up a scope connection to add a subscription from a target tenant:
36
42
37
-
1. Log in to the Azure portal on the central management tenant.
43
+
1. Sign in to the Azure portal on the central management tenant.
44
+
38
45
1. Search for **Virtual network managers** and select your network manager from the list.
46
+
39
47
1. Under **Settings**, select **Cross-tenant connections**, and then select **Create cross-tenant connection**.
48
+
40
49
1. On the **Create a connection** page, enter the connection name and target tenant information, and then select **Create**.
41
50
42
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings.png" alt-text="Screenshot of settings entered to create a connection.":::
51
+
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings.png" alt-text="Screenshot of settings entered to create a cross-tenant connection in Azure Virtual Network Manager.":::
43
52
44
53
1. Verify that the scope connection is listed under **Cross-tenant connections** and the status is **Pending**.
45
54
@@ -48,32 +57,40 @@ In this task, you set up a scope connection to add a subscription from a target
48
57
After you create the scope connection, switch to the target managed tenant. Connect to the target managed tenant by creating another cross-tenant connection in the **Virtual Network Manager** hub:
49
58
50
59
1. In the target tenant, search for **Virtual network manager** and select **Virtual Network Managers**.
60
+
51
61
1. Under **Virtual Network Manager**, select **Cross-tenant connections**.
62
+
52
63
1. Select **+ Create** or **Create a connection**.
64
+
53
65
1. On the **Create a connection** page, enter the information for your central management tenant, and then select **Create**.
54
66
55
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings-target.png" alt-text="Screenshot of settings for creating a cross-tenant connection.":::
67
+
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings-target.png" alt-text="Screenshot of settings for creating a cross-tenant connection in Azure Virtual Network Manager.":::
56
68
57
69
## Verify the connection status
58
70
59
71
After you create both connections, it's time to verify the connection on the central management tenant:
60
72
61
73
1. On your central management tenant, select your network manager.
74
+
62
75
1. Select **Cross-tenant connections** under **Settings**, and verify that your cross-tenant connection is listed as **Connected**.
63
76
64
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/verify-status.png" alt-text="Screenshot that shows a cross-connection status of Connected.":::
77
+
:::image type="content" source="media/how-to-configure-cross-tenant-portal/verify-status.png" alt-text="Screenshot of cross-tenant connection status showing Connected in Azure Virtual Network Manager.":::
65
78
66
79
## Add static members to a network group
67
80
68
81
Now, add virtual networks from both tenants into a network group for static members.
69
82
70
83
> [!NOTE]
71
-
> Currently, cross-tenant connections support only static memberships within a network group. Dynamic membership with Azure Policy is not supported.
84
+
> Currently, cross-tenant connections support only static memberships within a network group. Dynamic membership with Azure Policy isn't supported.
72
85
73
86
1. From your network manager, add a network group if needed.
87
+
74
88
1. Select your network group, and then select **Add virtual networks** under **Manually add members**.
89
+
75
90
1. On the **Manually add members** page, select **Tenant:...** next to the search box, select the linked tenant from the list, and then select **Apply**.
91
+
76
92
1. To view the available virtual networks from the target managed tenant, select **Authenticate** and proceed through the authentication process. If you have multiple Azure accounts, select the one you're currently signed in with that has permissions to the target managed tenant.
93
+
77
94
1. Select the virtual networks to include in the network group, and then select **Add**.
78
95
79
96
## Verify group members
@@ -82,11 +99,12 @@ In the final step, you verify the virtual networks that are now members of the n
82
99
83
100
On the **Overview** page of the network group, select **View group members**. Verify that the virtual networks that you added manually are listed.
84
101
85
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/network-group-membership.png" alt-text="Screenshot of network group membership." lightbox="media/how-to-configure-cross-tenant-portal/network-group-membership-thumb.png":::
102
+
:::image type="content" source="media/how-to-configure-cross-tenant-portal/network-group-membership.png" alt-text="Screenshot of network group membership in Azure Virtual Network Manager." lightbox="media/how-to-configure-cross-tenant-portal/network-group-membership-thumb.png":::
86
103
87
104
## Next steps
88
105
89
106
In this article, you deployed a cross-tenant connection between two Azure subscriptions. To learn more about using Azure Virtual Network Manager, see:
107
+
90
108
-[Common uses cases for Azure Virtual Network Manager](concept-use-cases.md)
91
109
-[Learn to build a secure hub-and-spoke network](tutorial-create-secured-hub-and-spoke.md)
0 commit comments