Cross-tenant management experiences

As a service provider, you can use Azure Lighthouse to manage resources for multiple customers from within your own Azure Active Directory (Azure AD) tenant. Many tasks and services can be performed across managed tenants by using Azure delegated resource management.


Azure Lighthouse can also be used within an enterprise which has multiple Azure AD tenants of its own to simplify cross-tenant administration.

Understanding tenants and delegation

An Azure AD tenant is a representation of an organization. It's a dedicated instance of Azure AD that an organization receives when they create a relationship with Microsoft by signing up for Azure, Microsoft 365, or other services. Each Azure AD tenant is distinct and separate from other Azure AD tenants, and has its own tenant ID (a GUID). For more info, see What is Azure Active Directory?

Typically, in order to manage Azure resources for a customer, service providers would have to sign in to the Azure portal using an account associated with that customer's tenant, requiring an administrator in the customer's tenant to create and manage user accounts for the service provider.

With Azure Lighthouse, the onboarding process specifies users within the service provider's tenant who will be able to work on delegated subscriptions and resource groups in the customer's tenant. These users can then sign in to the Azure portal using their own credentials. Within the Azure portal, they can manage resources belonging to all customers to which they have access. This can be done by visiting the My customers page in the Azure portal, or by working directly within the context of that customer's subscription, either in the Azure portal or via APIs.

Azure Lighthouse allows greater flexibility to manage resources for multiple customers without having to sign in to different accounts in different tenants. For example, a service provider may have two customers with different responsibilities and access levels. Using Azure Lighthouse, authorized users can sign in to the service provider's tenant to access these resources.

Diagram showing customer resources managed through one service provider tenant.

APIs and management tool support

You can perform management tasks on delegated resources either directly in the portal or by using APIs and management tools (such as Azure CLI and Azure PowerShell). All existing APIs can be used when working with delegated resources, as long as the functionality is supported for cross-tenant management and the user has the appropriate permissions.

The Azure PowerShell Get-AzSubscription cmdlet will show the TenantId for the managing tenant by default. You can use the HomeTenantId and ManagedByTenantIds attributes for each subscription, allowing you to identify whether a returned subscription belongs to a managed tenant or to your managing tenant.

Similarly, Azure CLI commands such as az account list show the homeTenantId and managedByTenants attributes. If you don't see these values when using Azure CLI, try clearing your cache by running az account clear followed by az login --identity.

In the Azure REST API, the Subscriptions - Get and Subscriptions - List commands include ManagedByTenant.


In addition to tenant information related to Azure Lighthouse, tenants shown by these APIs may also reflect partner tenants for Azure Databricks or Azure managed applications.

We also provide APIs that are specific to performing Azure Lighthouse tasks. For more info, see the Reference section.

Enhanced services and scenarios

Most tasks and services can be performed on delegated resources across managed tenants. Below are some of the key scenarios where cross-tenant management can be especially effective.

Azure Arc:

Azure Automation:

  • Use Automation accounts to access and work with delegated resources

Azure Backup:

  • Back up and restore customer data from on-premises workloads, Azure VMs, Azure file shares, and more
  • View data for all delegated customer resources in Backup Center
  • Use the Backup Explorer to help view operational information of backup items (including Azure resources not yet configured for backup) and monitoring information (jobs and alerts) for delegated subscriptions. The Backup Explorer is currently available only for Azure VM data.
  • Use Backup Reports across delegated subscriptions to track historical trends, analyze backup storage consumption, and audit backups and restores.

Azure Blueprints:

  • Use Azure Blueprints to orchestrate the deployment of resource templates and other artifacts (requires additional access to prepare the customer subscription)

Azure Cost Management + Billing:

  • From the managing tenant, CSP partners can view, manage, and analyze pre-tax consumption costs (not inclusive of purchases) for customers who are under the Azure plan. The cost will be based on retail rates and the Azure role-based access control (Azure RBAC) access that the partner has for the customer's subscription. Currently, you can view consumption costs at retail rates for each individual customer subscription based on Azure RBAC access.

Azure Key Vault:

  • Create Key Vaults in customer tenants
  • Use a managed identity to create Key Vaults in customer tenants

Azure Kubernetes Service (AKS):

  • Manage hosted Kubernetes environments and deploy and manage containerized applications within customer tenants
  • Deploy and manage clusters in customer tenants
  • Use Azure Monitor for containers to monitor performance across customer tenants

Azure Migrate:

  • Create migration projects in the customer tenant and migrate VMs

Azure Monitor:

  • View alerts for delegated subscriptions, with the ability to view and refresh alerts across all subscriptions
  • View activity log details for delegated subscriptions
  • Log analytics: Query data from remote workspaces in multiple tenants (note that automation accounts used to access data from workspaces in customer tenants must be created in the same tenant)
  • Create, view, and manage metric alerts, log alerts, and activity log alerts in customer tenants
  • Create alerts in customer tenants that trigger automation, such as Azure Automation runbooks or Azure Functions, in the managing tenant through webhooks
  • Create diagnostic settings in workspaces created in customer tenants, to send resource logs to workspaces in the managing tenant
  • For SAP workloads, monitor SAP Solutions metrics with an aggregated view across customer tenants
  • For Azure AD B2C, route sign-in and auditing logs to different monitoring solutions

Azure Networking:

Azure Policy:

  • Create and edit policy definitions within delegated subscriptions
  • Deploy policy definitions and policy assignments across multiple tenants
  • Assign customer-defined policy definitions within delegated subscriptions
  • Customers see policies authored by the service provider alongside any policies they've authored themselves
  • Can remediate deployIfNotExists or modify assignments within the managed tenant
  • Note that viewing compliance details for non-compliant resources in customer tenants is not currently supported

Azure Resource Graph:

  • Now includes the tenant ID in returned query results, allowing you to identify whether a subscription belongs to a managed tenant

Azure Service Health:

  • Monitor the health of customer resources with Azure Resource Health
  • Track the health of the Azure services used by your customers

Azure Site Recovery:

  • Manage disaster recovery options for Azure virtual machines in customer tenants (note that you can't use RunAs accounts to copy VM extensions)

Azure Virtual Machines:

  • Use virtual machine extensions to provide post-deployment configuration and automation tasks on Azure VMs
  • Use boot diagnostics to troubleshoot Azure VMs
  • Access VMs with serial console
  • Integrate VMs with Azure Key Vault for passwords, secrets, or cryptographic keys for disk encryption by using managed identity through policy, ensuring that secrets are stored in a Key Vault in the managed tenants
  • Note that you can't use Azure Active Directory for remote login to VMs

Microsoft Defender for Cloud:

  • Cross-tenant visibility
    • Monitor compliance to security policies and ensure security coverage across all tenants' resources
    • Continuous regulatory compliance monitoring across multiple tenants in a single view
    • Monitor, triage, and prioritize actionable security recommendations with secure score calculation
  • Cross-tenant security posture management
    • Manage security policies
    • Take action on resources that are out of compliance with actionable security recommendations
    • Collect and store security-related data
  • Cross-tenant threat detection and protection
    • Detect threats across tenants' resources
    • Apply advanced threat protection controls such as just-in-time (JIT) VM access
    • Harden network security group configuration with Adaptive Network Hardening
    • Ensure servers are running only the applications and processes they should be with adaptive application controls
    • Monitor changes to important files and registry entries with File Integrity Monitoring (FIM)
  • Note that the entire subscription must be delegated to the managing tenant; Microsoft Defender for Cloud scenarios are not supported with delegated resource groups

Microsoft Sentinel:

Support requests:

Current limitations

With all scenarios, please be aware of the following current limitations:

  • Requests handled by Azure Resource Manager can be performed using Azure Lighthouse. The operation URIs for these requests start with However, requests that are handled by an instance of a resource type (such as Key Vault secrets access or storage data access) aren't supported with Azure Lighthouse. The operation URIs for these requests typically start with an address that is unique to your instance, such as or The latter also are typically data operations rather than management operations.
  • Role assignments must use Azure built-in roles. All built-in roles are currently supported with Azure Lighthouse, except for Owner or any built-in roles with DataActions permission. The User Access Administrator role is supported only for limited use in assigning roles to managed identities. Custom roles and classic subscription administrator roles are not supported.
  • While you can onboard subscriptions that use Azure Databricks, users in the managing tenant can't launch Azure Databricks workspaces on a delegated subscription at this time.
  • While you can onboard subscriptions and resource groups that have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. Deny assignments that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can't create their own deny assignments (user-assigned deny assignments).
  • Delegation of subscriptions across a national cloud and the Azure public cloud, or across two separate national clouds, is not supported.

Next steps