An Azure service used to deploy Grafana dashboards for analytics and monitoring solutions.
Hello Daniel-4204, We understand that you’re trying to enable Azure Managed Grafana in Tenant A to query data (e.g., Log Analytics) in Tenant B. You attempted to grant RBAC in Tenant B to the system‑assigned managed identity of the Grafana workspace from Tenant A, but the identity can’t be resolved in the IAM role picker even with cross‑tenant access enabled. You want to know whether cross‑tenant access is supported and, if so, the officially supported configuration and steps.
When you enable a System-Assigned Managed Identity in Tenant A, Entra ID creates a Service Principal only in Tenant A. It is not globally discoverable, which is why the Tenant B IAM picker returns “No Results.”
While you can materialize user-assigned managed identities or app registrations in Tenant B via CLI (az ad sp create --id), this is unsupported for system-assigned identities in Azure Managed Grafana. Grafana’s “Managed Identity” authentication path is hardcoded to request tokens only from its home tenant (Tenant A); it cannot request cross-tenant tokens.
You can try below supported configuration for cross-tenant Log Analytics queries in Azure Managed Grafana:
- Multi-tenant Service Principal: Create an App Registration in Tenant B, grant it Monitoring Reader, and configure Grafana in Tenant A to authenticate with that app using client ID/secret. https://learn.microsoft.com/en-us/entra/identity-platform/single-and-multi-tenant-apps https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal
- Azure Lighthouse: Delegate Tenant B’s subscription/resource group to Tenant A. Grafana’s managed identity in Tenant A can then access Tenant B resources as if they were local. https://learn.microsoft.com/en-us/azure/lighthouse/concepts/cross-tenant-management-experience
Hope this helps. Thanks
We have reached out to you in Private messages for additional details, could you please look into it and share us the details? Thanks