Edit

Allow cross-tenant queries and commands

Principals from multiple tenants can run queries and commands in a single Azure Data Explorer cluster. In this article, you'll learn how to give cluster access to principals from another tenant.

Overview

In order for principals from tenants other then the cluster home tenant to use it,

  • The principal must have a role assignment permitting access to the cluster
  • The cluster must be configured to allow access to the external tenant

Note

  • Validation of trusted external tenants preceeds and is indepenent of validation of role assignment.
  • Allowed Tenants and Allowed Principals are managed indepently.
  • Role assignments may exist for principals in tenants not permitted by the cluster.
  • Removing a trusted external tenant does not implicitly drop role assignments of principals from this tenant.

Configuring External Trusted Tenants

To set the trustedExternalTenants on the cluster, use ARM Templates, AZ CLI, PowerShell, Azure Resource Explorer, or send an API request.

The following examples show how to define trusted tenants in the portal and with an API request.

  1. In the Azure portal, go to your Azure Data Explorer cluster page.

  2. In the left-hand menu, under Settings, select Security.

  3. Define the desired tenants permissions.

Screenshot of the Security blade.

Add Principals

After updating the trustedExternalTenants property, give access to principals from the approved tenants. Use ARM to give All Database level permissions. Alternatively, to give access to a database, table, function, or materialized view level, use management commands.