Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Principals from multiple tenants can run queries and commands in a single Azure Data Explorer cluster. In this article, you'll learn how to give cluster access to principals from another tenant.
Overview
In order for principals from tenants other then the cluster home tenant to use it,
- The principal must have a role assignment permitting access to the cluster
- The cluster must be configured to allow access to the external tenant
Note
- Validation of trusted external tenants preceeds and is indepenent of validation of role assignment.
- Allowed Tenants and Allowed Principals are managed indepently.
- Role assignments may exist for principals in tenants not permitted by the cluster.
- Removing a trusted external tenant does not implicitly drop role assignments of principals from this tenant.
Configuring External Trusted Tenants
To set the trustedExternalTenants on the cluster, use ARM Templates, AZ CLI, PowerShell, Azure Resource Explorer, or send an API request.
The following examples show how to define trusted tenants in the portal and with an API request.
In the Azure portal, go to your Azure Data Explorer cluster page.
In the left-hand menu, under Settings, select Security.
Define the desired tenants permissions.
Add Principals
After updating the trustedExternalTenants property, give access to principals from the approved tenants. Use ARM to give All Database level permissions. Alternatively, to give access to a database, table, function, or materialized view level, use management commands.