MSADVANCE LOGO
✕
  • Services
  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
  • Services

    Collaboration is the key to business success.

    Migración entre tenants Microsoft 365

    Microsoft 365 Migration

    Azure Cloud Architecture

    Azure Cloud Architecture

    Modern Workplace

    Security and Compliance

  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
Published by MSAdvance on December 14, 2025
Categories
  • Microsoft Azure
Tags
  • Azure Lighthouse
  • Azure Lighthouse ARM template
  • Azure Lighthouse guide 2025
  • Azure Marketplace Managed Service offer
  • Azure Monitor multitenant
  • Azure onboarding
  • Azure Policy multitenant
  • cross-tenant Azure management
  • CSP Azure services
  • Defender for Cloud multitenant
  • delegated resource management
  • Microsoft Sentinel multitenant
  • MSP Azure operations
  • multitenant Azure governance

Azure Lighthouse (2025): What It Is, How to Use It, and Why It Accelerates Multi-Customer, Multitenant Management

Azure Lighthouse lets you manage resources across multiple tenants from a single control plane using delegated resource management. It is designed for managed service providers (MSP/CSP), systems integrators, Microsoft partners, and also for enterprise groups with several tenants that want to apply the same policies, monitoring, and security everywhere, without having to constantly switch tenants or create cascades of guest users.

Updated: December 14, 2025

Want to centralize management of multiple Azure tenants with security and full traceability?

The delegation model (roles and scopes) is designed, onboarding is automated via ARM/Marketplace, and policies, monitoring, and evidence are left ready for audit.

Deploy Azure Lighthouse in your organization Multitenant operations and governance in Azure

Contents

  1. What Azure Lighthouse is and key benefits
  2. Architecture and concepts: delegation, roles, and scopes
  3. Onboarding via ARM template (step-by-step)
  4. Onboarding via Managed Service in Azure Marketplace
  5. Day-to-day operations: portal, CLI/API, Policy, Monitor, Defender, and Sentinel
  6. Security and governance: MFA, least privilege, “eligible” permissions, and auditing
  7. Costs and availability
  8. Limitations and technical considerations
  9. Use cases: MSP/CSP and multitenant enterprises
  10. Frequently asked questions about Azure Lighthouse
  11. Official links
  12. Conclusion and next steps

What Azure Lighthouse is and key benefits

Azure Lighthouse enables cross-tenant management with scalability, automation, and governance. The customer (the tenant that owns the subscriptions) decides what to delegate (one or several subscriptions, or specific resource groups), to whom to delegate it (users, groups, or service principals that live in the provider’s tenant), and with which permissions (RBAC roles). All of this is stored as an Azure resource, visible and revocable at any time.

The main advantage is that the provider team or platform team can work “as if” the remote resources were their own: they see subscriptions in the portal under “My customers”, can deploy Azure Policy, configure Azure Monitor, or review Defender for Cloud; but the customer still retains control and auditing in their own tenant. There is no need to create guest accounts for every engineer, which greatly reduces external identity management.

  • Management at scale: a single view for many subscriptions/customers, ideal for SOCs, NOCs, platform teams, and MSPs.
  • No guest accounts: no need to populate the customer’s Azure AD/Entra ID with B2B users; delegation is done per resource.
  • Native integration: works with most of Azure’s management plane: Policy, Monitor, Defender, Sentinel, Resource Graph, Arc.
  • Transparency: the customer can always see which provider has access and which roles it has, and can remove it without depending on that provider.
Tip: before delegating, draft a “service → role → scope” table so you do not end up granting Owner when only Contributor or a virtual-machine-specific role was needed. This also helps explain the model to the customer’s security team.

Architecture and concepts: delegation, roles, and scopes

Internally, Azure Lighthouse is built on the Azure Delegated Resource Management model. Delegation is represented as a resource of type Microsoft.ManagedServices/registrationDefinitions that the customer deploys into their subscription. That resource effectively says: “this tenant (managedByTenantId) can manage this scope (subscription or RG) with these identities and these roles.”

This enables two main strategies:

  • Broad delegation (entire subscription): simpler and recommended when you are going to manage posture (Defender, Policy, Monitor) or when the provider offers 24×7 services. You see everything and can manage alerts more effectively.
  • Granular delegation (resource group): useful when the customer only wants a specific workload to be managed (for example, a SAP system on IaaS, an IoT environment, or an RG with a critical app).

The identities that receive permissions can be:

  • Users in the provider’s tenant.
  • Groups in the provider’s tenant (the preferred option, because you can add/remove engineers without touching delegation in every customer).
  • Service principals for automations, IaC pipelines, or ITSM integrations.
Tip: always assign permissions to a group in the provider’s tenant. Then let the security team in that tenant manage group membership with regular access reviews. This way the customer does not need to receive a new ARM template every time a new engineer joins your company.

Onboarding via ARM template (step-by-step)

Onboarding via ARM template is the fastest way to get started. It does not require publishing anything to Marketplace and is perfect for pilots or for customers that already have a relationship with the provider and just need to authorize access.

Detailed steps:

  1. Define the model: the provider tells the customer which tenant should appear as managedByTenantId (the provider’s tenant) and which identities (users, groups, apps) will be used. The provider also specifies the appropriate RBAC role: Reader, Contributor, Security Admin, etc.
  2. Generate the template from the portal: in the provider’s Azure portal there is an Azure Lighthouse section (“My customers”). From there you can create a delegation definition and the portal automatically generates the ARM JSON with all fields. That JSON is then downloaded.
  3. Deliver the template to the customer: the customer deploys the ARM template in their subscription. They can do this from the portal (Import template → Review + create) or via CLI/PowerShell. It is important that the resource provider Microsoft.ManagedServices is registered in the subscription.
  4. Validate on both sides: in the provider’s tenant the new customer should appear under “My customers”; in the customer’s tenant the provider should appear under “Service providers”. If this does not show up, something was deployed incorrectly.
  5. Document the delegation: it is a good practice to store the exact JSON used so that, if you ever need to add another role or a new group, you build on the same base and do not end up creating a different model.
{
  "$schema": "https://schema.management.azure.com/schemas/2019-08-01/managedservicesDefinition.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "mspOfferName": {
      "type": "string"
    },
    "mspOfferDescription": {
      "type": "string"
    },
    "managedByTenantId": {
      "type": "string"
    },
    "authorizations": {
      "type": "array"
    }
  },
  "resources": [
    {
      "type": "Microsoft.ManagedServices/registrationDefinitions",
      "apiVersion": "2020-02-01",
      "name": "[guid(parameters('mspOfferName'))]",
      "properties": {
        "registrationDefinitionName": "[parameters('mspOfferName')]",
        "description": "[parameters('mspOfferDescription')]",
        "managedByTenantId": "[parameters('managedByTenantId')]",
        "authorizations": "[parameters('authorizations')]"
      }
    }
  ]
}

If later you need to add another group or a new application, you redeploy the same (updated) template or create a new delegation. The key point is not to lose the relationship between “customer” and “which permissions we granted”.

Tip: upload all delegation templates to a Git/DevOps repository with the customer name and date in the file name. This allows you to prove, in an audit, which permissions were granted and when.

Onboarding via Managed Service in Azure Marketplace

When you want customer onboarding to be self-service or when you are selling managed services packages, the cleanest route is to create a Managed Service offer in Azure Marketplace. This makes your service offer visible to the customer so they can purchase it, and during that same process the Lighthouse delegation is created.

This approach has commercial benefits (visibility, self-provisioning, plan control) and governance benefits (you can have a “basic” plan for everyone and an “extended” plan only for customers with a specific contract).

High-level steps:

  1. Create the offer in Partner Center, of type Managed Service.
  2. Define the plans (public and/or private) and, in each plan, specify which provider identities will get which roles.
  3. Publish and test with a test tenant to confirm that, when the offer is purchased, the delegation appears under “Service providers”.
  4. Explain to the customer how to acquire that offer and which permissions they will be granting.
Tip: publish a very simple offer (read-only) for new customers and use separate ARM templates to grant more permissions once the project is more mature. This reduces friction with the customer’s security team.

Day-to-day operations: portal, CLI/API, Policy, Monitor, Defender, and Sentinel

Once delegation is in place, day-to-day work looks very similar to managing your own subscriptions, but with a customer filter. From “My customers” in the portal you can select a customer; when you do, the portal switches context and everything you do from that point onward (create alerts, view machines, assign a Policy) is performed against the delegated subscription.

This is especially powerful for tasks such as:

  • Azure Policy: assign an initiative (e.g., ISO 27001 or Azure Security Benchmark) from the provider’s tenant to the customer tenant and see compliance for several customers in a single pane of glass.
  • Azure Monitor and diagnostics: send Activity logs, PaaS resource logs, and infrastructure logs to a Log Analytics workspace in the provider’s environment. Then build dashboards grouped by customer.
  • Defender for Cloud: review recommendations and secure score without logging into the customer’s tenant. If the customer has delegated the entire subscription, visibility is almost complete.
  • Microsoft Sentinel: collect telemetry from multiple customers into one or several workspaces and apply common rules and playbooks.

You can also work via CLI or PowerShell: simply run az account get-access-token --tenant <provider-tenant> (or your standard login) and then select the delegated subscription. ARM operations will run against that subscription as if it were your own.

Tip: when using centralized workspaces for many customers, tag each alert/ingestion with the customer and subscription identifier. This way you can generate monthly reports per customer and substantiate the service provided.

Security and governance: MFA, least privilege, “eligible” permissions, and auditing

One key point that is sometimes overlooked: the customer’s conditional access policies do not always protect the provider’s identities, because those identities live in another tenant. That is why security must be reinforced in the provider’s tenant:

  • Mandatory MFA for all engineers and apps operating via Lighthouse.
  • Conditional access (location, device, risk) in the provider’s tenant.
  • Group-based assignments and regular access reviews.
  • Just-in-time elevation (“eligible” permissions) for high-risk operations.
  • Auditing and log export on the customer side to verify who did what.

This strikes the right balance: the customer feels safe because they can revoke and audit access; the provider works efficiently because they no longer need to juggle 15 different guest accounts.

Tip: as part of the service, give the customer a short document listing which delegations are active, which provider groups can access their environment, which roles they have, and how the customer can revoke them. It is the clearest way to build trust.

Costs and availability

Azure Lighthouse has no additional cost. You pay the same as if the customer were not using it. The real cost comes from what you do on top (logs, Sentinel, Defender, monitoring, automations). For that reason, it is also a good idea to enable budgets and cost alerts per delegated subscription, even if the invoice is paid directly by the customer: this allows the provider to warn them in time.

It is available in public Azure. For sovereign clouds (government, China, etc.), you must verify compatibility, as cross-cloud delegation is not always supported.

Tip: configure “Cost Management” in the provider’s tenant but grouped by delegated subscription; this allows you to generate cost reports per customer and tie them to your SLA.

Limitations and technical considerations

Although very flexible, there are some limitations you need to keep in mind to avoid designing processes that cannot be executed later:

  • Management plane only: if your scenario requires reading storage contents or a Key Vault secret, you will need to grant data-plane permissions or deploy a function/Logic App in the customer’s tenant.
  • Built-in roles over custom roles: built-in roles are fully supported and tested; custom roles sometimes do not behave as expected in delegated scenarios.
  • Delegate at the right level: if you want to measure complete security posture, delegate the entire subscription; if you only delegate a single RG, some security views will be incomplete.
  • No cross-cloud mix: do not design assuming that a public Azure tenant can control a sovereign cloud tenant via Lighthouse.
Tip: whenever you need to touch data, design the action to run in the customer’s tenant and have the provider only trigger it. This way you do not break the data model or need to over-grant permissions.

Use cases: MSP/CSP and multitenant enterprises

MSP/CSP

The typical pattern is: the MSP has its own operations tenant, onboards each customer via ARM or Marketplace, and then applies the same Policy templates, diagnostic settings, and Sentinel rules to all of them. Incidents land in a central NOC/SOC, and you can see the customer’s context with a single click.

Multitenant enterprise

Many organizations have a corporate tenant plus “satellite” tenants for subsidiaries, projects, acquisitions, or geographical regions. With Lighthouse they can manage all of them from the corporate tenant without forcing subsidiaries to invite users or give up full control.

Tip: build a “platform tenant” (identities, groups, automation) and treat the rest as Lighthouse customers. This results in a clear, easy-to-explain architecture.

Frequently asked questions about Azure Lighthouse

Clear answers to the questions that usually appear when Lighthouse is proposed in managed operations, MSP, or multitenant projects.

Does Azure Lighthouse replace inviting external (B2B) users?

Not always. Lighthouse is better when you want to operate many customers or subscriptions from a single tenant without filling the customer’s directory with guest users. If what you need is a specific person from another organization to access a single app, B2B is still a valid option.

How do I grant access with Lighthouse step by step?

You generate an ARM template from the provider’s portal (or prepare a standard JSON), send it to the customer, and the customer deploys it into their subscription or resource group. Once it is finished, the provider sees the customer under “My customers” and the customer sees the provider under “Service providers”.

Can I revoke access at any time?

Yes. The customer can delete the delegation from their portal; from that moment on, the provider can no longer see or manage those resources. The action is recorded in Activity Log.

Which roles are recommended?

Use built-in roles that are as specific as possible: Reader for audits, Contributor for standard operations, a network or VM role if you only manage those components. Avoid Owner unless strictly justified.

Can Azure Lighthouse be used with Azure Policy and Defender for Cloud?

Yes. In fact, it is one of the most powerful scenarios: you assign policies and control the security posture of several customers from the provider’s tenant. To see everything, delegation should be at subscription level.

Does Lighthouse cost money?

No. Using Lighthouse has no additional cost. You pay for the consumption of the resources you manage and whatever you add on top (logs, Sentinel, Defender, etc.).

Can I read data (blobs, secrets, files) with Lighthouse?

Not directly. Lighthouse works in the management plane. To read data you need to grant data-plane permissions or create an automation in the customer’s tenant.

Is it safe to use Lighthouse if I already have conditional access policies?

Yes, but you must apply them in the provider’s tenant, because the identities doing the operations live there. Enforce mandatory MFA and perform regular member reviews.

Can I offer my managed service in Marketplace and have everything automated?

Yes. Create a Managed Service offer in Partner Center, publish it, and when the customer purchases it the delegation is created automatically. This is the most organized approach when you have a managed services portfolio.

What happens if I want to add another engineer to the team?

If you used groups from the provider’s tenant in the delegation, you only need to add the engineer to the group. There is no need to ask the customer for anything else.

Which limitations should I explain to the customer from the beginning?

That it works at the management plane (not the data plane), that some custom roles may not behave correctly, that for full security posture it is better to delegate the entire subscription, and that they can revoke delegation at any time.

Official links

  • Azure Lighthouse — overview
  • Onboard customers using ARM templates
  • Publish Managed Service offers in Marketplace
  • Recommended security practices
  • Azure Lighthouse architecture
  • View and manage customers
  • Samples and templates
  • Requirements for Managed Service offers (Partner Center)

Conclusion and next steps

Azure Lighthouse is the missing piece that lets Azure operations become truly multi-customer without the usual headaches: the customer keeps control and can revoke access, the provider works from its own tenant with its own security policies, and the platform team can standardize tools, dashboards, and runbooks.

The practical path usually looks like this: 1) define roles and scopes, 2) test an ARM-based delegation with a pilot customer, 3) standardize the templates, and 4) if you have a broader commercial offer, publish it to Marketplace. From there, adding Policy, Monitor, Defender, and Sentinel is mostly a matter of operational maturity.

Want to accelerate your rollout with confidence?

  • Delegation model (roles and scopes) and ready-to-use ARM templates.
  • Managed Service offer in Marketplace with public/private plans.
  • Policies, monitoring, and an evidence dossier for audits.

Design and deploy Azure Lighthouse Governance and operations at scale

Azure Lighthouse (2025): Complete guide for MSPs and multitenant enterprises
Share
0

Do you have an idea, a challenge, or a specific business need?

Speak with our experts about your next big project

This is only a glimpse of what we can do. Whatever you have in mind—no matter how unique or complex—we are ready to turn it into reality.

info@msadvance.com

Contact Us

Services

About Us

Blog

Cookies Policy

Privacy Statement

Legal Notice / Imprint

© 2025 MSAdvance | All rights reserved worldwide

MSAdvance
Gestionar consentimiento
Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones.
Funcional Always active
El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Estadísticas
El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en una web o en varias web con fines de marketing similares.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Ver preferencias
  • {title}
  • {title}
  • {title}