Skip to content

Access Cloud Resources Across Tenants Without Secrets: A Game-Changer for Multi-Tenant Security

Access Cloud Resources Across Tenants Without Secrets: A Game-Changer for Multi-Tenant Security

Section titled “Access Cloud Resources Across Tenants Without Secrets: A Game-Changer for Multi-Tenant Security”

Managing access across multiple cloud tenants has traditionally been a challenge for IT admins and developers. Securely connecting applications and services between tenants often requires shared secrets, certificates, or keys—solutions that can be cumbersome to manage and introduce security risks if mishandled.

Enter Microsoft’s latest innovation: Access Cloud Resources Across Tenants Without Secrets. This new feature simplifies multi-tenant resource access while eliminating the need for shared secrets, offering a more secure, efficient, and scalable solution.


This capability allows you to connect cloud resources and services across different Azure Active Directory (Entra ID) tenants without relying on secrets or certificates for authentication.

Key Innovation: Instead of secrets, the feature leverages federated identity credentials in Entra ID. These credentials allow workloads, like applications or automation scripts, to authenticate directly using their managed identity—removing the need for long-lived credentials like passwords, API keys, or client secrets.


BenefitCapabilityBusiness Value
Eliminates Secrets ManagementRemoves dependency on shared secrets and certificatesReduces operational overhead and credential leakage risk
Enhanced SecurityUses managed identities instead of static credentialsReduces attack surface with automatically managed authentication
Simplified AutomationEnables cross-tenant automation without embedded secretsStreamlines development and deployment workflows
Scalable Multi-Tenant OperationsSupports secure access between tenants without additional infrastructureEnables enterprise-scale multi-tenant architectures

Traditional cross-tenant access often relies on secrets or certificates, which need regular rotation and careful storage to prevent exposure. Federated identity credentials completely remove this dependency, reducing operational overhead and the risk of credential leakage.

By eliminating static credentials, this feature reduces the attack surface. Managed identities are inherently more secure because they are automatically managed by Azure, and their authentication lifecycle is tightly controlled.

Federated identity credentials make it easier to set up cross-tenant automation. Developers no longer need to worry about embedding secrets in code or managing certificates for service-to-service communication.

Organizations operating in a multi-tenant environment (e.g., large enterprises, service providers, or SaaS vendors) can now enable secure access between tenants without creating and maintaining additional infrastructure for credential management.


Ideal for: Organizations with automated workflows spanning multiple tenants

Scenario: A service in Tenant A needs to periodically access resources in Tenant B, such as fetching logs or triggering updates.

Solution: With federated identity credentials, this can be done seamlessly without storing secrets in Tenant A or managing a key vault.

Ideal for: SaaS vendors and application providers

Scenario: SaaS applications often require access to customer tenants for specific operations (e.g., managing Azure resources, accessing logs, or processing data).

Solution: Federated identity credentials allow SaaS vendors to securely authenticate their applications to customer tenants without requiring customers to manage and share secrets.

Ideal for: Enterprises with multiple Azure tenants

Scenario: Internal applications need to access resources across tenants securely—for example, a central monitoring app accessing diagnostic logs from multiple tenants.

Solution: Enables secure cross-tenant access without complex credential management infrastructure.


StepActionTechnical Details
1Create Federated Identity CredentialIn the Entra ID tenant where your application resides, create a federated identity credential and associate it with the application’s managed identity
2Grant Permissions Across TenantsIn the target tenant, assign the necessary permissions to the application using RBAC roles
3Authenticate Without SecretsThe application uses its managed identity to request tokens for the target tenant. Azure automatically handles authentication

  1. Set Up Federated Identity Credentials

    • Use the Azure portal, CLI, or PowerShell to create federated identity credentials for your application
  2. Configure Role Assignments

    • In the target tenant, configure the appropriate role assignments for the application
    • Ensure it has the necessary permissions to perform its tasks
  3. Update Application Code

    • Modify your application to authenticate using its managed identity
    • Azure SDKs make this straightforward by abstracting the authentication process
  4. Test and Monitor

    • Test the configuration thoroughly
    • Monitor access to ensure the application is functioning as expected without introducing security risks

PracticeImplementationSecurity Benefit
Principle of Least PrivilegeAssign minimum necessary permissionsReduces potential attack surface
Access MonitoringUse Azure Monitor and Entra ID logsEnables detection of anomalous access patterns
Conditional Access IntegrationEnforce conditional access policiesStrengthens security with additional verification layers
  • Regular Permission Reviews: Periodically audit cross-tenant access permissions
  • Automated Monitoring: Set up alerts for unusual access patterns
  • Documentation: Maintain clear records of cross-tenant configurations

Key Takeaway: The ability to access cloud resources across tenants without secrets marks a significant step forward in simplifying and securing multi-tenant environments.

By eliminating the need for shared secrets, this feature:

  • Reduces operational complexity
  • Improves security posture
  • Empowers developers to build scalable solutions in a cloud-first world

Ideal for organizations:

  • Managing multiple Azure tenants
  • Building SaaS applications
  • Automating cross-tenant workflows
  • Implementing enterprise-scale multi-tenant architectures

This capability represents a fundamental shift in how organizations approach multi-tenant security and is a must-explore for modern cloud deployments.