-
Notifications
You must be signed in to change notification settings - Fork 0
Cross Tenant
cross-tenant is the identity triage command for outside-tenant trust and management paths visible
from the current Azure tenant and subscription context.
Use it when you need to know whether another tenant may already control, enter, or extend trust into the environment.
- What visible trust or management paths extend beyond this tenant?
- Which outside-tenant paths matter first?
- Which external relationships most change who may be able to operate in this environment?
azurefox cross-tenant --output tableFor saved structured output:
azurefox cross-tenant --output json| signal | type | tenant | scope | posture | attack path | why it matters |
|---|---|---|---|---|---|---|
Contoso baseline ops |
lighthouse |
Contoso Corp. |
subscription::<id> |
priority=high; strongest=Owner; eligible=1 |
control via lighthouse |
Managed by another tenant with strong delegated access. |
external-ci-bridge |
external-sp |
<external-id> |
tenant |
priority=high; roles=Owner; assignments=2 |
pivot via external-sp |
Externally owned service principal with high-impact Azure roles. |
Authorization Policy |
policy |
<home-tenant> |
tenant |
priority=high; guest-invites=everyone; ... |
entry via policy |
Broad guest and app-registration posture may widen entry. |
- when the environment may not be governed only by its home tenant
- when Azure Lighthouse, external service principals, or tenant policy make outside access part of the real control picture
- when local-only identity review feels incomplete or misleading
- subscription- or resource-group-scope Azure Lighthouse delegation
- externally owned service principals with stronger Azure adjacency
- policy signals that make guest entry, app registration, or self-service consent broader than expected
- summaries that explain why one outside-tenant path deserves attention before quieter local identity detail
An environment can look local at first glance while important control or trust paths actually live in another tenant.
Azure Lighthouse can mean another tenant already has real access to the subscription. An externally
owned service principal can mean an app touching this tenant is really governed somewhere else.
Permissive tenant controls can make outside access easier to land or extend than expected.
cross-tenant brings those clues together so you can see the trust boundary clearly.
- subscription-scope Lighthouse delegations before narrower scope
- stronger delegated roles such as
OwnerorUser Access Administrator - standing access before eligible-only access
- externally owned service principals that also appear central to Azure control
- policy posture that amplifies a visible outside-tenant path
- If you see a
signal_type=lighthouserow at subscription scope, go next to Lighthouse because it shows the exact delegation evidence, role strength, and scope behind that outside-tenant management path. - If you see a
signal_type=external-sprow with high-impact Azure roles, go next to Permissions and Role-Trusts because one confirms the privilege and the other explains who can control that identity. - If you see a
signal_type=policyrow with broad guest invites or app registration, go next to Auth-Policies because it shows the exact tenant-level finding behind that cross-tenant posture signal.
- Start with the broadest delegated management paths before narrower local RBAC questions.
- Treat externally owned identities as real control-boundary clues, not just interesting metadata.
- Use this command to decide whether your next step belongs in delegation review, identity-trust review, or tenant-policy review.
cross-tenant is an outside-tenant trust and management command.
It should show the visible external paths most worth reviewing first. It is not a full Entra cross-tenant explorer, exhaustive guest inventory, or write-capable tenant relationship surface.
- Home
- Getting Started
- Platform Notes
- Running Against The Proof Lab
- Understanding Output
- Command Guides
Core
Identity
Config
Secrets
Storage
Resource
Compute
Orchestration
Chain Families
Grouped Sweeps
Investigations
- Axios - Post Exposure Azure Triage
- From EvilTokens to AzureFox: Why Token Theft Can Become Azure Control
- FAQ / Known Limits (coming soon)