Skip to content

Commit 0321af2

Browse files
committed
update
1 parent 2bc35fa commit 0321af2

File tree

1 file changed

+16
-8
lines changed

1 file changed

+16
-8
lines changed

articles/azure-resource-manager/bicep/deployment-stacks.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Create & deploy deployment stacks in Bicep
33
description: Describes how to create deployment stacks in Bicep.
44
ms.topic: conceptual
55
ms.custom: devx-track-azurecli, devx-track-azurepowershell, devx-track-bicep
6-
ms.date: 04/11/2024
6+
ms.date: 05/14/2024
77
---
88

99
# Deployment stacks (Preview)
1010

11-
An Azure deployment stack is a type of Azure resource that enables the management of a group of Azure resources as an atomic unit. When a Bicep file or an ARM JSON template is submitted to a deployment stack, it defines the resources that are managed by the stack. If a resource that was previously included in the template is removed, it will either be detached or deleted based on the specified _actionOnUnmanage_ behavior of the deployment stack. Similar to other Azure resources, access to the deployment stack can be restricted using Azure role-based access control (Azure RBAC).
11+
An Azure deployment stack is a type of Azure resource that enables the management of a group of Azure resources as an atomic unit. When a Bicep file or an ARM JSON template is submitted to a deployment stack, it defines the resources that are managed by the stack. If a resource that was previously included in the template is removed, it will either be detached or deleted based on the specified _actionOnUnmanage_ behavior of the deployment stack. Similar to other Azure resources, access to the deployment stack can be restricted using Azure role-based access control (Azure RBAC).
1212

1313
To create and update a deployment stack, you can utilize Azure CLI, Azure PowerShell, or the Azure portal along with Bicep files. These Bicep files are transpiled into ARM JSON templates, which are then deployed as a deployment object by the stack. The deployment stack offers additional capabilities beyond the [familiar deployment resources](./deploy-cli.md), serving as a superset of those capabilities.
1414

@@ -42,6 +42,13 @@ Deployment stacks provide the following benefits:
4242
- [What-if](./deploy-what-if.md) isn't available in the preview.
4343
- A management group-scoped stack is restricted from deploying to another management group. It can only deploy to the management group of the stack itself or to a child subscription.
4444

45+
## Built-in roles
46+
47+
There are two built-in roles for deployment stack:
48+
49+
- **Azure Deployment Stack Contributor**: Allows users to manage deployment stacks, but cannot create or delete deny assignments within the deployment stacks.
50+
- **Azure Deployment Stack Owner**: Alls users to manage deployment stacks, including those with deny assignments.
51+
4552
## Create deployment stacks
4653

4754
A deployment stack resource can be created at resource group, subscription, or management group scope. The template passed into a deployment stack defines the resources to be created or updated at the target scope specified for the template deployment.
@@ -594,12 +601,13 @@ To delete a managed resource, remove the resource definition from the underlying
594601

595602
When creating a deployment stack, it's possible to assign a specific type of permissions to the managed resources, which prevents their deletion by unauthorized security principals. These settings are referred to as deny settings. You want to store the stack at a parent scope.
596603

597-
A specific permission is required at the stack scope in order to do any of the following:
598-
599-
- Create or update a deployment stack and set the deny setting to a value other than "None".
600-
- Update or delete a deployment stack with an existing deny setting of something other than "None"
601-
602-
The built-in owners role has this permission by default. However, the built-in contributor role doesn't have this permission.
604+
> [!NOTE]
605+
> The latest release requires specific permissions at the stack scope in order to do:
606+
>
607+
> - Create or update a deployment stack and set the deny setting to a value other than "None".
608+
> - Update or delete a deployment stack with an existing deny setting of something other than "None"
609+
>
610+
> The built-in owner role has these permissions by default. However, the built-in contributor role doesn't have this permission.
603611
604612
# [PowerShell](#tab/azure-powershell)
605613

0 commit comments

Comments
 (0)