You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/attestation-structure.md
+21-13Lines changed: 21 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,16 +8,17 @@ author: timwarner-msft
8
8
---
9
9
# Azure Policy attestation structure
10
10
11
-
`Microsoft.PolicyInsights/attestations`, called an Attestation resource, is a new proxy resource type
12
-
that sets the compliance states for targeted resources in a manual policy. You can only have one
13
-
attestation on one resource for an individual policy. In preview, Attestations are available
14
-
only through the Azure Resource Manager (ARM) API.
11
+
Attestations are used by Azure Policy to set compliance states of resources or scopes targeted by [manual policies](effects.md#manual-preview). They also allow users to provide additional metadata or link to evidence which accompanies the attested compliance state.
15
12
16
-
Below is an example of creating a new attestation resource:
13
+
> [!NOTE]
14
+
> In preview, Attestations are available only through the Azure Resource Manager (ARM) API.
15
+
16
+
Below is an example of creating a new attestation resource which sets the compliance state for resources within a desired resource group:
17
17
18
18
```http
19
19
PUT http://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PolicyInsights/attestations/{name}?api-version=2019-10-01
20
20
```
21
+
Attestations can be used to set the compliance state of an individual resource or a scope. A resource can have one attestation for an individual manual policy assignment.
21
22
22
23
## Request body
23
24
@@ -41,19 +42,26 @@ Below is a sample attestation resource JSON object:
|policyAssignmentId |Required assignment ID for which the state is being set. |
50
-
|policyDefinitionReferenceId |Optional definition reference ID, if within a policy initiative. |
51
-
|complianceState |Desired state of the resources. Allowed values are `Compliant`, `NonCompliant`, and `Unknown`. |
52
-
|owner |Optional Azure AD object ID of responsible party. |
53
-
|comments |Optional description of why state is being set. |
54
-
|evidence |Optional link array for attestation evidence. |
55
-
56
-
Because attestations are a separate resource from policy assignments, they have their own lifecycle. You can PUT, GET and DELETE attestations by using the ARM API. See the [Policy REST API Reference](/rest/api/policy) for more details.
54
+
|`policyAssignmentId`|Required assignment ID for which the state is being set. |
55
+
|`policyDefinitionReferenceId`|Optional definition reference ID, if within a policy initiative. |
56
+
|`complianceState`|Desired state of the resources. Allowed values are `Compliant`, `NonCompliant`, and `Unknown`. |
57
+
|`expiresOn`|Optional date on which the compliance state should revert from the attested compliance state to the default state |
58
+
|`owner`|Optional Azure AD object ID of responsible party. |
59
+
|`comments`|Optional description of why state is being set. |
60
+
|`evidence`|Optional array of links to attestation evidence. |
61
+
|`assessmentDate`|Date at which the evidence was assessed. |
62
+
|`metadata`|Optional additional information about the attestation. |
63
+
64
+
Because attestations are a separate resource from policy assignments, they have their own lifecycle. You can PUT, GET and DELETE attestations using the ARM API. Attestations are removed if the related manual policy assignment or policyDefinitionReferenceId are deleted, or if a resource unique to the attestation is deleted. See the [Policy REST API Reference](/rest/api/policy) for more details.
0 commit comments