Skip to content

Commit 28b4f65

Browse files
authored
Merge pull request #197537 from timwarner-msft/timwarner-builtin
Lowercase "Built-in" to "built-in" in Policy docs
2 parents 58741b2 + 22b017e commit 28b4f65

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/governance/management-groups/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ need to be evaluated as true.
277277

278278
If you're doing the move action, you need:
279279

280-
- Management group write and Role Assignment write permissions on the child subscription or
280+
- Management group write and role assignment write permissions on the child subscription or
281281
management group.
282282
- Built-in role example: **Owner**
283283
- Management group write access on the target parent management group.

articles/governance/policy/overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Azure Policy has several permissions, known as operations, in two Resource Provi
113113
- [Microsoft.Authorization](../../role-based-access-control/resource-provider-operations.md#microsoftauthorization)
114114
- [Microsoft.PolicyInsights](../../role-based-access-control/resource-provider-operations.md#microsoftpolicyinsights)
115115

116-
Many Built-in roles grant permission to Azure Policy resources. The **Resource Policy Contributor**
116+
Many built-in roles grant permission to Azure Policy resources. The **Resource Policy Contributor**
117117
role includes most Azure Policy operations. **Owner** has full rights. Both **Contributor** and
118118
**Reader** have access to all _read_ Azure Policy operations.
119119

@@ -123,14 +123,14 @@ necessary to grant the managed identity on **deployIfNotExists** or **modify** a
123123
permissions.
124124

125125
> [!NOTE]
126-
> All Policy objects, including definitions, initatives, and assignments, will be readable to all
127-
> roles over its scope. For example, a Policy assignment scoped to an Azure subscription will be readable
126+
> All Policy objects, including definitions, initiatives, and assignments, will be readable to all
127+
> roles over its scope. For example, a Policy assignment scoped to an Azure subscription will be readable
128128
> by all role holders at the subscription scope and below.
129129
130-
If none of the Built-in roles have the permissions required, create a
130+
If none of the built-in roles have the permissions required, create a
131131
[custom role](../../role-based-access-control/custom-roles.md).
132132

133-
Azure Policy operations can have a significant impact on your Azure environment. Only the minimum set of
133+
Azure Policy operations can have a significant impact on your Azure environment. Only the minimum set of
134134
permissions necessary to perform a task should be assigned and these permissions should not be granted
135135
to users who do not need them.
136136

@@ -170,7 +170,7 @@ Here are a few pointers and tips to keep in mind:
170170

171171
- Once you've created an initiative assignment, policy definitions added to the initiative also
172172
become part of that initiative's assignments.
173-
173+
174174
- When an initiative assignment is evaluated, all policies within the initiative are also evaluated.
175175
If you need to evaluate a policy individually, it's better to not include it in an initiative.
176176

0 commit comments

Comments
 (0)