Skip to content

Commit 2bc35fa

Browse files
committed
stacks permission change
1 parent de3ad6c commit 2bc35fa

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/azure-resource-manager/bicep/deployment-stacks.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -594,6 +594,13 @@ To delete a managed resource, remove the resource definition from the underlying
594594

595595
When creating a deployment stack, it's possible to assign a specific type of permissions to the managed resources, which prevents their deletion by unauthorized security principals. These settings are referred to as deny settings. You want to store the stack at a parent scope.
596596

597+
A specific permission is required at the stack scope in order to do any of the following:
598+
599+
- Create or update a deployment stack and set the deny setting to a value other than "None".
600+
- Update or delete a deployment stack with an existing deny setting of something other than "None"
601+
602+
The built-in owners role has this permission by default. However, the built-in contributor role doesn't have this permission.
603+
597604
# [PowerShell](#tab/azure-powershell)
598605

599606
The Azure PowerShell includes these parameters to customize the deny assignment:

0 commit comments

Comments
 (0)