Skip to content

Commit 33ec007

Browse files
committed
Document the stacks built-in roles
1 parent 786ac43 commit 33ec007

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

articles/azure-resource-manager/bicep/deployment-stacks.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,16 @@ Deployment stacks provide the following benefits:
4242
- [What-if](./deploy-what-if.md) isn't available in the preview.
4343
- A management group-scoped stack is restricted from deploying to another management group. It can only deploy to the management group of the stack itself or to a child subscription.
4444

45+
## Built-in roles
46+
47+
> [!WARNING]
48+
> Enforcement of the RBAC permission [Microsoft.Resources/deploymentStacks/manageDenySetting/action](/azure/role-based-access-control/permissions/management-and-governance) is rolling out across regions, including Government Clouds.
49+
50+
There are two built-in roles for deployment stack:
51+
52+
- **Azure Deployment Stack Contributor**: Allows users to manage deployment stacks, but cannot create or delete deny assignments within the deployment stacks.
53+
- **Azure Deployment Stack Owner**: Allows users to manage deployment stacks, including those with deny assignments.
54+
4555
## Create deployment stacks
4656

4757
A deployment stack resource can be created at resource group, subscription, or management group scope. The template passed into a deployment stack defines the resources to be created or updated at the target scope specified for the template deployment.
@@ -592,6 +602,16 @@ To delete a managed resource, remove the resource definition from the underlying
592602

593603
## Protect managed resources against deletion
594604

605+
When creating a deployment stack, it's possible to assign a specific type of permissions to the managed resources, which prevents their deletion by unauthorized security principals. These settings are referred to as deny settings. You want to store the stack at a parent scope.
606+
607+
> [!NOTE]
608+
> The latest release requires specific permissions at the stack scope in order to:
609+
>
610+
> - Create or update a deployment stack and set the deny setting to a value other than "None".
611+
> - Update or delete a deployment stack with an existing deny setting of something other than "None"
612+
>
613+
> Use the [built-in roles](#built-in-roles) to grant the permissions.
614+
595615
# [PowerShell](#tab/azure-powershell)
596616

597617
The Azure PowerShell includes these parameters to customize the deny assignment:

0 commit comments

Comments
 (0)