Skip to content

Commit 4e9d002

Browse files
Merge pull request #290507 from rthorn17/master
updating move scenario to be more clear
2 parents 49797a7 + 984b6e9 commit 4e9d002

File tree

1 file changed

+29
-15
lines changed

1 file changed

+29
-15
lines changed

articles/governance/management-groups/overview.md

Lines changed: 29 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ creating a hierarchy for governance by using management groups.
2727
Diagram of a root management group that holds both management groups and subscriptions. Some child management groups hold management groups, some hold subscriptions, and some hold both. One of the examples in the sample hierarchy is four levels of management groups, with all subscriptions at the child level.
2828
:::image-end:::
2929

30-
You can create a hierarchy that applies a policy, for example, that limits VM locations to the West US region in the management group called _Corp_. This policy will inherit all the Enterprise Agreement (EA) subscriptions that are descendants of that management group and will apply to all VMs under those subscriptions. The resource or subscription
30+
You can create a hierarchy that applies a policy, for example, that limits VM locations to the West US region in the management group called _Corp_. This policy inherits all the Enterprise Agreement (EA) subscriptions that are descendants of that management group and applies to all VMs under those subscriptions. The resource or subscription
3131
owner can't alter this security policy, to allow for improved governance.
3232

3333
> [!NOTE]
@@ -36,7 +36,7 @@ owner can't alter this security policy, to allow for improved governance.
3636
Another scenario where you would use management groups is to provide user access to multiple
3737
subscriptions. By moving multiple subscriptions under a management group, you can create one
3838
[Azure role assignment](../../role-based-access-control/overview.md) on the management group. The role
39-
will inherit that access to all the subscriptions. One assignment on the management group can enable
39+
inherits that access to all the subscriptions. One assignment on the management group can enable
4040
users to have access to everything they need, instead of scripting Azure role-based access control (RBAC) over different
4141
subscriptions.
4242

@@ -59,7 +59,7 @@ fold up to it.
5959

6060
The root management group allows for the application of global policies and Azure role assignments
6161
at the directory level. Initially, the [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
62-
Administrator role of this root group. After elevating access, the administrator can
62+
Administrator role of this root group. After the tenant administrator elevates access, the administrator can
6363
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
6464
you can assign your account as the owner of the root management group.
6565

@@ -107,11 +107,11 @@ resource groups, and resources within that Microsoft Entra tenant.
107107
Azure management groups support
108108
[Azure RBAC](../../role-based-access-control/overview.md) for all
109109
resource access and role definitions. Child resources that
110-
exist in the hierarchy inherit these permissions. Any Azure role can be assigned to a management group that will inherit down
110+
exist in the hierarchy inherit these permissions. Any Azure role can be assigned to a management group that inherits down
111111
the hierarchy to the resources.
112112

113113
For example, you can assign the Azure role VM Contributor to a
114-
management group. This role has no action on the management group but will inherit to all VMs under
114+
management group. This role has no action on the management group but inherits to all VMs under
115115
that management group.
116116

117117
The following chart shows the list of roles and the supported actions on management groups.
@@ -120,7 +120,7 @@ The following chart shows the list of roles and the supported actions on managem
120120
|:-------------------------- |:------:|:------:|:--------:|:------:|:-------------:| :------------:|:-----:|
121121
|Owner | X | X | X | X | X | X | X |
122122
|Contributor | X | X | X | X | | | X |
123-
|Management Group Contributor\* | X | X | X | X | | | X |
123+
|Management Group Contributor\* | X | X | [Moving Details](#moving-subscriptions-and-management-groups) | X | | | X |
124124
|Reader | | | | | | | X |
125125
|Management Group Reader\* | | | | | | | X |
126126
|Resource Policy Contributor | | | | | | X | |
@@ -129,16 +129,30 @@ The following chart shows the list of roles and the supported actions on managem
129129
\*: These roles allow users to perform the specified actions only on the management group scope.
130130

131131
\*\*: Role assignments on the root management group aren't required to move a subscription or a
132-
management group to and from it.
133-
134-
For details on moving items within the hierarchy, see [Manage your resources with management groups](manage.md).
132+
management group to and from it.
133+
134+
## Moving subscriptions and management groups
135+
Moving subscriptions and management groups requires different role assignments to be applied. To move a child subscription or management group the following permissions are needed:
136+
137+
- The child subscription or management group being moved
138+
- `Microsoft.management/managementgroups/write`
139+
- `Microsoft.management/managementgroups/subscriptions/write` (only for subscriptions)
140+
- `Microsoft.Authorization/roleAssignments/write`
141+
- `Microsoft.Authorization/roleAssignments/delete`
142+
- `Microsoft.Management/register/action`
143+
- Target parent management group
144+
- `Microsoft.management/managementgroups/write`
145+
- Current parent management group
146+
- `Microsoft.management/managementgroups/write`
147+
148+
For more information on moving items within the hierarchy, see [Manage your resources with management groups](manage.md).
135149

136150
## Azure custom role definition and assignment
137151

138152
You can define a management group as an assignable scope in an Azure custom role definition.
139-
The Azure custom role will then be available for assignment on that management
153+
The Azure custom role is available for assignment on that management
140154
group and any management group, subscription, resource group, or resource under it. The custom role
141-
will inherit down the hierarchy like any built-in role.
155+
inherits down the hierarchy like any built-in role.
142156

143157
For information about the limitations with custom roles and management groups, see [Limitations](#limitations) later in this article.
144158

@@ -186,7 +200,7 @@ because both are custom-defined fields in creating a management group.
186200

187201
Role definitions are assignable scopes anywhere within the management group hierarchy. A role
188202
definition can be on a parent management group, whereas the actual role assignment exists on
189-
the child subscription. Because there's a relationship between the two items, you'll receive an error
203+
the child subscription. Because there's a relationship between the two items, an error is seen
190204
if you try to separate the assignment from its definition.
191205

192206
For example, consider the following example of a small section of a hierarchy.
@@ -198,8 +212,8 @@ For example, consider the following example of a small section of a hierarchy.
198212
Assume that a custom role is defined on the sandbox management group. That custom role is then
199213
assigned on the two sandbox subscriptions.
200214

201-
If you try to move one of those subscriptions to be a child of the Corp management group, you'll break the path from subscription role assignment to the role definition for the sandbox management group. In this scenario, you'll receive an error that says the move isn't allowed because it will
202-
break this relationship.
215+
If you try to move one of those subscriptions to be a child of the Corp management group, this breaks the path from subscription role assignment to the role definition for the sandbox management group. In this scenario, an error is received that says the move isn't allowed because it
216+
breaks this relationship.
203217

204218
To fix this scenario, you have these options:
205219

@@ -208,7 +222,7 @@ To fix this scenario, you have these options:
208222
- Add the subscription to the role definition's assignable scope.
209223
- Change the assignable scope within the role definition. In this example, you can update the
210224
assignable scopes from the sandbox management group to the root management group so that both branches of the hierarchy can reach the definition.
211-
- Create another custom role that's defined in the other branch. This new role also requires you to change the role
225+
- Create another custom role is defined in the other branch. This new role also requires you to change the role
212226
on the subscription.
213227

214228
### Limitations

0 commit comments

Comments
 (0)