Skip to content

Commit 53f114f

Browse files
committed
updates rest api links
1 parent 4e21a69 commit 53f114f

File tree

6 files changed

+19
-19
lines changed

6 files changed

+19
-19
lines changed

articles/governance/policy/assign-policy-rest-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This guide uses REST API to create a policy assignment and to identify non-compl
2323

2424
## Review the REST API syntax
2525

26-
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
26+
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
2727

2828
The following example shows the REST API URI syntax to create a policy definition.
2929

@@ -105,7 +105,7 @@ az rest --method put --uri https://management.azure.com/subscriptions/{subscript
105105

106106
In PowerShell, the backtick (``` ` ```) is needed to escape the `at sign` (`@`) to specify a filename. In a Bash shell like Git Bash, omit the backtick.
107107

108-
For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
108+
For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
109109

110110
## Identify non-compliant resources
111111

@@ -168,7 +168,7 @@ Your results resemble the following example:
168168
}
169169
```
170170

171-
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policy/policy-states/list-query-results-for-resource-group).
171+
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policyinsights/policy-states/list-query-results-for-resource-group).
172172

173173
## Clean up resources
174174

@@ -188,7 +188,7 @@ az rest --method get --uri https://management.azure.com/subscriptions/{subscript
188188
The policy assignment 'audit-vm-managed-disks' is not found.
189189
```
190190

191-
For more information, go to [Policy Assignments - Delete](/rest/api/policy/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policy/policy-assignments/get).
191+
For more information, go to [Policy Assignments - Delete](/rest/api/policyauthorization/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policyauthorization/policy-assignments/get).
192192

193193
## Next steps
194194

articles/governance/policy/concepts/attestation-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
Attestations are used by Azure Policy to set compliance states of resources or scopes targeted by [manual policies](effect-manual.md). They also allow users to provide more metadata or link to evidence that accompanies the attested compliance state.
1111

1212
> [!NOTE]
13-
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policy/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
13+
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policyinsights/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
1414
1515
## Best practices
1616

articles/governance/policy/concepts/initiative-definition-structure.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ there are some _common_ properties used by Azure Policy and in built-ins.
113113
### Common metadata properties
114114

115115
- `version` (string): Tracks details about the version of the contents of a policy initiative
116-
definition. For built-ins, this metadata version follows the version property of the built-in. It's recommended to use the version property over this metadata version.
116+
definition. For built-ins, this metadata version follows the version property of the built-in. It's recommended to use the version property over this metadata version.
117117
- `category` (string): Determines under which category in the Azure portal the policy definition is
118118
displayed.
119119

@@ -126,19 +126,19 @@ there are some _common_ properties used by Azure Policy and in built-ins.
126126
as _deprecated_.
127127

128128
## Version (preview)
129-
Built-in policy initiatives can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
129+
Built-in policy initiatives can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
130130

131-
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey the level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean** as shown in the common metadata properties.
131+
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey the level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean** as shown in the common metadata properties.
132132

133-
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
134-
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to role definitionIds, adding or removing definitions within an initiative.
133+
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
134+
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to role definitionIds, adding or removing definitions within an initiative.
135135
- Patch Version (example: 2.1.4): introduce string or metadata changes and break glass security scenarios (rare).
136136

137137
Built-in initiatives are versioned, and specific versions of built-in policy definitions can be referenced within built-in or custom initiatives as well. For more information, see [reference definition and versions](#policy-definition-properties).
138138

139139
> While in preview, when creating an initiative through the portal, you will not be able to specify versions for built-in policy definition references. All built-in policy references in custom initiatives created through the portal will instead default to the latest version of the policy definition.
140-
>
141-
> For more information about
140+
>
141+
> For more information about
142142
> Azure Policy versions built-ins, see
143143
> [Built-in versioning](https://github.com/Azure/azure-policy/blob/master/built-in-policies/README.md).
144144
> To learn more about what it means for a policy to be _deprecated_ or in _preview_, see [Preview and deprecated policies](https://github.com/Azure/azure-policy/blob/master/built-in-policies/README.md#preview-and-deprecated-policies).
@@ -349,7 +349,7 @@ This information is:
349349
- Displayed in the Azure portal on the overview of a **control** on a Regulatory Compliance
350350
initiative.
351351
- Available via REST API. See the `Microsoft.PolicyInsights` resource provider and the
352-
[policyMetadata operation group](/rest/api/policy/policymetadata/getresource).
352+
[policyMetadata operation group](/rest/api/policyinsights/policy-metadata/get-resource).
353353
- Available via Azure CLI. See the [az policy metadata](/cli/azure/policy/metadata) command.
354354

355355
> [!IMPORTANT]
@@ -377,7 +377,7 @@ Below is an example of the **policyMetadata** object. This example metadata belo
377377
"category": "Access Control",
378378
"title": "Access Control Policy and Procedures",
379379
"owner": "Shared",
380-
"description": "**The organization:** \na. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: \n1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and \n2. Procedures to facilitate the implementation of the access control policy and associated access controls; and \n
380+
"description": "**The organization:** \na. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: \n1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and \n2. Procedures to facilitate the implementation of the access control policy and associated access controls; and \n
381381
\nb. Reviews and updates the current: \n1. Access control policy [Assignment: organization-defined frequency]; and \n2. Access control procedures [Assignment: organization-defined frequency].",
382382
"requirements": "**a.** The customer is responsible for developing, documenting, and disseminating access control policies and procedures. The customer access control policies and procedures address access to all customer-deployed resources and customer system access (e.g., access to customer-deployed virtual machines, access to customer-built applications). \n**b.** The customer is responsible for reviewing and updating access control policies and procedures in accordance with FedRAMP requirements.",
383383
"additionalContentUrl": "https://nvd.nist.gov/800-53/Rev4/control/AC-1"

articles/governance/policy/how-to/author-policies-for-arrays.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ To use this string with each SDK, use the following commands:
110110
parameter **params**
111111
- Azure PowerShell: Cmdlet [New-AzPolicyAssignment](/powershell/module/az.resources/New-Azpolicyassignment)
112112
with parameter **PolicyParameter**
113-
- REST API: In the _PUT_ [create](/rest/api/policy/policyassignments/create) operation as part of
113+
- REST API: In the _PUT_ [create](/rest/api/policyauthorization/policy-assignments/create) operation as part of
114114
the Request Body as the value of the **properties.parameters** property
115115

116116
## Using arrays in conditions

articles/governance/policy/how-to/get-compliance-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@ Use ARMClient or a similar tool to handle authentication to Azure for the REST A
289289

290290
With the REST API, summarization can be performed by container, definition, or assignment. Here's
291291
an example of summarization at the subscription level using Azure Policy Insight's [Summarize For
292-
Subscription](/rest/api/policy/policystates/summarizeforsubscription):
292+
Subscription](/rest/api/policyinsights/policy-states/summarize-for-subscription):
293293

294294
```http
295295
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2019-10-01
@@ -417,7 +417,7 @@ Your results resemble the following example:
417417
```
418418

419419
For more information about querying policy events, see the
420-
[Azure Policy Events](/rest/api/policy/policyevents) reference article.
420+
[Azure Policy Events](/rest/api/policyinsights/policy-events) reference article.
421421

422422
### Azure CLI
423423

articles/governance/policy/how-to/programmatically-create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,9 +164,9 @@ Use the following procedure to create a policy definition.
164164
with the ID of your [management group](../../management-groups/overview.md).
165165

166166
For more information about the structure of the query, see
167-
[Azure Policy Definitions - Create or Update](/rest/api/policy/policydefinitions/createorupdate)
167+
[Azure Policy Definitions - Create or Update](/rest/api/policyauthorization/policy-definitions/create-or-update)
168168
and
169-
[Policy Definitions - Create or Update At Management Group](/rest/api/policy/policydefinitions/createorupdateatmanagementgroup).
169+
[Policy Definitions - Create or Update At Management Group](/rest/api/policyauthorization/policy-definitions/create-or-update-at-management-group).
170170

171171
Use the following procedure to create a policy assignment and assign the policy definition at the
172172
resource group level.

0 commit comments

Comments
 (0)