1
1
---
2
- title : How to protect your resource hierarchy - Azure Governance
3
- description : Learn how to protect your resource hierarchy with hierarchy settings that include setting the default management group.
2
+ title : Protect your resource hierarchy - Azure Governance
3
+ description : Learn how to help protect your resource hierarchy by using hierarchy settings that include defining the default management group.
4
4
ms.date : 08/17/2021
5
5
ms.topic : conceptual
6
6
---
7
- # How to protect your resource hierarchy
7
+ # Protect your resource hierarchy
8
8
9
- Your resources, resource groups, subscriptions, management groups, and tenant collectively make up
10
- your resource hierarchy. Settings at the root management group, such as Azure custom roles or Azure
11
- Policy policy assignments, can impact every resource in your resource hierarchy. It's important to
12
- protect the resource hierarchy from changes that could negatively impact all resources.
9
+ Your resources, resource groups, subscriptions, management groups, and tenant compose
10
+ your resource hierarchy. Settings at the root management group, such as Azure custom roles or
11
+ policy assignments, can affect every resource in your resource hierarchy. It's important to
12
+ protect the resource hierarchy from changes that could negatively affect all resources.
13
13
14
- Management groups now have hierarchy settings that enable the tenant administrator to control these
14
+ Management groups have hierarchy settings that enable the tenant administrator to control these
15
15
behaviors. This article covers each of the available hierarchy settings and how to set them.
16
16
17
17
## Azure RBAC permissions for hierarchy settings
18
18
19
- Configuring any of the hierarchy settings requires the following two resource provider operations on
19
+ Configuring hierarchy settings requires the following resource provider operations on
20
20
the root management group:
21
21
22
22
- ` Microsoft.Management/managementgroups/settings/write `
23
23
- ` Microsoft.Management/managementgroups/settings/read `
24
24
25
- These operations only allow a user to read and update the hierarchy settings. The operations don't
26
- provide any other access to the management group hierarchy or resources in the hierarchy. Both of
27
- these operations are available in the Azure built-in role ** Hierarchy Settings Administrator ** .
25
+ These operations represent Azure role-based access control (Azure RBAC) permissions.
26
+ They only allow a user to read and update the hierarchy settings. They don't
27
+ provide any other access to the management group hierarchy or to resources in the hierarchy .
28
28
29
- ## Setting - Default management group
29
+ Both of
30
+ these operations are available in the Azure built-in role Hierarchy Settings Administrator.
30
31
31
- By default, a new subscription added within a tenant is added as a member of the root management
32
- group. If policy assignments, Azure role-based access control (Azure RBAC), and other governance
33
- constructs are assigned to the root management group, they immediately effect these new
32
+ ## Setting: Define the default management group
33
+
34
+ By default, a new subscription that you add in a tenant is added as a member of the root management
35
+ group. If you assign policy assignments, Azure RBAC, and other governance
36
+ constructs to the root management group, they immediately affect these new
34
37
subscriptions. For this reason, many organizations don't apply these constructs at the root
35
- management group even though that is the desired place to assign them. In other cases, a more
36
- restrictive set of controls is desired for new subscriptions, but shouldn 't be assigned to all
38
+ management group, even though that's the desired place to assign them. In other cases, an organization wants a more
39
+ restrictive set of controls for new subscriptions but doesn 't want to assign them to all
37
40
subscriptions. This setting supports both use cases.
38
41
39
- By allowing the default management group for new subscriptions to be defined, organization-wide
40
- governance constructs can be applied at the root management group, and a separate management group
41
- with policy assignments or Azure role assignments more suited to a new subscription can be defined .
42
+ By allowing the default management group for new subscriptions to be defined, you can apply organization-wide
43
+ governance constructs at the root management group. You can define a separate management group
44
+ with policy assignments or Azure role assignments that are more suited to a new subscription.
42
45
43
- ### Set default management group in portal
46
+ ### Define the default management group in the portal
44
47
45
- To configure this setting in the Azure portal, follow these steps:
48
+ 1 . Sign in to the [ Azure portal] ( https://portal.azure.com ) .
46
49
47
- 1 . Use the search bar to search for and select ' Management groups' .
50
+ 1 . Use the search bar to search for and select ** Management groups** .
48
51
49
52
1 . On the root management group, select ** details** next to the name of the management group.
50
53
51
54
1 . Under ** Settings** , select ** Hierarchy settings** .
52
55
53
56
1 . Select the ** Change default management group** button.
54
57
55
- > [ !NOTE ]
56
- > If the ** Change default management group ** button is disabled, either the management group
57
- > being viewed isn't the root management group or your security principal doesn't have the
58
- > necessary permissions to alter the hierarchy settings.
58
+ If the ** Change default management group ** button is unavailable, the cause is one of these conditions:
59
+
60
+ - The management group that you're viewing isn't the root management group.
61
+ - Your security principal doesn't have the necessary permissions to alter the hierarchy settings.
59
62
60
- 1 . Select a management group from your hierarchy and use the ** Select** button.
63
+ 1 . Select a management group from your hierarchy, and then choose the ** Select** button.
61
64
62
- ### Set default management group with REST API
65
+ ### Define the default management group by using the REST API
63
66
64
- To configure this setting with REST API, the
65
- [ Hierarchy Settings] ( /rest/api/managementgroups/hierarchysettings ) endpoint is called. To do so, use
67
+ To define the default management group by using the REST API, you must call the
68
+ [ Hierarchy Settings] ( /rest/api/managementgroups/hierarchysettings ) endpoint. Use
66
69
the following REST API URI and body format. Replace ` {rootMgID} ` with the ID of your root management
67
- group and ` {defaultGroupID} ` with the ID of the management group to become the default management
68
- group:
70
+ group. Replace ` {defaultGroupID} ` with the ID of the management group that will become the default management
71
+ group.
69
72
70
- - REST API URI
73
+ - REST API URI:
71
74
72
75
``` http
73
76
PUT https://management.azure.com/providers/Microsoft.Management/managementGroups/{rootMgID}/settings/default?api-version=2020-05-01
74
77
```
75
78
76
- - Request Body
79
+ - Request body:
77
80
78
81
``` json
79
82
{
@@ -84,49 +87,48 @@ group:
84
87
```
85
88
86
89
To set the default management group back to the root management group, use the same endpoint and set
87
- ** defaultManagementGroup** to a value of
90
+ ` defaultManagementGroup ` to a value of
88
91
` /providers/Microsoft.Management/managementGroups/{rootMgID} ` .
89
92
90
- ## Setting - Require authorization
93
+ ## Setting: Require authorization
91
94
92
- Any user, by default, can create new management groups within a tenant. Admins of a tenant may wish
93
- to only provide these permissions to specific users to maintain consistency and conformity in the
94
- management group hierarchy. If enabled, a user requires the
95
- ` Microsoft.Management/managementGroups/write ` operation on the root management group to create new
96
- child management groups.
95
+ Any user, by default, can create new management groups in a tenant. Admins of a tenant might want
96
+ to provide these permissions only to specific users, to maintain consistency and conformity in the
97
+ management group hierarchy. To create child management groups, a user requires the
98
+ ` Microsoft.Management/managementGroups/write ` operation on the root management group.
97
99
98
- ### Set require authorization in portal
100
+ ### Require authorization in the portal
99
101
100
- To configure this setting in the Azure portal, follow these steps:
102
+ 1 . Sign in to the [ Azure portal] ( https://portal.azure.com ) .
101
103
102
- 1 . Use the search bar to search for and select ' Management groups' .
104
+ 1 . Use the search bar to search for and select ** Management groups** .
103
105
104
106
1 . On the root management group, select ** details** next to the name of the management group.
105
107
106
108
1 . Under ** Settings** , select ** Hierarchy settings** .
107
109
108
- 1 . Toggle the ** Require permissions for creating new management groups.** option to on.
110
+ 1 . Turn on the ** Require permissions for creating new management groups** toggle.
111
+
112
+ If the ** Require permissions for creating new management groups** toggle is unavailable, the cause is one of these conditions:
109
113
110
- > [ !NOTE]
111
- > If the ** Require permissions for creating new management groups.** toggle is disabled, either
112
- > the management group being viewed isn't the root management group or your security principal
113
- > doesn't have the necessary permissions to alter the hierarchy settings.
114
+ - The management group that you're viewing isn't the root management group.
115
+ - Your security principal doesn't have the necessary permissions to alter the hierarchy settings.
114
116
115
- ### Set require authorization with REST API
117
+ ### Require authorization by using the REST API
116
118
117
- To configure this setting with REST API, the
118
- [ Hierarchy Settings] ( /rest/api/managementgroups/hierarchysettings ) endpoint is called. To do so, use
119
- the following REST API URI and body format. This value is a _ boolean _ , so provide either ** true** or
120
- ** false** for the value. A value of ** true** enables this method of protecting your management group
121
- hierarchy:
119
+ To require authorization by using the REST API, call the
120
+ [ Hierarchy Settings] ( /rest/api/managementgroups/hierarchysettings ) endpoint. Use
121
+ the following REST API URI and body format. This value is a Boolean , so provide either ` true ` or
122
+ ` false ` for the value. A value of ` true ` enables this method of protecting your management group
123
+ hierarchy.
122
124
123
- - REST API URI
125
+ - REST API URI:
124
126
125
127
``` http
126
128
PUT https://management.azure.com/providers/Microsoft.Management/managementGroups/{rootMgID}/settings/default?api-version=2020-05-01
127
129
```
128
130
129
- - Request Body
131
+ - Request body:
130
132
131
133
``` json
132
134
{
@@ -136,13 +138,13 @@ hierarchy:
136
138
}
137
139
```
138
140
139
- To turn the setting back off , use the same endpoint and set
140
- ** requireAuthorizationForGroupCreation** to a value of ** false** .
141
+ To turn off the setting, use the same endpoint and set
142
+ ` requireAuthorizationForGroupCreation ` to a value of ` false ` .
141
143
142
- ## PowerShell sample
144
+ ## Azure PowerShell sample
143
145
144
- PowerShell doesn't have an 'Az' command to set the default management group or set require
145
- authorization, but as a workaround you can use the REST API with the PowerShell sample below :
146
+ Azure PowerShell doesn't have an ` Az ` command to define the default management group or to require
147
+ authorization. As a workaround, you can use the REST API with the following Azure PowerShell sample:
146
148
147
149
``` powershell
148
150
$root_management_group_id = "Enter the ID of root management group"
@@ -162,9 +164,9 @@ $uri = "https://management.azure.com/providers/Microsoft.Management/managementGr
162
164
Invoke-RestMethod -Method PUT -Uri $uri -Headers $headers -Body $body
163
165
```
164
166
165
- ## Next steps
167
+ ## Related content
166
168
167
169
To learn more about management groups, see:
168
170
169
171
- [ Create management groups to organize Azure resources] ( ../create-management-group-portal.md )
170
- - [ How to change , delete, or manage your management groups] ( ../manage.md )
172
+ - [ Change , delete, or manage your management groups] ( ../manage.md )
0 commit comments