Skip to content

Commit 7f71e0e

Browse files
committed
edit pass: articles-about-management-groups
1 parent ae7ba1e commit 7f71e0e

File tree

3 files changed

+294
-296
lines changed

3 files changed

+294
-296
lines changed
Lines changed: 68 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -1,79 +1,82 @@
11
---
2-
title: How to protect your resource hierarchy - Azure Governance
3-
description: Learn how to protect your resource hierarchy with hierarchy settings that include setting the default management group.
2+
title: Protect your resource hierarchy - Azure Governance
3+
description: Learn how to help protect your resource hierarchy by using hierarchy settings that include defining the default management group.
44
ms.date: 08/17/2021
55
ms.topic: conceptual
66
---
7-
# How to protect your resource hierarchy
7+
# Protect your resource hierarchy
88

9-
Your resources, resource groups, subscriptions, management groups, and tenant collectively make up
10-
your resource hierarchy. Settings at the root management group, such as Azure custom roles or Azure
11-
Policy policy assignments, can impact every resource in your resource hierarchy. It's important to
12-
protect the resource hierarchy from changes that could negatively impact all resources.
9+
Your resources, resource groups, subscriptions, management groups, and tenant compose
10+
your resource hierarchy. Settings at the root management group, such as Azure custom roles or
11+
policy assignments, can affect every resource in your resource hierarchy. It's important to
12+
protect the resource hierarchy from changes that could negatively affect all resources.
1313

14-
Management groups now have hierarchy settings that enable the tenant administrator to control these
14+
Management groups have hierarchy settings that enable the tenant administrator to control these
1515
behaviors. This article covers each of the available hierarchy settings and how to set them.
1616

1717
## Azure RBAC permissions for hierarchy settings
1818

19-
Configuring any of the hierarchy settings requires the following two resource provider operations on
19+
Configuring hierarchy settings requires the following resource provider operations on
2020
the root management group:
2121

2222
- `Microsoft.Management/managementgroups/settings/write`
2323
- `Microsoft.Management/managementgroups/settings/read`
2424

25-
These operations only allow a user to read and update the hierarchy settings. The operations don't
26-
provide any other access to the management group hierarchy or resources in the hierarchy. Both of
27-
these operations are available in the Azure built-in role **Hierarchy Settings Administrator**.
25+
These operations represent Azure role-based access control (Azure RBAC) permissions.
26+
They only allow a user to read and update the hierarchy settings. They don't
27+
provide any other access to the management group hierarchy or to resources in the hierarchy.
2828

29-
## Setting - Default management group
29+
Both of
30+
these operations are available in the Azure built-in role Hierarchy Settings Administrator.
3031

31-
By default, a new subscription added within a tenant is added as a member of the root management
32-
group. If policy assignments, Azure role-based access control (Azure RBAC), and other governance
33-
constructs are assigned to the root management group, they immediately effect these new
32+
## Setting: Define the default management group
33+
34+
By default, a new subscription that you add in a tenant is added as a member of the root management
35+
group. If you assign policy assignments, Azure RBAC, and other governance
36+
constructs to the root management group, they immediately affect these new
3437
subscriptions. For this reason, many organizations don't apply these constructs at the root
35-
management group even though that is the desired place to assign them. In other cases, a more
36-
restrictive set of controls is desired for new subscriptions, but shouldn't be assigned to all
38+
management group, even though that's the desired place to assign them. In other cases, an organization wants a more
39+
restrictive set of controls for new subscriptions but doesn't want to assign them to all
3740
subscriptions. This setting supports both use cases.
3841

39-
By allowing the default management group for new subscriptions to be defined, organization-wide
40-
governance constructs can be applied at the root management group, and a separate management group
41-
with policy assignments or Azure role assignments more suited to a new subscription can be defined.
42+
By allowing the default management group for new subscriptions to be defined, you can apply organization-wide
43+
governance constructs at the root management group. You can define a separate management group
44+
with policy assignments or Azure role assignments that are more suited to a new subscription.
4245

43-
### Set default management group in portal
46+
### Define the default management group in the portal
4447

45-
To configure this setting in the Azure portal, follow these steps:
48+
1. Sign in to the [Azure portal](https://portal.azure.com).
4649

47-
1. Use the search bar to search for and select 'Management groups'.
50+
1. Use the search bar to search for and select **Management groups**.
4851

4952
1. On the root management group, select **details** next to the name of the management group.
5053

5154
1. Under **Settings**, select **Hierarchy settings**.
5255

5356
1. Select the **Change default management group** button.
5457

55-
> [!NOTE]
56-
> If the **Change default management group** button is disabled, either the management group
57-
> being viewed isn't the root management group or your security principal doesn't have the
58-
> necessary permissions to alter the hierarchy settings.
58+
If the **Change default management group** button is unavailable, the cause is one of these conditions:
59+
60+
- The management group that you're viewing isn't the root management group.
61+
- Your security principal doesn't have the necessary permissions to alter the hierarchy settings.
5962

60-
1. Select a management group from your hierarchy and use the **Select** button.
63+
1. Select a management group from your hierarchy, and then choose the **Select** button.
6164

62-
### Set default management group with REST API
65+
### Define the default management group by using the REST API
6366

64-
To configure this setting with REST API, the
65-
[Hierarchy Settings](/rest/api/managementgroups/hierarchysettings) endpoint is called. To do so, use
67+
To define the default management group by using the REST API, you must call the
68+
[Hierarchy Settings](/rest/api/managementgroups/hierarchysettings) endpoint. Use
6669
the following REST API URI and body format. Replace `{rootMgID}` with the ID of your root management
67-
group and `{defaultGroupID}` with the ID of the management group to become the default management
68-
group:
70+
group. Replace `{defaultGroupID}` with the ID of the management group that will become the default management
71+
group.
6972

70-
- REST API URI
73+
- REST API URI:
7174

7275
```http
7376
PUT https://management.azure.com/providers/Microsoft.Management/managementGroups/{rootMgID}/settings/default?api-version=2020-05-01
7477
```
7578

76-
- Request Body
79+
- Request body:
7780

7881
```json
7982
{
@@ -84,49 +87,48 @@ group:
8487
```
8588

8689
To set the default management group back to the root management group, use the same endpoint and set
87-
**defaultManagementGroup** to a value of
90+
`defaultManagementGroup` to a value of
8891
`/providers/Microsoft.Management/managementGroups/{rootMgID}`.
8992

90-
## Setting - Require authorization
93+
## Setting: Require authorization
9194

92-
Any user, by default, can create new management groups within a tenant. Admins of a tenant may wish
93-
to only provide these permissions to specific users to maintain consistency and conformity in the
94-
management group hierarchy. If enabled, a user requires the
95-
`Microsoft.Management/managementGroups/write` operation on the root management group to create new
96-
child management groups.
95+
Any user, by default, can create new management groups in a tenant. Admins of a tenant might want
96+
to provide these permissions only to specific users, to maintain consistency and conformity in the
97+
management group hierarchy. To create child management groups, a user requires the
98+
`Microsoft.Management/managementGroups/write` operation on the root management group.
9799

98-
### Set require authorization in portal
100+
### Require authorization in the portal
99101

100-
To configure this setting in the Azure portal, follow these steps:
102+
1. Sign in to the [Azure portal](https://portal.azure.com).
101103

102-
1. Use the search bar to search for and select 'Management groups'.
104+
1. Use the search bar to search for and select **Management groups**.
103105

104106
1. On the root management group, select **details** next to the name of the management group.
105107

106108
1. Under **Settings**, select **Hierarchy settings**.
107109

108-
1. Toggle the **Require permissions for creating new management groups.** option to on.
110+
1. Turn on the **Require permissions for creating new management groups** toggle.
111+
112+
If the **Require permissions for creating new management groups** toggle is unavailable, the cause is one of these conditions:
109113

110-
> [!NOTE]
111-
> If the **Require permissions for creating new management groups.** toggle is disabled, either
112-
> the management group being viewed isn't the root management group or your security principal
113-
> doesn't have the necessary permissions to alter the hierarchy settings.
114+
- The management group that you're viewing isn't the root management group.
115+
- Your security principal doesn't have the necessary permissions to alter the hierarchy settings.
114116

115-
### Set require authorization with REST API
117+
### Require authorization by using the REST API
116118

117-
To configure this setting with REST API, the
118-
[Hierarchy Settings](/rest/api/managementgroups/hierarchysettings) endpoint is called. To do so, use
119-
the following REST API URI and body format. This value is a _boolean_, so provide either **true** or
120-
**false** for the value. A value of **true** enables this method of protecting your management group
121-
hierarchy:
119+
To require authorization by using the REST API, call the
120+
[Hierarchy Settings](/rest/api/managementgroups/hierarchysettings) endpoint. Use
121+
the following REST API URI and body format. This value is a Boolean, so provide either `true` or
122+
`false` for the value. A value of `true` enables this method of protecting your management group
123+
hierarchy.
122124

123-
- REST API URI
125+
- REST API URI:
124126

125127
```http
126128
PUT https://management.azure.com/providers/Microsoft.Management/managementGroups/{rootMgID}/settings/default?api-version=2020-05-01
127129
```
128130

129-
- Request Body
131+
- Request body:
130132

131133
```json
132134
{
@@ -136,13 +138,13 @@ hierarchy:
136138
}
137139
```
138140

139-
To turn the setting back off, use the same endpoint and set
140-
**requireAuthorizationForGroupCreation** to a value of **false**.
141+
To turn off the setting, use the same endpoint and set
142+
`requireAuthorizationForGroupCreation` to a value of `false`.
141143

142-
## PowerShell sample
144+
## Azure PowerShell sample
143145

144-
PowerShell doesn't have an 'Az' command to set the default management group or set require
145-
authorization, but as a workaround you can use the REST API with the PowerShell sample below:
146+
Azure PowerShell doesn't have an `Az` command to define the default management group or to require
147+
authorization. As a workaround, you can use the REST API with the following Azure PowerShell sample:
146148

147149
```powershell
148150
$root_management_group_id = "Enter the ID of root management group"
@@ -162,9 +164,9 @@ $uri = "https://management.azure.com/providers/Microsoft.Management/managementGr
162164
Invoke-RestMethod -Method PUT -Uri $uri -Headers $headers -Body $body
163165
```
164166

165-
## Next steps
167+
## Related content
166168

167169
To learn more about management groups, see:
168170

169171
- [Create management groups to organize Azure resources](../create-management-group-portal.md)
170-
- [How to change, delete, or manage your management groups](../manage.md)
172+
- [Change, delete, or manage your management groups](../manage.md)

0 commit comments

Comments
 (0)