You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/deploy-to-subscription.md
+35-8Lines changed: 35 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Deploy resources to subscription
3
3
description: Describes how to create a resource group in an Azure Resource Manager template. It also shows how to deploy resources at the Azure subscription scope.
4
4
ms.topic: conceptual
5
-
ms.date: 03/23/2020
5
+
ms.date: 04/30/2020
6
6
---
7
7
8
8
# Create resource groups and resources at the subscription level
@@ -15,6 +15,7 @@ To deploy templates at the subscription level, use Azure CLI, PowerShell, or RES
15
15
16
16
You can deploy the following resource types at the subscription level:
@@ -239,11 +240,11 @@ The following example creates a resource group, and deploys a storage account to
239
240
}
240
241
```
241
242
242
-
## Create policies
243
+
## Azure Policy
243
244
244
-
### Assign policy
245
+
### Assign policy definition
245
246
246
-
The following example assigns an existing policy definition to the subscription. If the policy takes parameters, provide them as an object. If the policy doesn't take parameters, use the default empty object.
247
+
The following example assigns an existing policy definition to the subscription. If the policy definition takes parameters, provide them as an object. If the policy definition doesn't take parameters, use the default empty object.
247
248
248
249
```json
249
250
{
@@ -280,7 +281,7 @@ The following example assigns an existing policy definition to the subscription.
280
281
To deploy this template with Azure CLI, use:
281
282
282
283
```azurecli-interactive
283
-
# Built-in policy that accepts parameters
284
+
# Built-in policy definition that accepts parameters
284
285
definition=$(az policy definition list --query "[?displayName=='Allowed locations'].id" --output tsv)
*[Create a resource group, lock it and give permissions to it](https://github.com/Azure/azure-quickstart-templates/tree/master/subscription-level-deployments/create-rg-lock-role-assignment).
0 commit comments