Skip to content

Commit 8a09b39

Browse files
committed
Updated blueprints link
1 parent 0df5037 commit 8a09b39

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/role-based-access-control/deny-assignments.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 11/25/2019
15+
ms.date: 03/26/2020
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818
ms.custom:
@@ -25,7 +25,7 @@ This article describes how deny assignments are defined.
2525

2626
## How deny assignments are created
2727

28-
Deny assignments are created and managed by Azure to protect resources. Azure Blueprints and Azure managed apps use deny assignments to protect system-managed resources. Azure Blueprints and Azure managed apps are the only way that deny assignments can be created. You can't directly create your own deny assignments. For more information, see [Protect new resources with Azure Blueprints resource locks](../governance/blueprints/tutorials/protect-new-resources.md).
28+
Deny assignments are created and managed by Azure to protect resources. Azure Blueprints and Azure managed apps use deny assignments to protect system-managed resources. Azure Blueprints and Azure managed apps are the only way that deny assignments can be created. You can't directly create your own deny assignments. For more information about how Blueprints uses deny assignments to lock resources, see [Understand resource locking in Azure Blueprints](../governance/blueprints/concepts/resource-locking.md).
2929

3030
> [!NOTE]
3131
> You can't directly create your own deny assignments.

0 commit comments

Comments
 (0)