File tree Expand file tree Collapse file tree 1 file changed +26
-0
lines changed
articles/governance/blueprints/concepts Expand file tree Collapse file tree 1 file changed +26
-0
lines changed Original file line number Diff line number Diff line change @@ -127,6 +127,32 @@ request body that includes **excludedPrincipals**:
127
127
}
128
128
```
129
129
130
+ ## Exclude an action from a deny assignment
131
+
132
+ Similar to [ excluding a principal] ( #exclude-a-principal-from-a-deny-assignment ) on a
133
+ [ deny assignment] ( ../../../role-based-access-control/deny-assignments.md ) in a blueprint assignment,
134
+ you can exclude specific
135
+ [ RBAC operations] ( ../../../role-based-access-control/resource-provider-operations.md ) . Within the
136
+ ** properties.locks** block, in the same place that ** excludedPrincipals** is, an ** excludedActions**
137
+ can be added:
138
+
139
+ ``` json
140
+ "locks" : {
141
+ "mode" : " AllResourcesDoNotDelete" ,
142
+ "excludedPrincipals" : [
143
+ " 7be2f100-3af5-4c15-bcb7-27ee43784a1f" ,
144
+ " 38833b56-194d-420b-90ce-cff578296714"
145
+ ],
146
+ "excludedActions" : [
147
+ " Microsoft.ContainerRegistry/registries/push/write" ,
148
+ " Microsoft.Authorization/*/read"
149
+ ]
150
+ },
151
+ ```
152
+
153
+ While ** excludedPrincipals** must be explicit, ** excludedActions** entries can make use of ` * ` for
154
+ wildcard matching of RBAC operations.
155
+
130
156
## Next steps
131
157
132
158
- Follow the [ protect new resources] ( ../tutorials/protect-new-resources.md ) tutorial.
You can’t perform that action at this time.
0 commit comments