You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### 4. Configure Selectors for gradual rollout of policy enforcement
34
30
> [!NOTE]
35
31
> To enable safe rollout of policy enforcement, we recommend using Azure Policy’s resource selectors to gradually rollout policy enforcement across your resources.
36
32
- In the 'Basics' tab, you see 'Resource Selectors'. Click expand.
- In your resource selector, add a name for your selector.
40
36
- Toggle resourceLocation to enable it. Pick a few low-risk regions that you’d like to enforce on. The policy assignment will evaluate Azure resources in those regions.
41
37
- You can update this assignment later to add more regions by adding more resourceLocation selectors or updating the existing resourceLocation selector to add more regions.
@@ -49,7 +45,7 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
49
45
-[[Preview]: Users must authenticate with multifactor authentication to create or update resources - Microsoft Azure](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4e6c27d5-a6ee-49cf-b2b4-d8fe90fa2b8b/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
- Under 'Basics', enter a Name for your policy assignment. Optionally, you may add a Description to help others understand the purpose of this assignment.
@@ -59,7 +55,7 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
59
55
60
56
_Sample Text: To resolve this error, you must set up MFA, following the process outlined at aka.ms/setupMFA. If you set up MFA and are still receiving this error, reach out to your Entra administrator to restore the security default for Azure by following the process outlined at aka.ms/loginMFAForAzure._
61
57
62
-
:::image type="content" source="../media/multifactor-enforcement/image11.png" alt-text="Screenshot of Azure Policy Message Tab." border="false":::
58
+
:::image type="content" source="../media/multifactor-enforcement/azpolicy-non-compliance-message.png" alt-text="Screenshot of Azure Policy Message Tab." border="false":::
63
59
64
60
65
61
### 7. Review and Create Assignment
@@ -72,7 +68,7 @@ _Sample Text: To resolve this error, you must set up MFA, following the process
72
68
### 9. Verify existence of the policy assignment
73
69
- Under the 'Assignments' tab, confirm that the policy assignment was successfully created. You can use the search bar and scope bar to easily filter.
74
70
75
-
:::image type="content" source="../media/multifactor-enforcement/image6.png" alt-text="Screenshot of Azure Policy Assignment List View." border="false":::
71
+
:::image type="content" source="../media/multifactor-enforcement/assignment-list-view.png" alt-text="Screenshot of Azure Policy Assignment List View." border="false":::
76
72
77
73
78
74
## Update the policy assignment to enforcement
@@ -108,17 +104,17 @@ The next section shows the experience from some select clients when the policy a
108
104
### Azure Portal
109
105
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure Portal may return:
110
106
111
-
:::image type="content" source="../media/multifactor-enforcement/image8.png" alt-text="Screenshot of Azure Portal View When User Gets Blocked By Policy." border="false":::
107
+
:::image type="content" source="../media/multifactor-enforcement/portal-enforcement-sample.png" alt-text="Screenshot of Azure Portal View When User Gets Blocked By Policy." border="false":::
112
108
113
109
### Azure CLI
114
110
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure CLI may return:
115
111
116
-
:::image type="content" source="../media/multifactor-enforcement/image9.png" alt-text="Screenshot of Azure CLI View When User Gets Blocked By Policy." border="false":::
112
+
:::image type="content" source="../media/multifactor-enforcement/azure-cli-policy-enforcement.png" alt-text="Screenshot of Azure CLI View When User Gets Blocked By Policy." border="false":::
117
113
118
114
### Azure PowerShell
119
115
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure PowerShell may return:
120
116
121
-
:::image type="content" source="../media/multifactor-enforcement/image10.png" alt-text="Screenshot of Azure PS View When User Gets Blocked By Policy." border="false":::
117
+
:::image type="content" source="../media/multifactor-enforcement/azure-ps-policy-enforcement.png" alt-text="Screenshot of Azure PS View When User Gets Blocked By Policy." border="false":::
122
118
123
119
## Limitations in the Preview Timeframe
124
120
- In some cases, you may not be prompted to complete MFA after receiving an error. In such cases, re-authenticate with MFA before retrying the operation (for example, through Azure Portal).
0 commit comments