You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -42,13 +42,6 @@ Deployment stacks provide the following benefits:
42
42
-[What-if](./deploy-what-if.md) isn't available in the preview.
43
43
- A management group-scoped stack is restricted from deploying to another management group. It can only deploy to the management group of the stack itself or to a child subscription.
44
44
45
-
## Built-in roles
46
-
47
-
There are two built-in roles for deployment stack:
48
-
49
-
-**Azure Deployment Stack Contributor**: Allows users to manage deployment stacks, but cannot create or delete deny assignments within the deployment stacks.
50
-
-**Azure Deployment Stack Owner**: Allows users to manage deployment stacks, including those with deny assignments.
51
-
52
45
## Create deployment stacks
53
46
54
47
A deployment stack resource can be created at resource group, subscription, or management group scope. The template passed into a deployment stack defines the resources to be created or updated at the target scope specified for the template deployment.
@@ -599,16 +592,6 @@ To delete a managed resource, remove the resource definition from the underlying
599
592
600
593
## Protect managed resources against deletion
601
594
602
-
When creating a deployment stack, it's possible to assign a specific type of permissions to the managed resources, which prevents their deletion by unauthorized security principals. These settings are referred to as deny settings. You want to store the stack at a parent scope.
603
-
604
-
> [!NOTE]
605
-
> The latest release requires specific permissions at the stack scope in order to:
606
-
>
607
-
> - Create or update a deployment stack and set the deny setting to a value other than "None".
608
-
> - Update or delete a deployment stack with an existing deny setting of something other than "None"
609
-
>
610
-
> Use the [built-in roles](#built-in-roles) to grant the permissions.
611
-
612
595
# [PowerShell](#tab/azure-powershell)
613
596
614
597
The Azure PowerShell includes these parameters to customize the deny assignment:
0 commit comments