Skip to content

Commit f429d72

Browse files
Merge pull request #275897 from mumian/0521-stacks-rollback
rollback the permission updates
2 parents 98be615 + d69343f commit f429d72

File tree

1 file changed

+1
-18
lines changed

1 file changed

+1
-18
lines changed

articles/azure-resource-manager/bicep/deployment-stacks.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create & deploy deployment stacks in Bicep
33
description: Describes how to create deployment stacks in Bicep.
44
ms.topic: conceptual
55
ms.custom: devx-track-azurecli, devx-track-azurepowershell, devx-track-bicep
6-
ms.date: 05/14/2024
6+
ms.date: 04/11/2024
77
---
88

99
# Deployment stacks
@@ -42,13 +42,6 @@ Deployment stacks provide the following benefits:
4242
- [What-if](./deploy-what-if.md) isn't available in the preview.
4343
- A management group-scoped stack is restricted from deploying to another management group. It can only deploy to the management group of the stack itself or to a child subscription.
4444

45-
## Built-in roles
46-
47-
There are two built-in roles for deployment stack:
48-
49-
- **Azure Deployment Stack Contributor**: Allows users to manage deployment stacks, but cannot create or delete deny assignments within the deployment stacks.
50-
- **Azure Deployment Stack Owner**: Allows users to manage deployment stacks, including those with deny assignments.
51-
5245
## Create deployment stacks
5346

5447
A deployment stack resource can be created at resource group, subscription, or management group scope. The template passed into a deployment stack defines the resources to be created or updated at the target scope specified for the template deployment.
@@ -599,16 +592,6 @@ To delete a managed resource, remove the resource definition from the underlying
599592

600593
## Protect managed resources against deletion
601594

602-
When creating a deployment stack, it's possible to assign a specific type of permissions to the managed resources, which prevents their deletion by unauthorized security principals. These settings are referred to as deny settings. You want to store the stack at a parent scope.
603-
604-
> [!NOTE]
605-
> The latest release requires specific permissions at the stack scope in order to:
606-
>
607-
> - Create or update a deployment stack and set the deny setting to a value other than "None".
608-
> - Update or delete a deployment stack with an existing deny setting of something other than "None"
609-
>
610-
> Use the [built-in roles](#built-in-roles) to grant the permissions.
611-
612595
# [PowerShell](#tab/azure-powershell)
613596

614597
The Azure PowerShell includes these parameters to customize the deny assignment:

0 commit comments

Comments
 (0)