Skip to content

Commit f4901eb

Browse files
authored
Merge pull request #106936 from tfitzmac/0309scope
update scoped deploy intro
2 parents b1b2592 + 58f0fa4 commit f4901eb

File tree

3 files changed

+16
-37
lines changed

3 files changed

+16
-37
lines changed

articles/azure-resource-manager/templates/deploy-to-management-group.md

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to management group
33
description: Describes how to deploy resources at the management group scope in an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resources at the management group level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* [subscription level](deploy-to-subscription.md)
13-
* management group level (covered in this article)
14-
* [tenant level](deploy-to-tenant.md)
15-
16-
You use management group level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
10+
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) for a management group. With management group level templates, you can declaratively apply policies and assign roles at the management group level.
1711

1812
## Supported resources
1913

@@ -36,10 +30,10 @@ For templates, use:
3630
https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json#
3731
```
3832

39-
For parameter files, use:
33+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4034

4135
```json
42-
https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentParameters.json#
36+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4337
```
4438

4539
## Deployment commands
@@ -158,11 +152,10 @@ The following example assigns an existing policy definition to the management gr
158152

159153
## Template sample
160154

161-
* [Create a resource group, a policy and a policy assignment](https://github.com/Azure/azure-docs-json-samples/blob/master/management-level-deployment/azuredeploy.json).
155+
* [Create a resource group, a policy, and a policy assignment](https://github.com/Azure/azure-docs-json-samples/blob/master/management-level-deployment/azuredeploy.json).
162156

163157
## Next steps
164158

165159
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
166160
* For an example of deploying workspace settings for Azure Security Center, see [deployASCwithWorkspaceSettings.json](https://github.com/krnese/AzureDeploy/blob/master/ARM/deployments/deployASCwithWorkspaceSettings.json).
167-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
168-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
161+
* You can also deploy templates at [subscription level](deploy-to-subscription.md) and [tenant level](deploy-to-tenant.md).

articles/azure-resource-manager/templates/deploy-to-subscription.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to subscription
33
description: Describes how to create a resource group in an Azure Resource Manager template. It also shows how to deploy resources at the Azure subscription scope.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resource groups and resources at the subscription level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* subscription level (covered in this article)
13-
* [management group level](deploy-to-management-group.md)
14-
* [tenant level](deploy-to-tenant.md)
15-
16-
You use subscription level deployments to take actions that make sense at that level, such as creating resource groups, or assigning [role-based access control](../../role-based-access-control/overview.md).
10+
To simplify the management of resources in your Azure subscription, you can define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) across the subscription. With subscription level templates, you declaratively apply policies and assign roles at the subscription. You can also create resource groups and deploy resources.
1711

1812
To deploy templates at the subscription level, use Azure CLI, PowerShell, or REST API. The Azure portal doesn't support deployment in the subscription level.
1913

@@ -41,10 +35,10 @@ For templates, use:
4135
https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json#
4236
```
4337

44-
For parameter files, use:
38+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4539

4640
```json
47-
https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentParameters.json#
41+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4842
```
4943

5044
## Deployment commands
@@ -382,5 +376,4 @@ New-AzSubscriptionDeployment `
382376
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
383377
* For an example of deploying workspace settings for Azure Security Center, see [deployASCwithWorkspaceSettings.json](https://github.com/krnese/AzureDeploy/blob/master/ARM/deployments/deployASCwithWorkspaceSettings.json).
384378
* Sample templates can be found at [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/subscription-level-deployments).
385-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
386-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
379+
* You can also deploy templates at [management group level](deploy-to-management-group.md) and [tenant level](deploy-to-tenant.md).

articles/azure-resource-manager/templates/deploy-to-tenant.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to tenant
33
description: Describes how to deploy resources at the tenant scope in an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resources at the tenant level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* [subscription level](deploy-to-subscription.md)
13-
* [management group level](deploy-to-management-group.md)
14-
* tenant level (covered in this article)
15-
16-
You use tenant level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
10+
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) across your Azure AD tenant. With tenant level templates, you can declaratively apply policies and assign roles at a global level.
1711

1812
## Supported resources
1913

@@ -36,10 +30,10 @@ For templates, use:
3630
https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json#
3731
```
3832

39-
For parameter files, use:
33+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4034

4135
```json
42-
https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentParameters.json#
36+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4337
```
4438

4539
## Required access
@@ -176,5 +170,4 @@ The [following template](https://github.com/Azure/azure-quickstart-templates/tre
176170
## Next steps
177171

178172
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
179-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
180-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
173+
* You can also deploy templates at [subscription level](deploy-to-subscription.md) or [management group level](deploy-to-management-group.md).

0 commit comments

Comments
 (0)