-
Notifications
You must be signed in to change notification settings - Fork 980
/
40-create-policyassignment-at-managementgroup.parameters.json
107 lines (107 loc) · 4.29 KB
/
40-create-policyassignment-at-managementgroup.parameters.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
{
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"input": {
"value": {
"Name": "Tailspin",
"DisplayName": "Tailspin",
"ParentId": "/providers/Microsoft.Management/managementGroups/3fc1081d-6105-4e19-b60c-1ec1252cf560",
"Type": "/providers/Microsoft.Management/managementGroups",
"Children": [
{
"Id": "/providers/Microsoft.Management/managementGroups/Tailspin-bu1",
"Name": "Tailspin-bu1",
"DisplayName": "Tailspin-bu1",
"Type": "/providers/Microsoft.Management/managementGroups"
}
],
"properties": {
"policyDefinitions": [
{
"Name": "DINE-KeyVault",
"ExtensionResourceType": "Microsoft.Authorization/policyDefinitions",
"Properties": {
"displayName": "KeyVault",
"policyType": "Custom",
"mode": "All",
"description": "Ensures that management RG has Key Vault Deployed to manage platform secrets",
"parameters": {},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Resources/subscriptions"
}
]
},
"then": {
"effect": "deployIfNotExists",
"details": {
"type": "Microsoft.KeyVault/vaults",
"deploymentScope": "Subscription",
"existenceScope": "Subscription",
"roleDefinitionIds": [
"/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635"
],
"existenceCondition": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "name",
"like": "[concat(subscription().displayName, '-keyvault')]"
}
]
},
"deployment": {
"location": "northeurope",
"properties": {
"mode": "incremental",
"parameters": {},
"template": {
"$schema": "https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"type": "Microsoft.Resources/resourceGroups",
"apiVersion": "2018-05-01",
"name": "[concat(subscription().displayName, '-keyvault')]",
"location": "[deployment().location]",
"properties": {}
}
],
"outputs": {}
}
}
}
}
}
}
}
}
],
"policyAssignments": [
{
"Name": "ADINE-KeyVault",
"Type": "Microsoft.Authorization/policyAssignments",
"ResourceType": "Microsoft.Authorization/policyAssignments",
"Properties": {
"displayName": "ADINE-KeyVault",
"policyDefinitionId": "/providers/Microsoft.Management/managementGroups/Tailspin/providers/Microsoft.Authorization/policyDefinitions/DINE-KeyVault",
"scope": "/providers/Microsoft.Management/managementGroups/Tailspin",
"notScopes": [],
"parameters": {}
}
}
]
}
}
}
}
}