![JAR search and dependency download from the Maven repository](/logo.png)
com.pulumi.azurenative.authorization.kotlin.PolicyAssignmentArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-azure-native-kotlin Show documentation
Show all versions of pulumi-azure-native-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azurenative.authorization.kotlin
import com.pulumi.azurenative.authorization.PolicyAssignmentArgs.builder
import com.pulumi.azurenative.authorization.kotlin.enums.EnforcementMode
import com.pulumi.azurenative.authorization.kotlin.inputs.IdentityArgs
import com.pulumi.azurenative.authorization.kotlin.inputs.IdentityArgsBuilder
import com.pulumi.azurenative.authorization.kotlin.inputs.NonComplianceMessageArgs
import com.pulumi.azurenative.authorization.kotlin.inputs.NonComplianceMessageArgsBuilder
import com.pulumi.azurenative.authorization.kotlin.inputs.OverrideArgs
import com.pulumi.azurenative.authorization.kotlin.inputs.OverrideArgsBuilder
import com.pulumi.azurenative.authorization.kotlin.inputs.ParameterValuesValueArgs
import com.pulumi.azurenative.authorization.kotlin.inputs.ParameterValuesValueArgsBuilder
import com.pulumi.azurenative.authorization.kotlin.inputs.ResourceSelectorArgs
import com.pulumi.azurenative.authorization.kotlin.inputs.ResourceSelectorArgsBuilder
import com.pulumi.core.Either
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.Any
import kotlin.Pair
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.collections.Map
import kotlin.jvm.JvmName
/**
* The policy assignment.
* Azure REST API version: 2022-06-01. Prior API version in Azure Native 1.x: 2020-09-01.
* Other available API versions: 2016-04-01, 2016-12-01, 2019-06-01, 2020-03-01, 2023-04-01, 2024-04-01, 2024-05-01.
* ## Example Usage
* ### Create or update a policy assignment
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* Description = "Force resource names to begin with given DeptA and end with -LC",
* DisplayName = "Enforce resource naming rules",
* Metadata = new Dictionary
* {
* ["assignedBy"] = "Special Someone",
* },
* NonComplianceMessages = new[]
* {
* new AzureNative.Authorization.Inputs.NonComplianceMessageArgs
* {
* Message = "Resource names must start with 'DeptA' and end with '-LC'.",
* },
* },
* Parameters =
* {
* { "prefix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "DeptA",
* } },
* { "suffix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "-LC",
* } },
* },
* PolicyAssignmentName = "EnforceNaming",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming",
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* Description: pulumi.String("Force resource names to begin with given DeptA and end with -LC"),
* DisplayName: pulumi.String("Enforce resource naming rules"),
* Metadata: pulumi.Any(map[string]interface{}{
* "assignedBy": "Special Someone",
* }),
* NonComplianceMessages: authorization.NonComplianceMessageArray{
* &authorization.NonComplianceMessageArgs{
* Message: pulumi.String("Resource names must start with 'DeptA' and end with '-LC'."),
* },
* },
* Parameters: authorization.ParameterValuesValueMap{
* "prefix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("DeptA"),
* },
* "suffix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("-LC"),
* },
* },
* PolicyAssignmentName: pulumi.String("EnforceNaming"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming"),
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import com.pulumi.azurenative.authorization.inputs.NonComplianceMessageArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .description("Force resource names to begin with given DeptA and end with -LC")
* .displayName("Enforce resource naming rules")
* .metadata(Map.of("assignedBy", "Special Someone"))
* .nonComplianceMessages(NonComplianceMessageArgs.builder()
* .message("Resource names must start with 'DeptA' and end with '-LC'.")
* .build())
* .parameters(Map.ofEntries(
* Map.entry("prefix", Map.of("value", "DeptA")),
* Map.entry("suffix", Map.of("value", "-LC"))
* ))
* .policyAssignmentName("EnforceNaming")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming")
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ### Create or update a policy assignment with a system assigned identity
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* Description = "Force resource names to begin with given DeptA and end with -LC",
* DisplayName = "Enforce resource naming rules",
* EnforcementMode = AzureNative.Authorization.EnforcementMode.Default,
* Identity = new AzureNative.Authorization.Inputs.IdentityArgs
* {
* Type = AzureNative.Authorization.ResourceIdentityType.SystemAssigned,
* },
* Location = "eastus",
* Metadata = new Dictionary
* {
* ["assignedBy"] = "Foo Bar",
* },
* Parameters =
* {
* { "prefix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "DeptA",
* } },
* { "suffix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "-LC",
* } },
* },
* PolicyAssignmentName = "EnforceNaming",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming",
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* Description: pulumi.String("Force resource names to begin with given DeptA and end with -LC"),
* DisplayName: pulumi.String("Enforce resource naming rules"),
* EnforcementMode: pulumi.String(authorization.EnforcementModeDefault),
* Identity: &authorization.IdentityArgs{
* Type: authorization.ResourceIdentityTypeSystemAssigned,
* },
* Location: pulumi.String("eastus"),
* Metadata: pulumi.Any(map[string]interface{}{
* "assignedBy": "Foo Bar",
* }),
* Parameters: authorization.ParameterValuesValueMap{
* "prefix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("DeptA"),
* },
* "suffix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("-LC"),
* },
* },
* PolicyAssignmentName: pulumi.String("EnforceNaming"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming"),
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import com.pulumi.azurenative.authorization.inputs.IdentityArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .description("Force resource names to begin with given DeptA and end with -LC")
* .displayName("Enforce resource naming rules")
* .enforcementMode("Default")
* .identity(IdentityArgs.builder()
* .type("SystemAssigned")
* .build())
* .location("eastus")
* .metadata(Map.of("assignedBy", "Foo Bar"))
* .parameters(Map.ofEntries(
* Map.entry("prefix", Map.of("value", "DeptA")),
* Map.entry("suffix", Map.of("value", "-LC"))
* ))
* .policyAssignmentName("EnforceNaming")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming")
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ### Create or update a policy assignment with multiple non-compliance messages
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* DisplayName = "Enforce security policies",
* NonComplianceMessages = new[]
* {
* new AzureNative.Authorization.Inputs.NonComplianceMessageArgs
* {
* Message = "Resources must comply with all internal security policies. See for more info.",
* },
* new AzureNative.Authorization.Inputs.NonComplianceMessageArgs
* {
* Message = "Resource names must start with 'DeptA' and end with '-LC'.",
* PolicyDefinitionReferenceId = "10420126870854049575",
* },
* new AzureNative.Authorization.Inputs.NonComplianceMessageArgs
* {
* Message = "Storage accounts must have firewall rules configured.",
* PolicyDefinitionReferenceId = "8572513655450389710",
* },
* },
* PolicyAssignmentName = "securityInitAssignment",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/securityInitiative",
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* DisplayName: pulumi.String("Enforce security policies"),
* NonComplianceMessages: authorization.NonComplianceMessageArray{
* &authorization.NonComplianceMessageArgs{
* Message: pulumi.String("Resources must comply with all internal security policies. See for more info."),
* },
* &authorization.NonComplianceMessageArgs{
* Message: pulumi.String("Resource names must start with 'DeptA' and end with '-LC'."),
* PolicyDefinitionReferenceId: pulumi.String("10420126870854049575"),
* },
* &authorization.NonComplianceMessageArgs{
* Message: pulumi.String("Storage accounts must have firewall rules configured."),
* PolicyDefinitionReferenceId: pulumi.String("8572513655450389710"),
* },
* },
* PolicyAssignmentName: pulumi.String("securityInitAssignment"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/securityInitiative"),
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import com.pulumi.azurenative.authorization.inputs.NonComplianceMessageArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .displayName("Enforce security policies")
* .nonComplianceMessages(
* NonComplianceMessageArgs.builder()
* .message("Resources must comply with all internal security policies. See for more info.")
* .build(),
* NonComplianceMessageArgs.builder()
* .message("Resource names must start with 'DeptA' and end with '-LC'.")
* .policyDefinitionReferenceId("10420126870854049575")
* .build(),
* NonComplianceMessageArgs.builder()
* .message("Storage accounts must have firewall rules configured.")
* .policyDefinitionReferenceId("8572513655450389710")
* .build())
* .policyAssignmentName("securityInitAssignment")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/securityInitiative")
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ### Create or update a policy assignment with overrides
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* Description = "Limit the resource location and resource SKU",
* DisplayName = "Limit the resource location and resource SKU",
* Metadata = new Dictionary
* {
* ["assignedBy"] = "Special Someone",
* },
* Overrides = new[]
* {
* new AzureNative.Authorization.Inputs.OverrideArgs
* {
* Kind = AzureNative.Authorization.OverrideKind.PolicyEffect,
* Selectors = new[]
* {
* new AzureNative.Authorization.Inputs.SelectorArgs
* {
* In = new[]
* {
* "Limit_Skus",
* "Limit_Locations",
* },
* Kind = AzureNative.Authorization.SelectorKind.PolicyDefinitionReferenceId,
* },
* },
* Value = "Audit",
* },
* },
* PolicyAssignmentName = "CostManagement",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement",
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* Description: pulumi.String("Limit the resource location and resource SKU"),
* DisplayName: pulumi.String("Limit the resource location and resource SKU"),
* Metadata: pulumi.Any(map[string]interface{}{
* "assignedBy": "Special Someone",
* }),
* Overrides: authorization.OverrideArray{
* &authorization.OverrideArgs{
* Kind: pulumi.String(authorization.OverrideKindPolicyEffect),
* Selectors: authorization.SelectorArray{
* &authorization.SelectorArgs{
* In: pulumi.StringArray{
* pulumi.String("Limit_Skus"),
* pulumi.String("Limit_Locations"),
* },
* Kind: pulumi.String(authorization.SelectorKindPolicyDefinitionReferenceId),
* },
* },
* Value: pulumi.String("Audit"),
* },
* },
* PolicyAssignmentName: pulumi.String("CostManagement"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement"),
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import com.pulumi.azurenative.authorization.inputs.OverrideArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .description("Limit the resource location and resource SKU")
* .displayName("Limit the resource location and resource SKU")
* .metadata(Map.of("assignedBy", "Special Someone"))
* .overrides(OverrideArgs.builder()
* .kind("policyEffect")
* .selectors(SelectorArgs.builder()
* .in(
* "Limit_Skus",
* "Limit_Locations")
* .kind("policyDefinitionReferenceId")
* .build())
* .value("Audit")
* .build())
* .policyAssignmentName("CostManagement")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement")
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ### Create or update a policy assignment with resource selectors
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* Description = "Limit the resource location and resource SKU",
* DisplayName = "Limit the resource location and resource SKU",
* Metadata = new Dictionary
* {
* ["assignedBy"] = "Special Someone",
* },
* PolicyAssignmentName = "CostManagement",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement",
* ResourceSelectors = new[]
* {
* new AzureNative.Authorization.Inputs.ResourceSelectorArgs
* {
* Name = "SDPRegions",
* Selectors = new[]
* {
* new AzureNative.Authorization.Inputs.SelectorArgs
* {
* In = new[]
* {
* "eastus2euap",
* "centraluseuap",
* },
* Kind = AzureNative.Authorization.SelectorKind.ResourceLocation,
* },
* },
* },
* },
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* Description: pulumi.String("Limit the resource location and resource SKU"),
* DisplayName: pulumi.String("Limit the resource location and resource SKU"),
* Metadata: pulumi.Any(map[string]interface{}{
* "assignedBy": "Special Someone",
* }),
* PolicyAssignmentName: pulumi.String("CostManagement"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement"),
* ResourceSelectors: authorization.ResourceSelectorArray{
* &authorization.ResourceSelectorArgs{
* Name: pulumi.String("SDPRegions"),
* Selectors: authorization.SelectorArray{
* &authorization.SelectorArgs{
* In: pulumi.StringArray{
* pulumi.String("eastus2euap"),
* pulumi.String("centraluseuap"),
* },
* Kind: pulumi.String(authorization.SelectorKindResourceLocation),
* },
* },
* },
* },
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import com.pulumi.azurenative.authorization.inputs.ResourceSelectorArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .description("Limit the resource location and resource SKU")
* .displayName("Limit the resource location and resource SKU")
* .metadata(Map.of("assignedBy", "Special Someone"))
* .policyAssignmentName("CostManagement")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policySetDefinitions/CostManagement")
* .resourceSelectors(ResourceSelectorArgs.builder()
* .name("SDPRegions")
* .selectors(SelectorArgs.builder()
* .in(
* "eastus2euap",
* "centraluseuap")
* .kind("resourceLocation")
* .build())
* .build())
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ### Create or update a policy assignment without enforcing policy effect during resource creation or update.
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using AzureNative = Pulumi.AzureNative;
* return await Deployment.RunAsync(() =>
* {
* var policyAssignment = new AzureNative.Authorization.PolicyAssignment("policyAssignment", new()
* {
* Description = "Force resource names to begin with given DeptA and end with -LC",
* DisplayName = "Enforce resource naming rules",
* EnforcementMode = AzureNative.Authorization.EnforcementMode.DoNotEnforce,
* Metadata = new Dictionary
* {
* ["assignedBy"] = "Special Someone",
* },
* Parameters =
* {
* { "prefix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "DeptA",
* } },
* { "suffix", new AzureNative.Authorization.Inputs.ParameterValuesValueArgs
* {
* Value = "-LC",
* } },
* },
* PolicyAssignmentName = "EnforceNaming",
* PolicyDefinitionId = "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming",
* Scope = "subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2",
* });
* });
* ```
* ```go
* package main
* import (
* authorization "github.com/pulumi/pulumi-azure-native-sdk/authorization/v2"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := authorization.NewPolicyAssignment(ctx, "policyAssignment", &authorization.PolicyAssignmentArgs{
* Description: pulumi.String("Force resource names to begin with given DeptA and end with -LC"),
* DisplayName: pulumi.String("Enforce resource naming rules"),
* EnforcementMode: pulumi.String(authorization.EnforcementModeDoNotEnforce),
* Metadata: pulumi.Any(map[string]interface{}{
* "assignedBy": "Special Someone",
* }),
* Parameters: authorization.ParameterValuesValueMap{
* "prefix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("DeptA"),
* },
* "suffix": &authorization.ParameterValuesValueArgs{
* Value: pulumi.Any("-LC"),
* },
* },
* PolicyAssignmentName: pulumi.String("EnforceNaming"),
* PolicyDefinitionId: pulumi.String("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming"),
* Scope: pulumi.String("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2"),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azurenative.authorization.PolicyAssignment;
* import com.pulumi.azurenative.authorization.PolicyAssignmentArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var policyAssignment = new PolicyAssignment("policyAssignment", PolicyAssignmentArgs.builder()
* .description("Force resource names to begin with given DeptA and end with -LC")
* .displayName("Enforce resource naming rules")
* .enforcementMode("DoNotEnforce")
* .metadata(Map.of("assignedBy", "Special Someone"))
* .parameters(Map.ofEntries(
* Map.entry("prefix", Map.of("value", "DeptA")),
* Map.entry("suffix", Map.of("value", "-LC"))
* ))
* .policyAssignmentName("EnforceNaming")
* .policyDefinitionId("/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming")
* .scope("subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2")
* .build());
* }
* }
* ```
* ## Import
* An existing resource can be imported using its type token, name, and identifier, e.g.
* ```sh
* $ pulumi import azure-native:authorization:PolicyAssignment EnforceNaming /{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}
* ```
* @property description This message will be part of response in case of policy violation.
* @property displayName The display name of the policy assignment.
* @property enforcementMode The policy assignment enforcement mode. Possible values are Default and DoNotEnforce.
* @property identity The managed identity associated with the policy assignment.
* @property location The location of the policy assignment. Only required when utilizing managed identity.
* @property metadata The policy assignment metadata. Metadata is an open ended object and is typically a collection of key value pairs.
* @property nonComplianceMessages The messages that describe why a resource is non-compliant with the policy.
* @property notScopes The policy's excluded scopes.
* @property overrides The policy property value override.
* @property parameters The parameter values for the assigned policy rule. The keys are the parameter names.
* @property policyAssignmentName The name of the policy assignment.
* @property policyDefinitionId The ID of the policy definition or policy set definition being assigned.
* @property resourceSelectors The resource selector list to filter policies by resource properties.
* @property scope The scope of the policy assignment. Valid scopes are: management group (format: '/providers/Microsoft.Management/managementGroups/{managementGroup}'), subscription (format: '/subscriptions/{subscriptionId}'), resource group (format: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}', or resource (format: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'
*/
public data class PolicyAssignmentArgs(
public val description: Output? = null,
public val displayName: Output? = null,
public val enforcementMode: Output>? = null,
public val identity: Output? = null,
public val location: Output? = null,
public val metadata: Output? = null,
public val nonComplianceMessages: Output>? = null,
public val notScopes: Output>? = null,
public val overrides: Output>? = null,
public val parameters: Output
© 2015 - 2025 Weber Informatics LLC | Privacy Policy