You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please add support for setting Azure Policy Assignment Exclusions. Exclusions allow Resource Groups or Resources in a Resoure Group to be excluded from the policy.
The text was updated successfully, but these errors were encountered:
+1 this would be great for locking down resource types to certain resource groups. e.g. Policy = no network resources, scope = subscription, exception = networking resource group. Only the networking team have access to the networking resource group.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!
ghost
locked and limited conversation to collaborators
Mar 5, 2019
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Please add support for setting Azure Policy Assignment Exclusions. Exclusions allow Resource Groups or Resources in a Resoure Group to be excluded from the policy.
The text was updated successfully, but these errors were encountered: