Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request]: Update API version and disable local auth. #1715

Closed
ChrisSidebotham opened this issue Jul 25, 2022 · 0 comments · Fixed by #1790
Closed

[Feature Request]: Update API version and disable local auth. #1715

ChrisSidebotham opened this issue Jul 25, 2022 · 0 comments · Fixed by #1790
Assignees
Labels
[cat] modules category: modules

Comments

@ChrisSidebotham
Copy link
Contributor

resource automationAccount 'Microsoft.Automation/automationAccounts@2020-01-13-preview' = {
name: name
location: location
tags: tags
identity: identity
properties: {
sku: {
name: skuName
}
encryption: !empty(cMKKeyName) ? {
keySource: 'Microsoft.KeyVault'
identity: {
userAssignedIdentity: cMKUserAssignedIdentityResourceId
}
keyVaultProperties: {
keyName: cMKKeyName
keyVaultUri: cMKKeyVault.properties.vaultUri
keyVersion: !empty(cMKKeyVersion) ? cMKKeyVersion : last(split(cMKKeyVaultKey.properties.keyUriWithVersion, '/'))
}
} : null
publicNetworkAccess: !empty(publicNetworkAccess) ? (publicNetworkAccess == 'Disabled' ? false : true) : (!empty(privateEndpoints) ? false : null)
}
}

Azure Policy has a built-in definition for deny resource deployment if local authentication is not disabled. The newer Resource Provider API Versions support this parameter and allows for a Managed Identity to be leveraged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
[cat] modules category: modules
Projects
Status: Done
Development

Successfully merging a pull request may close this issue.

1 participant