#
No requirements.
Name | Version |
---|---|
azurerm | n/a |
No modules.
Name | Description | Type | Default | Required |
---|---|---|---|---|
add_resource_lock_to_nsg_policy | Configuration for policy which adds a resource lock to all NSGs | object({ |
n/a | yes |
allowed_resources_policy | Configuration for the list of resource providers which can be deployed | object({ |
n/a | yes |
append_default_deny_nsg_rule_policy | Configuration for append deny NSG rule deployment policy | object({ |
n/a | yes |
attempt_read_tenant_root_group | Whether the module should attempt to read the tenant root group, your SPN may not have permissions | bool |
true |
no |
deny_nsg_deletion_action_policy | Configuration for DenyAction policy for NSG | object({ |
n/a | yes |
like_mandatory_resource_tagging_policy | Configuration for the mandatory resource tagging policy for the like | object({ |
n/a | yes |
match_mandatory_resource_tagging_policy | Configuration for the mandatory resource tagging policy for the match pattern | object({ |
n/a | yes |
non_privileged_role_restriction_policy | Configuration for the non privileged role restriction policy, this policy allows you to restrict specific role definition IDs to specific principal types, in the event you would like users to have different access to other things like Managed Identities (normally used in automation) | object({ |
n/a | yes |
policy_error_prefix | The prefix to apply to custom policies | string |
"[PlatformPolicyException]:" |
no |
policy_prefix | The prefix to apply to the custom policies | string |
"[LibreDevOps Custom]" |
no |
privileged_role_restriction_policy | Configuration for the role restriction policy, this policy allows you to restrict specific role definition IDs to specific principal types, in the event you would like users to have different access to other things like Managed Identities (normally used in automation) | object({ |
n/a | yes |
No outputs.