Elimina o bloqueio de gestão de um recurso ou de qualquer nível abaixo do recurso.
Para eliminar bloqueios de gestão, tem de ter acesso às ações Microsoft.Authorization/* ou Microsoft.Authorization/locks/*. Das funções incorporadas, apenas Proprietário e Administrador de Acesso dos Utilizadores têm acesso a essas ações.
DELETE https://management.azure.com/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/locks/{lockName}?api-version=2016-09-01
Parâmetros do URI
Name |
Em |
Necessário |
Tipo |
Description |
lockName
|
path |
True
|
string
|
O nome do bloqueio a eliminar.
|
parentResourcePath
|
path |
True
|
string
|
A identidade do recurso principal.
|
resourceGroupName
|
path |
True
|
string
|
O nome do grupo de recursos que contém o recurso com o bloqueio a eliminar.
Padrão Regex: ^[-\w\._\(\)]+$
|
resourceName
|
path |
True
|
string
|
O nome do recurso com o bloqueio a eliminar.
|
resourceProviderNamespace
|
path |
True
|
string
|
O espaço de nomes do fornecedor de recursos do recurso com o bloqueio a eliminar.
|
resourceType
|
path |
True
|
string
|
O tipo de recurso do recurso com o bloqueio a eliminar.
|
subscriptionId
|
path |
True
|
string
|
O ID da subscrição de destino.
|
api-version
|
query |
True
|
string
|
A versão da API a utilizar para a operação.
|
Respostas
Name |
Tipo |
Description |
200 OK
|
|
OK
|
204 No Content
|
|
NoContent
|
Segurança
azure_auth
Fluxo OAuth2 do Azure Active Directory
Tipo:
oauth2
Fluxo:
implicit
URL de Autorização:
https://login.microsoftonline.com/common/oauth2/authorize
Âmbitos
Name |
Description |
user_impersonation
|
representar a sua conta de utilizador
|
Exemplos
Delete management lock at resource level
Pedido de amostra
DELETE https://management.azure.com/subscriptions/subscriptionId/resourcegroups/resourcegroupname/providers/Microsoft.Storage/parentResourcePath/storageAccounts/teststorageaccount/providers/Microsoft.Authorization/locks/testlock?api-version=2016-09-01
import com.azure.core.util.Context;
/** Samples for ManagementLocks DeleteAtResourceLevel. */
public final class Main {
/*
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
/**
* Sample code: Delete management lock at resource level.
*
* @param azure The entry point for accessing resource management APIs in Azure.
*/
public static void deleteManagementLockAtResourceLevel(com.azure.resourcemanager.AzureResourceManager azure) {
azure
.genericResources()
.manager()
.managementLockClient()
.getManagementLocks()
.deleteAtResourceLevelWithResponse(
"resourcegroupname",
"Microsoft.Storage",
"parentResourcePath",
"storageAccounts",
"teststorageaccount",
"testlock",
Context.NONE);
}
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
from azure.identity import DefaultAzureCredential
from azure.mgmt.resource import ManagementLockClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-resource
# USAGE
python management_locks_delete_at_resource_level.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = ManagementLockClient(
credential=DefaultAzureCredential(),
subscription_id="subscriptionId",
)
client.management_locks.delete_at_resource_level(
resource_group_name="resourcegroupname",
resource_provider_namespace="Microsoft.Storage",
parent_resource_path="parentResourcePath",
resource_type="storageAccounts",
resource_name="teststorageaccount",
lock_name="testlock",
)
# x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
if __name__ == "__main__":
main()
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
const { ManagementLockClient } = require("@azure/arm-locks-profile-2020-09-01-hybrid");
const { DefaultAzureCredential } = require("@azure/identity");
/**
* This sample demonstrates how to To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
*
* @summary To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
async function deleteManagementLockAtResourceLevel() {
const subscriptionId = process.env["LOCKS_SUBSCRIPTION_ID"] || "subscriptionId";
const resourceGroupName = process.env["LOCKS_RESOURCE_GROUP"] || "resourcegroupname";
const resourceProviderNamespace = "Microsoft.Storage";
const parentResourcePath = "parentResourcePath";
const resourceType = "storageAccounts";
const resourceName = "teststorageaccount";
const lockName = "testlock";
const credential = new DefaultAzureCredential();
const client = new ManagementLockClient(credential, subscriptionId);
const result = await client.managementLocks.deleteAtResourceLevel(
resourceGroupName,
resourceProviderNamespace,
parentResourcePath,
resourceType,
resourceName,
lockName
);
console.log(result);
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue