{"id":40751,"date":"2022-04-29T20:27:55","date_gmt":"2022-04-29T20:27:55","guid":{"rendered":"https:\/\/dbtut.com\/?p=40751"},"modified":"2022-04-29T20:30:40","modified_gmt":"2022-04-29T20:30:40","slug":"prevent-deletion-of-azure-resources","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/","title":{"rendered":"Prevent Deletion Of Azure Resources"},"content":{"rendered":"<p>In today&#8217;s article, I will cover the topic of Prevent Deletion Of Azure Resources.<\/p>\n<p>Azure Role-Based Access Control (RBAC) allows us to restrict access to resources and resource operations.<\/p>\n<p>RBAC should be used as the first line of defense against unwanted resource access.<\/p>\n<p>However, RBAC alone may not be sufficient in all environments.<\/p>\n<p>For example, consider the case where a user or other access ID is requested to have full access to all resources (superuser).<\/p>\n<p>While these identities have sufficient access to delete and modify resources,<\/p>\n<p>we may want to provide an additional layer of defense to prevent accidental access.<\/p>\n<p>We can use Azure Resource lock as an additional layer of access control.<\/p>\n<p>Azure resource locks can be applied to individual resources or resource groups.<\/p>\n<p>When applied to a resource group, all resources in that group are locked,<\/p>\n<p>including those created after the lock was placed.<\/p>\n<p>We can create a resource lock with one of the following lock levels:<\/p>\n<p>CanNotDelete \u2013 we can change the source but not delete it.<\/p>\n<p>ReadOnly \u2013 we cannot delete or modify a resource.<\/p>\n<p>Once a resource is locked, we must unlock it before the resource is modified or deleted.<\/p>\n<h4>How is Azure Resource Lock implemented?<\/h4>\n<p>We first apply lock operations from top to bottom as inherint.<\/p>\n<p>The lock operation is an authorization above all authorizations and ensures that even the action that the owner of the subscription will perform is not done.<\/p>\n<p>In order to continue the process, it must continue the deletion process after removing the current lock.<\/p>\n<p>We will be implementing our example, which we will explain below, on a resource group named \u201cexample-lock-rg\u201d.<\/p>\n<p>Select the resource group you want to apply the operation from Resource group in Azure Portal.<\/p>\n<figure style=\"width: 267px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mshowto.org\/images\/articles\/2019\/04\/Resim-1.png\" alt=\"\" width=\"267\" height=\"523\" \/><figcaption class=\"wp-caption-text\">Picture-1<\/figcaption><\/figure>\n<p>After selecting the resource group you will operate, select &#8220;Locks&#8221; as you can see in Picture-1.<\/p>\n<p>After the Lock selection, you will see a screen where you can see the previously defined locks and create a new lock as follows.<\/p>\n<figure style=\"width: 826px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mshowto.org\/images\/articles\/2019\/04\/Resim-2.png\" alt=\"\" width=\"826\" height=\"157\" \/><figcaption class=\"wp-caption-text\">Picture-2<\/figcaption><\/figure>\n<p>As we can see in the picture above, we have not made any lock definitions in our resource group before.<\/p>\n<p>Now, to define a new lock, we click the Add button you see in Picture-2, and on a small screen like the one below, it asks you to enter details for the Lock.<\/p>\n<figure style=\"width: 629px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mshowto.org\/images\/articles\/2019\/04\/Resim-3.png\" alt=\"\" width=\"629\" height=\"274\" \/><figcaption class=\"wp-caption-text\">Picture-3<\/figcaption><\/figure>\n<p>During the definition, it asks us to choose one of the two lock types that we define in the introduction part of our name and text.<\/p>\n<p>After entering this information and saying &#8220;ok&#8221;, we now have the lock definition.<\/p>\n<figure style=\"width: 679px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mshowto.org\/images\/articles\/2019\/04\/Resim-4.png\" alt=\"\" width=\"679\" height=\"123\" \/><figcaption class=\"wp-caption-text\">Picture-4<\/figcaption><\/figure>\n<p>Now it&#8217;s time for our last operation and we try to delete the resource group named &#8220;example-lock-rg&#8221;.<\/p>\n<figure style=\"width: 357px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mshowto.org\/images\/articles\/2019\/04\/Resim-5.png\" alt=\"\" width=\"357\" height=\"97\" \/><figcaption class=\"wp-caption-text\">Picture-5<\/figcaption><\/figure>\n<p>As seen in the picture, when we want to delete it, we encounter a warning as in Picture 5 and we cannot continue our process.<\/p>\n<p>If we are performing a deliberate deletion, we must first remove the lock that we have defined for that resource group.<\/p>\n<p>In addition, thanks to this lock, we ensure that other resources that we define in that resource group are not deleted.<\/p>\n<p>We should consider the Azure lock issue as a priority that should be considered in different role managements in resource group usage.<\/p>\n<p>See you in our next article..<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_40751\" class=\"pvc_stats all  \" data-element-id=\"40751\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC) allows us to restrict access to resources and resource operations. RBAC should be used as the first line of defense against unwanted resource access. However, RBAC alone may not be sufficient in all environments. For example, &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_40751\" class=\"pvc_stats all  \" data-element-id=\"40751\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1414,"featured_media":40757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[10403],"tags":[],"class_list":["post-40751","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-azure"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prevent Deletion Of Azure Resources - Database Tutorials<\/title>\n<meta name=\"description\" content=\"In today&#039;s article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevent Deletion Of Azure Resources - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-29T20:27:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T20:30:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u00c7a\u011flar \u00d6zen\u00e7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u00c7a\u011flar \u00d6zen\u00e7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\"},\"author\":{\"name\":\"\u00c7a\u011flar \u00d6zen\u00e7\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/92baa6fd666fb707d903177fed07d6ab\"},\"headline\":\"Prevent Deletion Of Azure Resources\",\"datePublished\":\"2022-04-29T20:27:55+00:00\",\"dateModified\":\"2022-04-29T20:30:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg\",\"articleSection\":[\"Azure\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\",\"name\":\"Prevent Deletion Of Azure Resources - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg\",\"datePublished\":\"2022-04-29T20:27:55+00:00\",\"dateModified\":\"2022-04-29T20:30:40+00:00\",\"description\":\"In today's article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg\",\"width\":750,\"height\":446},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prevent Deletion Of Azure Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/92baa6fd666fb707d903177fed07d6ab\",\"name\":\"\u00c7a\u011flar \u00d6zen\u00e7\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/997658bc236de4f5a0f3f46e64535566e31ba96824c77c01165e863fc38fd1ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/997658bc236de4f5a0f3f46e64535566e31ba96824c77c01165e863fc38fd1ba?s=96&d=mm&r=g\",\"caption\":\"\u00c7a\u011flar \u00d6zen\u00e7\"},\"url\":\"https:\/\/dbtut.com\/index.php\/author\/caglarozenc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prevent Deletion Of Azure Resources - Database Tutorials","description":"In today's article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/","og_locale":"en_US","og_type":"article","og_title":"Prevent Deletion Of Azure Resources - Database Tutorials","og_description":"In today's article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)","og_url":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/","og_site_name":"Database Tutorials","article_published_time":"2022-04-29T20:27:55+00:00","article_modified_time":"2022-04-29T20:30:40+00:00","og_image":[{"width":750,"height":446,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg","type":"image\/jpeg"}],"author":"\u00c7a\u011flar \u00d6zen\u00e7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u00c7a\u011flar \u00d6zen\u00e7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/"},"author":{"name":"\u00c7a\u011flar \u00d6zen\u00e7","@id":"https:\/\/dbtut.com\/#\/schema\/person\/92baa6fd666fb707d903177fed07d6ab"},"headline":"Prevent Deletion Of Azure Resources","datePublished":"2022-04-29T20:27:55+00:00","dateModified":"2022-04-29T20:30:40+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg","articleSection":["Azure"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/","url":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/","name":"Prevent Deletion Of Azure Resources - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg","datePublished":"2022-04-29T20:27:55+00:00","dateModified":"2022-04-29T20:30:40+00:00","description":"In today's article, I will cover the topic of Prevent Deletion Of Azure Resources. Azure Role-Based Access Control (RBAC)","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/04\/Ekran-Alintisi-26.jpg","width":750,"height":446},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2022\/04\/29\/prevent-deletion-of-azure-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Prevent Deletion Of Azure Resources"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/92baa6fd666fb707d903177fed07d6ab","name":"\u00c7a\u011flar \u00d6zen\u00e7","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/997658bc236de4f5a0f3f46e64535566e31ba96824c77c01165e863fc38fd1ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/997658bc236de4f5a0f3f46e64535566e31ba96824c77c01165e863fc38fd1ba?s=96&d=mm&r=g","caption":"\u00c7a\u011flar \u00d6zen\u00e7"},"url":"https:\/\/dbtut.com\/index.php\/author\/caglarozenc\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/40751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/1414"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=40751"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/40751\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/40757"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=40751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=40751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=40751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}