Löscht die Verwaltungssperre einer Ressource oder einer beliebigen Ebene unterhalb der Ressource.
Zum Löschen von Verwaltungssperren benötigen Sie Zugriff auf Microsoft.Authorization/*- oder Microsoft.Authorization/locks/*-Aktionen. Unter den integrierten Rollen verfügen nur „Besitzer“ und „Benutzerzugriffsadministrator“ über diese Aktionen.
DELETE https://management.azure.com/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/locks/{lockName}?api-version=2016-09-01
URI-Parameter
Name |
In |
Erforderlich |
Typ |
Beschreibung |
lockName
|
path |
True
|
string
|
Der Name der zu löschenden Sperre.
|
parentResourcePath
|
path |
True
|
string
|
Die identität der übergeordneten Ressource.
|
resourceGroupName
|
path |
True
|
string
|
Der Name der Ressourcengruppe, die die Ressource mit der zu löschenden Sperre enthält.
RegEx-Muster: ^[-\w\._\(\)]+$
|
resourceName
|
path |
True
|
string
|
Der Name der Ressource mit der zu löschenden Sperre.
|
resourceProviderNamespace
|
path |
True
|
string
|
Der Ressourcenanbieternamespace der Ressource mit der zu löschenden Sperre.
|
resourceType
|
path |
True
|
string
|
Der Ressourcentyp der Ressource mit der zu löschenden Sperre.
|
subscriptionId
|
path |
True
|
string
|
Hierbei handelt es sich um die ID des Zielabonnements.
|
api-version
|
query |
True
|
string
|
Die API-Version, die für den Vorgang verwendet werden soll.
|
Antworten
Name |
Typ |
Beschreibung |
200 OK
|
|
OK
|
204 No Content
|
|
Kein Inhalt
|
Sicherheit
azure_auth
Azure Active Directory-OAuth2-Flow
Typ:
oauth2
Ablauf:
implicit
Autorisierungs-URL:
https://login.microsoftonline.com/common/oauth2/authorize
Bereiche
Name |
Beschreibung |
user_impersonation
|
Identitätswechsel Ihres Benutzerkontos
|
Beispiele
Delete management lock at resource level
Beispielanforderung
DELETE https://management.azure.com/subscriptions/subscriptionId/resourcegroups/resourcegroupname/providers/Microsoft.Storage/parentResourcePath/storageAccounts/teststorageaccount/providers/Microsoft.Authorization/locks/testlock?api-version=2016-09-01
import com.azure.core.util.Context;
/** Samples for ManagementLocks DeleteAtResourceLevel. */
public final class Main {
/*
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
/**
* Sample code: Delete management lock at resource level.
*
* @param azure The entry point for accessing resource management APIs in Azure.
*/
public static void deleteManagementLockAtResourceLevel(com.azure.resourcemanager.AzureResourceManager azure) {
azure
.genericResources()
.manager()
.managementLockClient()
.getManagementLocks()
.deleteAtResourceLevelWithResponse(
"resourcegroupname",
"Microsoft.Storage",
"parentResourcePath",
"storageAccounts",
"teststorageaccount",
"testlock",
Context.NONE);
}
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
from azure.identity import DefaultAzureCredential
from azure.mgmt.resource import ManagementLockClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-resource
# USAGE
python management_locks_delete_at_resource_level.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = ManagementLockClient(
credential=DefaultAzureCredential(),
subscription_id="subscriptionId",
)
client.management_locks.delete_at_resource_level(
resource_group_name="resourcegroupname",
resource_provider_namespace="Microsoft.Storage",
parent_resource_path="parentResourcePath",
resource_type="storageAccounts",
resource_name="teststorageaccount",
lock_name="testlock",
)
# x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
if __name__ == "__main__":
main()
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
const { ManagementLockClient } = require("@azure/arm-locks-profile-2020-09-01-hybrid");
const { DefaultAzureCredential } = require("@azure/identity");
/**
* This sample demonstrates how to To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
*
* @summary To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
async function deleteManagementLockAtResourceLevel() {
const subscriptionId = process.env["LOCKS_SUBSCRIPTION_ID"] || "subscriptionId";
const resourceGroupName = process.env["LOCKS_RESOURCE_GROUP"] || "resourcegroupname";
const resourceProviderNamespace = "Microsoft.Storage";
const parentResourcePath = "parentResourcePath";
const resourceType = "storageAccounts";
const resourceName = "teststorageaccount";
const lockName = "testlock";
const credential = new DefaultAzureCredential();
const client = new ManagementLockClient(credential, subscriptionId);
const result = await client.managementLocks.deleteAtResourceLevel(
resourceGroupName,
resourceProviderNamespace,
parentResourcePath,
resourceType,
resourceName,
lockName
);
console.log(result);
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
Beispiel für eine Antwort