Elimina il blocco di gestione di una risorsa o qualsiasi livello inferiore alla risorsa.
Per eliminare i blocchi di gestione, è necessario avere accesso alle azioni Microsoft.Authorization/* o Microsoft.Authorization/locks/*. Fra i ruoli predefiniti, solo a Proprietario e Amministratore Accesso utenti sono concesse tali azioni.
DELETE https://management.azure.com/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/locks/{lockName}?api-version=2016-09-01
Parametri dell'URI
Nome |
In |
Necessario |
Tipo |
Descrizione |
lockName
|
path |
True
|
string
|
Nome del blocco da eliminare.
|
parentResourcePath
|
path |
True
|
string
|
Identità della risorsa padre.
|
resourceGroupName
|
path |
True
|
string
|
Nome del gruppo di risorse contenente la risorsa con il blocco da eliminare.
Criterio di espressione regolare: ^[-\w\._\(\)]+$
|
resourceName
|
path |
True
|
string
|
Nome della risorsa con il blocco da eliminare.
|
resourceProviderNamespace
|
path |
True
|
string
|
Spazio dei nomi del provider di risorse della risorsa con il blocco da eliminare.
|
resourceType
|
path |
True
|
string
|
Tipo di risorsa della risorsa con il blocco da eliminare.
|
subscriptionId
|
path |
True
|
string
|
ID della sottoscrizione di destinazione.
|
api-version
|
query |
True
|
string
|
Versione dell'API da usare per l'operazione.
|
Risposte
Nome |
Tipo |
Descrizione |
200 OK
|
|
OK
|
204 No Content
|
|
Nessun contenuto restituito
|
Sicurezza
azure_auth
Flusso OAuth2 di Azure Active Directory
Tipo:
oauth2
Flow:
implicit
URL di autorizzazione:
https://login.microsoftonline.com/common/oauth2/authorize
Ambiti
Nome |
Descrizione |
user_impersonation
|
rappresentare l'account utente
|
Esempio
Delete management lock at resource level
Esempio di richiesta
DELETE https://management.azure.com/subscriptions/subscriptionId/resourcegroups/resourcegroupname/providers/Microsoft.Storage/parentResourcePath/storageAccounts/teststorageaccount/providers/Microsoft.Authorization/locks/testlock?api-version=2016-09-01
import com.azure.core.util.Context;
/** Samples for ManagementLocks DeleteAtResourceLevel. */
public final class Main {
/*
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
/**
* Sample code: Delete management lock at resource level.
*
* @param azure The entry point for accessing resource management APIs in Azure.
*/
public static void deleteManagementLockAtResourceLevel(com.azure.resourcemanager.AzureResourceManager azure) {
azure
.genericResources()
.manager()
.managementLockClient()
.getManagementLocks()
.deleteAtResourceLevelWithResponse(
"resourcegroupname",
"Microsoft.Storage",
"parentResourcePath",
"storageAccounts",
"teststorageaccount",
"testlock",
Context.NONE);
}
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
from azure.identity import DefaultAzureCredential
from azure.mgmt.resource import ManagementLockClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-resource
# USAGE
python management_locks_delete_at_resource_level.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = ManagementLockClient(
credential=DefaultAzureCredential(),
subscription_id="subscriptionId",
)
client.management_locks.delete_at_resource_level(
resource_group_name="resourcegroupname",
resource_provider_namespace="Microsoft.Storage",
parent_resource_path="parentResourcePath",
resource_type="storageAccounts",
resource_name="teststorageaccount",
lock_name="testlock",
)
# x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
if __name__ == "__main__":
main()
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
const { ManagementLockClient } = require("@azure/arm-locks-profile-2020-09-01-hybrid");
const { DefaultAzureCredential } = require("@azure/identity");
/**
* This sample demonstrates how to To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
*
* @summary To delete management locks, you must have access to Microsoft.Authorization/* or Microsoft.Authorization/locks/* actions. Of the built-in roles, only Owner and User Access Administrator are granted those actions.
* x-ms-original-file: specification/resources/resource-manager/Microsoft.Authorization/stable/2016-09-01/examples/ManagementLocks_DeleteAtResourceLevel.json
*/
async function deleteManagementLockAtResourceLevel() {
const subscriptionId = process.env["LOCKS_SUBSCRIPTION_ID"] || "subscriptionId";
const resourceGroupName = process.env["LOCKS_RESOURCE_GROUP"] || "resourcegroupname";
const resourceProviderNamespace = "Microsoft.Storage";
const parentResourcePath = "parentResourcePath";
const resourceType = "storageAccounts";
const resourceName = "teststorageaccount";
const lockName = "testlock";
const credential = new DefaultAzureCredential();
const client = new ManagementLockClient(credential, subscriptionId);
const result = await client.managementLocks.deleteAtResourceLevel(
resourceGroupName,
resourceProviderNamespace,
parentResourcePath,
resourceType,
resourceName,
lockName
);
console.log(result);
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue