diff --git a/schemas/2018-05-01/subscriptionDeploymentTemplate.json b/schemas/2018-05-01/subscriptionDeploymentTemplate.json index 4cc4f2546a..d334f61b6d 100644 --- a/schemas/2018-05-01/subscriptionDeploymentTemplate.json +++ b/schemas/2018-05-01/subscriptionDeploymentTemplate.json @@ -49,7 +49,7 @@ }, "resources": { "description": "Collection of resources to be deployed", - "oneOf":[ + "oneOf": [ { "$ref": "#/definitions/resourcesWithoutSymbolicNames" }, @@ -987,14 +987,14 @@ } ] }, - "resourcesWithSymbolicNames":{ + "resourcesWithSymbolicNames": { "type": "object", "description": "Resources with symbolic names", "additionalProperties": { "$ref": "#/definitions/resource" } }, - "resourcesWithoutSymbolicNames":{ + "resourcesWithoutSymbolicNames": { "type": "array", "description": "Resources without symbolic names", "items": { diff --git a/schemas/2019-08-01/managementGroupDeploymentTemplate.json b/schemas/2019-08-01/managementGroupDeploymentTemplate.json index f416520a44..58373db30f 100644 --- a/schemas/2019-08-01/managementGroupDeploymentTemplate.json +++ b/schemas/2019-08-01/managementGroupDeploymentTemplate.json @@ -49,7 +49,7 @@ }, "resources": { "description": "Collection of resources to be deployed", - "oneOf":[ + "oneOf": [ { "$ref": "#/definitions/resourcesWithoutSymbolicNames" }, @@ -678,14 +678,14 @@ } ] }, - "resourcesWithSymbolicNames":{ + "resourcesWithSymbolicNames": { "type": "object", "description": "Resources with symbolic names", "additionalProperties": { "$ref": "#/definitions/resource" } }, - "resourcesWithoutSymbolicNames":{ + "resourcesWithoutSymbolicNames": { "type": "array", "description": "Resources without symbolic names", "items": { diff --git a/schemas/2019-08-01/tenantDeploymentTemplate.json b/schemas/2019-08-01/tenantDeploymentTemplate.json index 87842fe07a..3b81972126 100644 --- a/schemas/2019-08-01/tenantDeploymentTemplate.json +++ b/schemas/2019-08-01/tenantDeploymentTemplate.json @@ -49,7 +49,7 @@ }, "resources": { "description": "Collection of resources to be deployed", - "oneOf":[ + "oneOf": [ { "$ref": "#/definitions/resourcesWithoutSymbolicNames" }, @@ -798,14 +798,14 @@ } ] }, - "resourcesWithSymbolicNames":{ + "resourcesWithSymbolicNames": { "type": "object", "description": "Resources with symbolic names", "additionalProperties": { "$ref": "#/definitions/resource" } }, - "resourcesWithoutSymbolicNames":{ + "resourcesWithoutSymbolicNames": { "type": "array", "description": "Resources without symbolic names", "items": { diff --git a/schemas/2019-09-01/Microsoft.KeyVault.json b/schemas/2019-09-01/Microsoft.KeyVault.json index 2f9196ffd3..3370a9b22c 100644 --- a/schemas/2019-09-01/Microsoft.KeyVault.json +++ b/schemas/2019-09-01/Microsoft.KeyVault.json @@ -983,7 +983,7 @@ "$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression" } ], - "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." + "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." }, "enableSoftDelete": { "oneOf": [ diff --git a/schemas/2020-04-01-preview/Microsoft.KeyVault.json b/schemas/2020-04-01-preview/Microsoft.KeyVault.json index ab5b9fb9fb..c69359f3c3 100644 --- a/schemas/2020-04-01-preview/Microsoft.KeyVault.json +++ b/schemas/2020-04-01-preview/Microsoft.KeyVault.json @@ -1180,7 +1180,7 @@ "$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression" } ], - "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." + "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." }, "enableSoftDelete": { "oneOf": [ diff --git a/schemas/2021-04-01-preview/Microsoft.KeyVault.json b/schemas/2021-04-01-preview/Microsoft.KeyVault.json index 39eb64f0cd..792a2fe32d 100644 --- a/schemas/2021-04-01-preview/Microsoft.KeyVault.json +++ b/schemas/2021-04-01-preview/Microsoft.KeyVault.json @@ -1743,7 +1743,7 @@ "$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression" } ], - "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." + "description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC." }, "enableSoftDelete": { "oneOf": [