-
Notifications
You must be signed in to change notification settings - Fork 1k
/
Copy pathDeploy-PostgreSQL-sslEnforcement.json
139 lines (139 loc) · 4.85 KB
/
Deploy-PostgreSQL-sslEnforcement.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
{
"name": "Deploy-PostgreSQL-sslEnforcement",
"type": "Microsoft.Authorization/policyDefinitions",
"apiVersion": "2021-06-01",
"scope": null,
"properties": {
"policyType": "Custom",
"mode": "Indexed",
"displayName": "Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL ",
"description": "Deploy a specific min TLS version requirement and enforce SSL on Azure Database for PostgreSQL server. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.",
"metadata": {
"version": "1.2.0",
"category": "SQL",
"source": "https://github.com/Azure/Enterprise-Scale/",
"alzCloudEnvironments": [
"AzureCloud",
"AzureChinaCloud",
"AzureUSGovernment"
]
},
"parameters": {
"effect": {
"type": "String",
"defaultValue": "DeployIfNotExists",
"allowedValues": [
"DeployIfNotExists",
"Disabled"
],
"metadata": {
"displayName": "Effect Azure Database for PostgreSQL server",
"description": "Enable or disable the execution of the policy minimum TLS version Azure Database for PostgreSQL server"
}
},
"minimalTlsVersion": {
"type": "String",
"defaultValue": "TLS1_2",
"allowedValues": [
"TLS1_2",
"TLS1_0",
"TLS1_1",
"TLSEnforcementDisabled"
],
"metadata": {
"displayName": "Select version for PostgreSQL server",
"description": "Select version minimum TLS version Azure Database for PostgreSQL server to enforce"
}
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.DBforPostgreSQL/servers"
},
{
"anyOf": [
{
"field": "Microsoft.DBforPostgreSQL/servers/sslEnforcement",
"notEquals": "Enabled"
},
{
"field": "Microsoft.DBforPostgreSQL/servers/minimalTlsVersion",
"less": "[[parameters('minimalTlsVersion')]"
}
]
}
]
},
"then": {
"effect": "[[parameters('effect')]",
"details": {
"type": "Microsoft.DBforPostgreSQL/servers",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.DBforPostgreSQL/servers/sslEnforcement",
"equals": "Enabled"
},
{
"field": "Microsoft.DBforPostgreSQL/servers/minimalTlsVersion",
"equals": "[[parameters('minimalTlsVersion')]"
}
]
},
"name": "current",
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c"
],
"deployment": {
"properties": {
"mode": "Incremental",
"template": {
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "String"
},
"minimalTlsVersion": {
"type": "String"
},
"location": {
"type": "String"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.DBforPostgreSQL/servers",
"apiVersion": "2017-12-01",
"name": "[[concat(parameters('resourceName'))]",
"location": "[[parameters('location')]",
"properties": {
"sslEnforcement": "[[if(equals(parameters('minimalTlsVersion'), 'TLSEnforcementDisabled'),'Disabled', 'Enabled')]",
"minimalTlsVersion": "[[parameters('minimalTlsVersion')]"
}
}
],
"outputs": {}
},
"parameters": {
"resourceName": {
"value": "[[field('name')]"
},
"minimalTlsVersion": {
"value": "[[parameters('minimalTlsVersion')]"
},
"location": {
"value": "[[field('location')]"
}
}
}
}
}
}
}
}
}