Resolve errors for request disallowed by policy

When deploying an Azure Resource Manager template (ARM template) or Bicep file, you get the RequestDisallowedByPolicy error when one of the resources to deploy doesn't comply with an existing Azure Policy.


During a deployment, you might receive a RequestDisallowedByPolicy error that prevents you from creating a resource. Azure CLI, Azure PowerShell, and the Azure portal's activity log show similar information about the error. The key elements are the error code, policy assignment, and policy definition.

"statusMessage": "{"error":{"code":"RequestDisallowedByPolicy", "target":"examplenic1207",
  "message":"Resource `examplenic1207` was disallowed by policy. Policy identifiers:

"policyAssignment":{"name":"Network interfaces should not have public IPs",

"policyDefinition":{"name":"Network interfaces should not have public IPs",

In the id string, the {guid} placeholder represents an Azure subscription ID. The name of a policyAssignment or policyDefinition is the last segment of the id string.


Your organization assigns policies to enforce organizational standards and to assess compliance at-scale. If you're trying to deploy a resource that violates a policy, the deployment is blocked.

For example, your subscription can have a policy that prevents public IPs on network interfaces. If you attempt to create a network interface with a public IP address, the policy blocks you from creating the network interface.


To resolve the RequestDisallowedByPolicy error when deploying an ARM template or Bicep file, you need to find which policy is blocking the deployment. Within that policy, you need to review the rules so you can update your deployment to comply with the policy.

The error message includes the names of the policy definition and policy assignment that caused the error. You need these names to get more information about the policy.

To get more information about a policy definition, use az policy definition show.

az policy definition show --name {policy-name}

To get more information about a policy assignment, use az policy assignment show.

az policy assignment show --name {assignment-name} --resource-group {resource-group-name}

Within the policy definition, you see a description of the policy and the rules that are applied. Review the rules and update your ARM template or Bicep file to comply with the rules. For example, if the rule states the public network access is disabled, you need to update the corresponding resource properties.

For more information, see the following articles: