Requests can be filtered by details pertaining to the resource being requested. There are two available keys for resource filters, name and id .
Rule structure:
Examples:
Auto-approve any requests for the resource with an id of /subscriptions/<subscription number>/resourceGroups/NetworkWatcherRG/providers/Microsoft.Network/networkWatchers/NetworkWatcher_eastus
Auto-approve on-call requests for any resource except for the one named "sensitive-virtual-network"
Filtering on roles
Requests can be filtered by details pertaining to the role being requested. There are two available keys for resource filters, name and id .
Rule structure:
Examples:
Allow approvals of requests to the role named "P0 Developer Role" to be approved by users with the DevOpsManager profile property in Okta
Allow requests to the role with id of /subscriptions/<subscription id>/providers/Microsoft.Authorization/roleDefinitions/5bc02df6-6cd5-43fe-ad3d-4c93cf56cc16 to be approved by users defined in P0