Share via

Issue with trying to specify scope when assigning a policy on a resource group

Cumar Rage 0 Reputation points
2026-03-10T10:39:51.75+00:00

Trying to enforce tagging via an Azure Policy by assigning the built-in policy to the resource group and evaluate the outcome. I have tried to Specify the Scope by clicking the ellipsis button and selecting the right Subscription and resource group but not been able to.

Azure Policy
Azure Policy

An Azure service that is used to implement corporate governance and standards at scale for Azure resources.


1 answer

Sort by: Most helpful
  1. Bharath Y P 7,240 Reputation points Microsoft External Staff Moderator
    2026-03-10T16:25:59.9966667+00:00

    Hello Cumar, it sounds like you’re trying to scope a built-in tagging policy to just one resource group in the portal, but the Scope picker isn’t letting you pick it. Here’s what you can check and try:

    1. Verify your permissions – You need at least Policy Contributor or Owner on the subscription (or the resource group) to assign policies. – If you only have Reader on the subscription, the Scope ellipsis will be disabled or your RG won’t show up.
    2. Confirm the policy definition can be assigned at RG scope – Built-in policies can generally be assigned at subscription, resource group, or resource scopes, but if a policy was defined at a management group you may only be able to assign it at or above that level.
    3. Use a different browser or clear cache – Occasionally the portal UI misbehaves. Try an incognito window or clear your browser cache to see if the Scope picker re-appears.
    4. Assign via CLI or PowerShell as a workaround If the portal still won’t let you pick the RG, you can directly assign the policy at the RG scope: Azure CLI example:
      
         az policy assignment create \
      
           --name require-tags-on-rg \
      
           --scope  /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName> \
      
           --policy /providers/Microsoft.Authorization/policyDefinitions/<policyDefinitionId> \
      
           --params '{ "tagName": { "value": "Environment" } }'
      
      
      PowerShell example:
      
         New-AzPolicyAssignment `
      
           -Name "require-tags-on-rg" `
      
           -Scope "/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>" `
      
           -PolicyDefinitionId "/providers/Microsoft.Authorization/policyDefinitions/<policyDefinitionId>" `
      
           -PolicyParameterObject @{ "tagName" = @{ "value" = "Environment" } }
      
      
    5. Double-check you’re in the right blade – In the portal go to Policy > Assignments > + Assign Policy – Under Scope, click the ellipsis (…) next to the Subscription box, then drill down to your RG.

    If none of that helps, could you share:

    • The exact policy you’re trying to assign (name or definition ID)
    • What you see (or don’t see) when you click the Scope ellipsis
    • Any error messages you get when you hover over or click the picker

    Hope that gets you unblocked!

    Reference list:


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.