You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-authoring-generic.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ Now that you have created your policy, you will need to publish it for it to bec
77
77
## Publish a policy
78
78
A newly created policy is in the **draft** state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
79
79
80
-
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-publish-data-owner-policies)
80
+
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-for-publishing-data-owner-policies)
81
81
82
82
The steps to publish a policy are as follows:
83
83
@@ -99,7 +99,7 @@ The steps to publish a policy are as follows:
99
99
> After making changes to a policy, there is no need to publish it again for it to take effect if the data source(s) continues to be the same.
100
100
101
101
## Unpublish a policy
102
-
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-publish-data-owner-policies)
102
+
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-for-publishing-data-owner-policies)
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-configuration-generic.md
+43-27Lines changed: 43 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,44 +8,60 @@ ms.date: 10/28/2022
8
8
ms.custom:
9
9
---
10
10
11
-
#### Configure permissions needed to enable *Data use management* on the data source
12
-
This step is needed before a policy can be created in Microsoft Purview for that resource. To enable the *Data use management* toggle for a data source, resource group, or subscription, the **same user** must have **both** specific IAM privileges on the resource and specific Microsoft Purview privileges.
11
+
#### Configure permissions to enable Data use management on the data source
13
12
14
-
1) The user must have **either one of the following** IAM role combinations on the resource's ARM path or any parent of it (i.e, leveraging IAM permission inheritance).
15
-
- IAM *Owner*
16
-
- Both IAM *Contributor* + IAM *User Access Administrator*
13
+
Before a policy can be created in Microsoft Purview for a resource, you must configure permissions. To enable the **Data use management** toggle for a data source, resource group, or subscription, the *same user* must have *both* specific identity and access management (IAM) privileges on the resource and specific Microsoft Purview privileges:
17
14
18
-
Follow this [guide to configure Azure RBAC role permissions](../../role-based-access-control/check-access.md). The following screenshot shows how to access the Access Control section in Azure portal experience for the data resource to add a role assignment:
15
+
- The user must have *either one* of the following IAM role combinations on the resource's Azure Resource Manager path or any parent of it (that is, using IAM permission inheritance):
16
+
- IAM Owner
17
+
- Both IAM Contributor and IAM User Access Administrator
19
18
20
-

19
+
To configure Azure role-based access control (RBAC) permissions, follow [this guide](../../role-based-access-control/check-access.md). The following screenshot shows how to access the **Access Control** section in the Azure portal for the data resource to add a role assignment.
21
20
22
-
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role for the collection or a parent collection (if inheritance is enabled). See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23
-

21
+

24
22
25
-
#### Configure Microsoft Purview permissions to create, update or delete access policies
26
-
The following permissions are needed in Microsoft Purview at the **root collection level**:
27
-
-*Policy authors* role can create, update and delete DevOps and Data Owner policies
28
-
-*Policy authors* role can delete Self-service access policies
23
+
- The same user needs to have the Microsoft Purview *Data source admin* role for the collection or a parent collection (if inheritance is enabled). For more information, see the [guide on managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users).
29
24
30
-
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
25
+
The following screenshot shows how to assign the *Data source admin* role at the root collection level.
26
+
27
+

28
+
29
+
#### Configure Microsoft Purview permissions to create, update, or delete access policies
30
+
31
+
The following permissions are needed in Microsoft Purview at the *root collection level*:
32
+
33
+
- The *Policy author* role can create, update, and delete DevOps and Data Owner policies.
34
+
- The *Policy author* role can delete self-service access policies.
35
+
36
+
For more information about managing Microsoft Purview role assignments, see [Create and manage collections in the Microsoft Purview Data Map](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
31
37
32
38
>[!NOTE]
33
-
> Currently, Microsoft Purview roles related to creating/updating/deleting policies must be configured at **root collection level**.
34
-
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
39
+
> Currently, Microsoft Purview roles related to creating, updating, and deleting policies must be configured at the root collection level.
40
+
>
41
+
> In addition to the Microsoft Purview *Policy author* role, users might need [Directory Readers](../../active-directory/roles/permissions-reference.md#directory-readers) permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant.
42
+
43
+
#### Configure Microsoft Purview permissions for publishing Data Owner policies
44
+
45
+
Data Owner policies allow for checks and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. Before a data policy takes effect, a second person (*Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic after DevOps or self-service access policies are created or updated, so it doesn't apply to these types of policies.
35
46
36
-
#### Configure Microsoft Purview permissions needed to publish Data Owner policies
37
-
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps or Self-service access policies are created/updated so it does not apply to these types of policies.
38
-
The following permissions are needed in Microsoft Purview at the **root collection level**:
39
-
-*Data source administrator* role can publish a policy.
47
+
The following permissions are needed in Microsoft Purview at the *root collection level*:
40
48
41
-
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
49
+
- The *Data source admin* role can publish a policy.
50
+
51
+
For more information about managing Microsoft Purview role assignments, see [Create and manage collections in the Microsoft Purview Data Map](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
42
52
43
53
>[!NOTE]
44
-
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at **root collection level**.
54
+
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at the root collection level.
45
55
46
56
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
47
-
>[!IMPORTANT]
48
-
> - Once a resource has been enabled for *Data use management*, **any** Microsoft Purview user with *Policy author* role at root-collection level will be able to provision access to that data source from Microsoft Purview.
49
-
> - The IAM Owner role for a data resource can be inherited from parent resource group, subscription or subscription Management group. Check which AAD users, groups and service principals hold or are inheriting IAM Owner for the resource.
50
-
> - Note that **Any** Microsoft Purview root *Collection admin* can assign **new** users to root *Policy author* roles. **Any***Collection admin* can assign **new** users to *Data Source Admin* under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data Source Admin* or *Policy author* roles.
51
-
> - If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time dependent on the specific data source. This can have implications both on security and data access availability. The Contributor and Owner roles in IAM are able to delete Microsoft Purview accounts. You can check these permissions by navigating to the Access control (IAM) section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [ARM locks](../../azure-resource-manager/management/lock-resources.md).
57
+
58
+
After a resource has been enabled for **Data use management**, any Microsoft Purview user with the *Policy author* role at the root collection level can provision access to that data source from Microsoft Purview.
59
+
60
+
The *IAM Owner* role for a data resource can be inherited from a parent resource group, a subscription, or a subscription management group. Check which Azure AD users, groups, and service principals hold or are inheriting the *IAM Owner* role for the resource.
61
+
62
+
> [!NOTE]
63
+
> Any Microsoft Purview root *Collection admin* can assign new users to root *Policy author* roles. Any *Collection admin* can assign new users to a *Data source admin* role under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data source admin*, or *Policy author* roles.
64
+
65
+
If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time that depends on the specific data source. This change can have implications on both security and data access availability. The Contributor and Owner roles in IAM can delete Microsoft Purview accounts.
66
+
67
+
You can check these permissions by going to the **Access control (IAM)** section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [Resource Manager locks](../../azure-resource-manager/management/lock-resources.md).
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-prerequisites-arc-sql-server.md
+46-39Lines changed: 46 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,55 +9,62 @@ ms.custom: references_regions
9
9
---
10
10
11
11
12
-
- Get SQL server version 2022 RC 1 or later running on Windows and install it. [Follow this link](https://www.microsoft.com/sql-server/sql-server-2022).
13
-
- Complete process to onboard that [SQL server with Azure Arc](/sql/sql-server/azure-arc/connect).
14
-
- Enable [Azure AD Authentication in SQL server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial). For a simpler setup[follow this article](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial#setting-up-azure-ad-admin-using-the-azure-portal).
12
+
- Get [SQL Server version 2022 RC 1 or later](https://www.microsoft.com/sql-server/sql-server-2022) running on Windows and install it.
13
+
- Complete the process to onboard that [SQL Server instance with Azure Arc](/sql/sql-server/azure-arc/connect).
14
+
- Enable [Azure Active Directory authentication in SQL Server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial). For a simpler setup, follow [this article](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial#setting-up-azure-ad-admin-using-the-azure-portal).
15
15
16
16
#### Region support
17
-
- Policy enforcement is only available in the following regions for Microsoft Purview:
18
-
- East US
19
-
- East US 2
20
-
- South Central US
21
-
- West Central US
22
-
- West US
23
-
- West US2
24
-
- West US3
25
-
- Canada Central
26
-
- Brazil South
27
-
- North Europe
28
-
- West Europe
29
-
- France Central
30
-
- Switzerland North
31
-
- UK South
32
-
- UAE North
33
-
- South Africa North
34
-
- Central India
35
-
- Korea Central
36
-
- Japan East
37
-
- Australia East
38
-
17
+
18
+
Policy enforcement is available in only the following regions for Microsoft Purview:
19
+
20
+
- East US
21
+
- East US 2
22
+
- South Central US
23
+
- West Central US
24
+
- West US
25
+
- West US2
26
+
- West US3
27
+
- Canada Central
28
+
- Brazil South
29
+
- North Europe
30
+
- West Europe
31
+
- France Central
32
+
- Switzerland North
33
+
- UK South
34
+
- UAE North
35
+
- South Africa North
36
+
- Central India
37
+
- Korea Central
38
+
- Japan East
39
+
- Australia East
40
+
39
41
#### Security considerations for SQL Server on Azure Arc-enabled servers
40
-
- The Server admin can turn off the Microsoft Purview policy enforcement.
41
-
- Arc Admin/Server admin permissions empower the Arc admin or Server admin with the ability to change the ARM path of the given server. Given that mappings in Microsoft Purview use ARM paths, this can lead to wrong policy enforcements.
42
-
- SQL Admin (DBA) can gain the power of Server admin and can tamper with the cached policies from Microsoft Purview.
43
-
- The recommended configuration is to create a separate App Registration per SQL server instance. This prevents SQL server2 from reading the policies meant for SQL server1, in case a rogue admin in SQL server2 tampers with the ARM path.
44
42
45
-
#### SQL Server on Azure Arc-enabled server configuration
46
-
This section describes the steps to configure the SQL Server on Azure Arc to use Microsoft Purview.
43
+
- The server admin can turn off the Microsoft Purview policy enforcement.
44
+
- Azure Arc admin and server admin permissions provide the ability to change the Azure Resource Manager path of the server. Because mappings in Microsoft Purview use Resource Manager paths, this can lead to wrong policy enforcements.
45
+
- A SQL Server admin (database admin) can gain the power of a server admin and can tamper with the cached policies from Microsoft Purview.
46
+
- The recommended configuration is to create a separate app registration for each SQL server instance. This configuration prevents the second SQL Server instance from reading the policies meant for the first SQL Server instance, in case a rogue admin in the second SQL Server instance tampers with the Resource Manager path.
47
+
48
+
#### SQL Server configuration on Azure Arc
49
+
50
+
This section describes the steps to configure SQL Server on Azure Arc to use Microsoft Purview.
51
+
52
+
1. Sign in to the Azure portal through [this link](https://portal.azure.com/#view/Microsoft_Azure_HybridCompute/AzureArcCenterBlade/~/sqlServers), which lists SQL Server instances on Azure Arc.
53
+
54
+
1. Select the SQL Server instance that you want to configure.
47
55
48
-
1.Sign in to Azure portal through this [link](https://portal.azure.com/#view/Microsoft_Azure_HybridCompute/AzureArcCenterBlade/~/sqlServers) which lists SQL Servers on Azure Arc.
56
+
1.Go to **Azure Active Directory**on the left pane.
49
57
50
-
1.Select the SQL Server you want to configure
58
+
1.Verify that Azure Active Directory authentication is configured with an admin login, a SQL Server service certificate, and a SQL Server app registration.
51
59
52
-
1.Navigate to **Azure Active Directory**feature on the left pane
60
+
1.Scroll down to set **External Policy Based Authorization**to **Enabled**.
53
61
54
-
1. Verify that Azure Active Directory Authentication is configured. This means that all these have been entered: an admin login, a SQL Server service certificate, and a SQL Server app registration.
55
-

62
+
1. For **Microsoft Purview Endpoint**, enter an endpoint in the format *https://\<purview-account-name\>.purview.azure.com*. You can see the names of Microsoft Purview accounts in your tenant through [this link](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Purview%2FAccounts).
56
63
57
-
1. Scroll down to set **External Policy Based Authorization** to enabled
64
+
Optionally, you can confirm the endpoint by going to the Microsoft Purview account. Go to the **Properties** section on the left menu and scroll down until you see **Scan endpoint**. The full endpoint path is the one listed without "/Scan" at the end.
58
65
59
-
1.Enter **Microsoft Purview Endpoint** in the format *https://\<purview-account-name\>.purview.azure.com*. You can see the names of Microsoft Purview accounts in your tenant through [this link](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Purview%2FAccounts). Optionally, you can confirm the endpoint by navigating to the Microsoft Purview account, then to the Properties section on the left menu and scrolling down until you see "Scan endpoint". The full endpoint path will be the one listed without the "/Scan" at the end.
66
+
1.Make a note of the **App registration ID** value. You'll need it when you register and enable this data source for **Data use management** in Microsoft Purview.
60
67
61
-
1. Make a note of the **App registration ID**, as you will need it when you register and enable this data source for*Data Use Management* in Microsoft Purview.
68
+

62
69
63
70
1. Select the **Save** button to save the configuration.
0 commit comments