Skip to content

Commit 12e0da9

Browse files
committed
2 parents 6b16689 + 41ad048 commit 12e0da9

7 files changed

+19
-19
lines changed

articles/purview/concept-self-service-data-access-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: blessonj
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: conceptual
9-
ms.date: 03/10/2022
9+
ms.date: 11/11/2022
1010
---
1111

1212
# Microsoft Purview Self-service data discovery and access (Preview)
@@ -42,11 +42,11 @@ Microsoft Purview allows organizations to catalog metadata about all registered
4242

4343
With self-service data access workflow, data consumers can not only find data assets but also request access to the data assets. When the data consumer requests access to a data asset, the associated self-service data access workflow is triggered.
4444

45-
A default self-service data access workflow template is provided with every Microsoft Purview account. The default template can be amended to add more approvers and/or set the approver's email address. For more details refer [Create and enable self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md).
45+
A default self-service data access workflow template is provided with every Microsoft Purview account. The default template can be amended to add more approvers and/or set the approver's email address. For more details, refer [Create and enable self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md).
4646

47-
Whenever a data consumer requests access to a dataset, the notification is sent to the workflow approver(s). The approver(s) can view the request and approve it either from Microsoft Purview portal or from within the email notification. When the request is approved, a policy is auto-generated and applied against the respective data source. Self-service data access policy gets auto-generated only if the data source is registered for **Data Use Management**. The pre-requisites mentioned within the [Data Use Management](./how-to-enable-data-use-management.md#prerequisites) have to be satisfied.
47+
Whenever a data consumer requests access to a dataset, the notification is sent to the workflow approver(s). The approver(s) can view the request and approve it either from Microsoft Purview governance portal or from within the email notification. When the request is approved, a policy is auto-generated and applied against the respective data source. Self-service data access policy gets auto-generated only if the data source is registered for **Data Use Management**. The pre-requisites mentioned within the [Data Use Management](./how-to-enable-data-use-management.md#prerequisites) have to be satisfied.
4848

49-
Data consumer can access the requested dataset using tools such as PowerBI or Azure Synapse Analytics workspace.
49+
Data consumer can access the requested dataset using tools such as Power BI or Azure Synapse Analytics workspace.
5050

5151
>[!NOTE]
5252
> Users will not be able to browse to the asset using the Azure Portal or Storage explorer if the only permission granted is read/modify access at the file or folder level of the storage account.

articles/purview/how-to-policies-self-service-azure-sql-db.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Self-service policies for Azure SQL DB (preview)
3-
description: Step-by-step guide on how self-service policy is created for Azure SQL DB through Microsoft Purview access policies.
2+
title: Self-service policies for Azure SQL Database (preview)
3+
description: Step-by-step guide on how self-service policy is created for Azure SQL Database through Microsoft Purview access policies.
44
author: bjspeaks
55
ms.author: blessonj
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 10/13/2022
9+
ms.date: 11/11/2022
1010
ms.custom: references_regions, event-tier1-build-2022
1111
---
12-
# Self-service policies for Azure SQL DB (preview)
12+
# Self-service policies for Azure SQL Database (preview)
1313

1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

1616
[Self-service policies](concept-self-service-data-access-policy.md) allow you to manage access from Microsoft Purview to data sources that have been registered for **Data Use Management**.
1717

18-
This how-to guide describes how self-service policies get created in Microsoft Purview to enable access to Azure SQL DB. The following actions are currently enabled: *Read Tables*, and *Read Views*.
18+
This how-to guide describes how self-service policies get created in Microsoft Purview to enable access to Azure SQL Database. The following actions are currently enabled: *Read Tables*, and *Read Views*.
1919

2020
> [!CAUTION]
21-
> *Ownership chaining* must exist for *select* to work on Azure SQL DB *views*.
21+
> *Ownership chaining* must exist for *select* to work on Azure SQL Database *views*.
2222
2323
## Prerequisites
2424
[!INCLUDE [Access policies generic pre-requisites](./includes/access-policies-prerequisites-generic.md)]
@@ -28,7 +28,7 @@ This how-to guide describes how self-service policies get created in Microsoft P
2828
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
2929

3030
### Register the data sources in Microsoft Purview
31-
The Azure SQL DB resources need to be registered first with Microsoft Purview to later define access policies. You can follow these guides:
31+
The Azure SQL Database resources need to be registered first with Microsoft Purview to later define access policies. You can follow these guides:
3232

3333
[Register and scan Azure SQL DB](./register-scan-azure-sql-database.md)
3434

@@ -95,7 +95,7 @@ SELECT * FROM sys.dm_server_external_policy_principal_assigned_actions
9595

9696
### Policy action mapping
9797

98-
This section contains a reference of how actions in Microsoft Purview data policies map to specific actions in Azure SQL DB.
98+
This section contains a reference of how actions in Microsoft Purview data policies map to specific actions in Azure SQL Database.
9999

100100
| **Microsoft Purview policy action** | **Data source specific actions** |
101101
|-------------------------------------|--------------------------------------|

articles/purview/how-to-policies-self-service-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,11 @@ Once your data source has the **Data Use Management** toggle **Enabled**, it wi
5151
>[!Important]
5252
> - Publish is a background operation. Azure Storage accounts can take up to **2 hours** to reflect the changes.
5353
54-
## View a self-service Policy
54+
## View a self-service policy
5555

5656
To view the policies you've created, follow the article to [view the self-service policies](how-to-view-self-service-data-access-policy.md).
5757

58-
## Data Consumption
58+
## Data consumption
5959

6060
- Data consumer can access the requested dataset using tools such as Power BI or Azure Synapse Analytics workspace.
6161

articles/purview/how-to-request-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,4 @@ This article outlines how to make an access request.
3131
- [What are Microsoft Purview workflows](concept-workflow.md)
3232
- [Approval workflow for business terms](how-to-workflow-business-terms-approval.md)
3333
- [Self-service data access workflow for hybrid data estates](how-to-workflow-self-service-data-access-hybrid.md)
34-
- [self-service policies](concept-self-service-data-access-policy.md)
34+
- [Self-service policies](concept-self-service-data-access-policy.md)

articles/purview/how-to-workflow-self-service-data-access-hybrid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,4 +140,4 @@ For more information about workflows, see these articles:
140140
- [Workflows in Microsoft Purview](concept-workflow.md)
141141
- [Approval workflow for business terms](how-to-workflow-business-terms-approval.md)
142142
- [Manage workflow requests and approvals](how-to-workflow-manage-requests-approvals.md)
143-
- [self-service access policies](concept-self-service-data-access-policy.md)
143+
- [Self-service access policies](concept-self-service-data-access-policy.md)

articles/purview/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: whhender
66
ms.service: purview
77
ms.custom: event-tier1-build-2022
88
ms.topic: overview
9-
ms.date: 11/10/2022
9+
ms.date: 11/11/2022
1010
---
1111

1212
# What's available in the Microsoft Purview governance portal?
@@ -61,7 +61,7 @@ Microsoft Purview Data Policy is a set of central, cloud-based experiences that
6161
- Manage access to data sources from a single-pane of glass, cloud-based experience
6262
- Introduces a new data-plane permission model that is external to data sources
6363
- Seamless integration with Microsoft Purview Data Map and Catalog helps search for data assets and grant access only to what is required via fine-grained policies
64-
- Based on role definitions that are simple and abstracted (e.g. Read, Modify)
64+
- Based on role definitions that are simple and abstracted (for example: Read, Modify)
6565
- At-scale access provisioning
6666

6767
For more information, see our introductory guides:
@@ -112,7 +112,7 @@ Discovering and understanding data sources and their use is the primary purpose
112112

113113
At the same time, users can contribute to the catalog by tagging, documenting, and annotating data sources that have already been registered. They can also register new data sources, which are then discovered, understood, and consumed by the community of catalog users.
114114

115-
Lastly, Microsoft Purview Data Policy app leverages the metadata in the Data Map, providing a superior solution to keep your data secure.
115+
Lastly, Microsoft Purview Data Policy app applies the metadata in the Data Map, providing a superior solution to keep your data secure.
116116
* Structure and simplify the process of granting/revoking access.
117117
* Reduce the effort of access provisioning.
118118
* Access decision in Microsoft data systems has negligible latency penalty.

0 commit comments

Comments
 (0)