Skip to content

Commit 2c77354

Browse files
Merge pull request #233203 from inward-eye/main
changes to generic config for resource moved to another RG
2 parents fac8887 + 57daa03 commit 2c77354

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

articles/purview/how-to-policies-data-owner-storage.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
99
ms.custom: references_regions, event-tier1-build-2022
10-
ms.date: 10/10/2022
10+
ms.date: 04/03/2023
1111
---
1212

1313
# Access provisioning by data owner to Azure Storage datasets (Preview)
@@ -59,6 +59,7 @@ Follow this link for the steps to [update or delete a data owner policy in Micro
5959

6060
## Data Consumption
6161
- Data consumer can access the requested dataset using tools such as Power BI or Azure Synapse Analytics workspace.
62+
- The Copy and Clone commands in Azure Storage Explorer require additional IAM permissions to work in addition to the Allow Modify policy from Purview. Provide Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action permission in IAM to the Azure AD principal.
6263
- Sub-container access: Policy statements set below container level on a Storage account are supported. However, users will not be able to browse to the data asset using Azure portal's Storage Browser or Microsoft Azure Storage Explorer tool if access is granted only at file or folder level of the Azure Storage account. This is because these apps attempt to crawl down the hierarchy starting at container level, and the request fails because no access has been granted at that level. Instead, the App that requests the data must execute a direct access by providing a fully qualified name to the data object. The following documents show examples of how to perform a direct access. See also the blogs in the *Next steps* section of this how-to-guide.
6364
- [*abfs* for ADLS Gen2](../hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2.md#access-files-from-the-cluster)
6465
- [*az storage blob download* for Blob Storage](../storage/blobs/storage-quickstart-blobs-cli.md#download-a-blob)

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,18 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 02/03/2023
7+
ms.date: 04/03/2023
88
ms.custom:
99
---
1010

11+
#### Register the data source in Microsoft Purview
12+
Before a policy can be created in Microsoft Purview for a data resource, you must register that data resource in Microsoft Purview Studio. You will find the instructions related to registering the data resource later in this guide.
13+
>[!NOTE]
14+
> If a data source is moved to a new resource group or subscription it first needs to be de-registered and then re-registered for Microsoft Purview's policies to continue to work, as they rely on the data source's ARM path.
15+
1116
#### Configure permissions to enable Data use management on the data source
1217

13-
Before a policy can be created in Microsoft Purview for a resource, you must configure permissions. To enable the **Data use management** toggle for a data source, resource group, or subscription, the *same user* must have *both* specific identity and access management (IAM) privileges on the resource and specific Microsoft Purview privileges:
18+
Once a resource is registered, but before a policy can be created in Microsoft Purview for that resource, you must configure permissions. A set of permissions are needed to enable the **Data use management**. This applies to data sources, resource groups, or subscriptions. To enable *Data use management*, the **same user** must have **both** specific identity and access management (IAM) privileges on the resource and specific Microsoft Purview privileges:
1419

1520
- The user must have *either one* of the following IAM role combinations on the resource's Azure Resource Manager path or any parent of it (that is, using IAM permission inheritance):
1621
- IAM Owner

0 commit comments

Comments
 (0)