Skip to content

Commit 38e0897

Browse files
Merge pull request #208755 from inward-eye/main
restructured naming
2 parents dc3c6e8 + 90c19b2 commit 38e0897

31 files changed

+91
-71
lines changed

articles/purview/.openpublishing.redirection.purview.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,13 +46,33 @@
4646
"redirect_document_id": true
4747
},
4848
{
49-
"source_path_from_root": "/articles/purview/how-to-access-policies-storage.md",
50-
"redirect_url": "/azure/purview/tutorial-data-owner-policies-storage",
49+
"source_path_from_root": "/articles/purview/how-to-data-owner-policies-storage.md",
50+
"redirect_url": "/azure/purview/how-to-policies-data-owner-storage",
5151
"redirect_document_id": true
5252
},
5353
{
54-
"source_path_from_root": "/articles/purview/tutorial-access-policies-resource-group.md",
55-
"redirect_url": "/azure/purview/tutorial-data-owner-policies-resource-group",
54+
"source_path_from_root": "/azure/purview/how-to-data-owner-policies-resource-group.md",
55+
"redirect_url": "/azure/purview/how-to-policies-data-owner-resource-group",
56+
"redirect_document_id": true
57+
},
58+
{
59+
"source_path_from_root": "/azure/purview/how-to-data-owner-policies-arc-sql-server.md",
60+
"redirect_url": "/azure/purview/how-to-policies-data-owner-arc-sql-server",
61+
"redirect_document_id": true
62+
},
63+
{
64+
"source_path_from_root": "/azure/purview/how-to-data-owner-policies-azure-sql-db.md",
65+
"redirect_url": "/azure/purview/how-to-policies-data-owner-azure-sql-db",
66+
"redirect_document_id": true
67+
},
68+
{
69+
"source_path_from_root": "/azure/purview/how-to-data-owner-policy-authoring-generic.md",
70+
"redirect_url": "/azure/purview/how-to-policies-data-owner-authoring-generic.md",
71+
"redirect_document_id": true
72+
},
73+
{
74+
"source_path_from_root": "/azure/purview/concept-data-owner-policies.md",
75+
"redirect_url": "/azure/purview/concept-policies-data-owner.md",
5676
"redirect_document_id": true
5777
},
5878
{
@@ -147,7 +167,7 @@
147167
},
148168
{
149169
"source_path_from_root": "/articles/purview/tutorial-data-owner-policies-resource-group.md",
150-
"redirect_url": "/azure/purview/how-to-data-owner-policies-resource-group",
170+
"redirect_url": "/azure/purview/how-to-policies-data-owner-resource-group",
151171
"redirect_document_id": true
152172
},
153173
{

articles/purview/concept-data-owner-policies.md renamed to articles/purview/concept-policies-data-owner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,5 +99,5 @@ A policy published to a data source could contain references to an asset belongi
9999
## Next steps
100100
Check the tutorials on how to create policies in Microsoft Purview that work on specific data systems such as Azure Storage:
101101

102-
* [Access provisioning by data owner to Azure Storage datasets](how-to-data-owner-policies-storage.md)
103-
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
102+
* [Access provisioning by data owner to Azure Storage datasets](how-to-policies-data-owner-storage.md)
103+
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)

articles/purview/deployment-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ More hardening steps can be taken:
295295
* Fine-tune scope scan to improve scan performance
296296
* [Use REST APIs](tutorial-atlas-2-2-apis.md) to export critical metadata and properties for backup and recovery
297297
* [Use workflow](how-to-workflow-business-terms-approval.md) to automate ticketing and eventing to avoid human errors
298-
* [Use policies](concept-data-owner-policies.md) to manage access to data assets through the Microsoft Purview governance portal.
298+
* [Use policies](concept-policies-data-owner.md) to manage access to data assets through the Microsoft Purview governance portal.
299299

300300
## Lifecycle considerations
301301

articles/purview/how-to-enable-data-use-management.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818

1919
Currently, a data owner can enable DUM on a data resource for these types of access policies:
2020

21-
* [Data owner access policies](concept-data-owner-policies.md) - access policies authored via Microsoft Purview data policy experience.
21+
* [Data owner access policies](concept-policies-data-owner.md) - access policies authored via Microsoft Purview data policy experience.
2222
* [Self-service access policies](concept-self-service-data-access-policy.md) - access policies automatically generated by Microsoft Purview after a [self-service access request](how-to-request-access.md) is approved.
2323

2424
To be able to create any data policy on a resource, DUM must first be enabled on that resource. This article will explain how to enable DUM on your resources in Microsoft Purview.
@@ -89,6 +89,6 @@ To disable Data Use Management for a source, resource group, or subscription, a
8989

9090
## Next steps
9191

92-
- [Create data owner policies for your resources](how-to-data-owner-policy-authoring-generic.md)
93-
- [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
94-
- [Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)
92+
- [Create data owner policies for your resources](how-to-policies-data-owner-authoring-generic.md)
93+
- [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
94+
- [Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md)

articles/purview/how-to-data-owner-policies-arc-sql-server.md renamed to articles/purview/how-to-policies-data-owner-arc-sql-server.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: references_regions, event-tier1-build-2022
1313

1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

16-
[Access policies](concept-data-owner-policies.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
16+
[Access policies](concept-policies-data-owner.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
1717

1818
This how-to guide describes how a data owner can delegate authoring policies in Microsoft Purview to enable access to SQL Server on Azure Arc-enabled servers. The following actions are currently enabled: *SQL Performance Monitoring*, *SQL Security Auditing* and *Read*. These 3 actions are only supported for policies at server level. *Modify* is not supported at this point.
1919

@@ -60,7 +60,7 @@ This section describes the steps to configure the SQL Server on Azure Arc to use
6060
1. Navigate to **Azure Active Directory** feature on the left pane
6161

6262
1. Verify that Azure Active Directory Authentication is configured and scroll down.
63-
![Screenshot shows how to configure Microsoft Purview endpoint in Azure AD section.](./media/how-to-data-owner-policies-sql/setup-sql-on-arc-for-purview.png)
63+
![Screenshot shows how to configure Microsoft Purview endpoint in Azure AD section.](./media/how-to-policies-data-owner-sql/setup-sql-on-arc-for-purview.png)
6464

6565
1. Set **External Policy Based Authorization** to enabled
6666

@@ -76,7 +76,7 @@ Register each data source with Microsoft Purview to later define access policies
7676
1. Sign in to Microsoft Purview Studio.
7777

7878
1. Navigate to the **Data map** feature on the left pane, select **Sources**, then select **Register**. Type "Azure Arc" in the search box and select **SQL Server on Azure Arc**. Then select **Continue**
79-
![Screenshot shows how to select a source for registration.](./media/how-to-data-owner-policies-sql/select-arc-sql-server-for-registration.png)
79+
![Screenshot shows how to select a source for registration.](./media/how-to-policies-data-owner-sql/select-arc-sql-server-for-registration.png)
8080

8181
1. Enter a **Name** for this registration. It is best practice to make the name of the registration the same as the server name in the next step.
8282

@@ -92,24 +92,24 @@ Register each data source with Microsoft Purview to later define access policies
9292
1. Select **Register** or **Apply** at the bottom
9393

9494
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
95-
![Screenshot shows how to register a data source for policy.](./media/how-to-data-owner-policies-sql/register-data-source-for-policy-arc-sql.png)
95+
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-arc-sql.png)
9696

9797
> [!Note]
98-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md).
98+
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
9999
100100
## Create and publish a data owner policy
101101

102-
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-data-owner-policy-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
102+
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
103103

104104
**Example #1: SQL Performance Monitor policy**. This policy assigns the Azure AD principal 'Christie Cline' to the *SQL Performance monitoring* action, in the scope of Arc-enabled SQL server *DESKTOP-xxx*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
105105

106-
![Screenshot shows a sample data owner policy giving SQL Performance Monitor access to an Azure SQL Database.](./media/how-to-data-owner-policies-sql/data-owner-policy-example-arc-sql-server-performance-monitor.png)
106+
![Screenshot shows a sample data owner policy giving SQL Performance Monitor access to an Azure SQL Database.](./media/how-to-policies-data-owner-sql/data-owner-policy-example-arc-sql-server-performance-monitor.png)
107107

108108
**Example #2: SQL Security Auditor policy**. Similar to example 1, but choose the *SQL Security auditing* action (instead of *SQL Performance monitoring*), when authoring the policy. Note: Policies related to this action are not supported below server level.
109109

110110
**Example #3: Read policy**. This policy assigns the Azure AD principal 'sg-Finance' to the *SQL Data reader* action, in the scope of SQL server *DESKTOP-xxx*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
111111

112-
![Screenshot shows a sample data owner policy giving Data Reader access to an Azure SQL Database.](./media/how-to-data-owner-policies-sql/data-owner-policy-example-arc-sql-server-data-reader.png)
112+
![Screenshot shows a sample data owner policy giving Data Reader access to an Azure SQL Database.](./media/how-to-policies-data-owner-sql/data-owner-policy-example-arc-sql-server-data-reader.png)
113113

114114
> [!Note]
115115
> - Given that scan is not currently available for this data source, data reader policies can only be created at server level. Use the **Data sources** box instead of the Asset box when authoring the **data resources** part of the policy.
@@ -190,7 +190,7 @@ This section contains a reference of how actions in Microsoft Purview data polic
190190
## Next steps
191191
Check blog, demo and related how-to guides
192192
* [Demo of access policy for Azure Storage](https://learn-video.azurefd.net/vod/player?id=caa25ad3-7927-4dcc-88dd-6b74bcae98a2)
193-
* [Concepts for Microsoft Purview data owner policies](./concept-data-owner-policies.md)
193+
* [Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
194194
* Blog: [Private preview: controlling access to Azure SQL at scale with policies in Purview](https://techcommunity.microsoft.com/t5/azure-sql-blog/private-preview-controlling-access-to-azure-sql-at-scale-with/ba-p/2945491)
195-
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
196-
* [Enable Microsoft Purview data owner policies on an Azure SQL DB](./how-to-data-owner-policies-azure-sql-db.md)
195+
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
196+
* [Enable Microsoft Purview data owner policies on an Azure SQL DB](./how-to-policies-data-owner-azure-sql-db.md)

articles/purview/how-to-data-owner-policy-authoring-generic.md renamed to articles/purview/how-to-policies-data-owner-authoring-generic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,5 +120,5 @@ Ensure you have the *Policy Author* permission as described [here](#permissions-
120120

121121
For specific guides on creating policies, you can follow these tutorials:
122122

123-
- [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
124-
- [Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)
123+
- [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
124+
- [Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md)

articles/purview/how-to-data-owner-policies-azure-sql-db.md renamed to articles/purview/how-to-policies-data-owner-azure-sql-db.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: references_regions, event-tier1-build-2022
1313

1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

16-
[Access policies](concept-data-owner-policies.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
16+
[Access policies](concept-policies-data-owner.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
1717

1818
This how-to guide describes how a data owner can delegate authoring policies in Microsoft Purview to enable access to Azure SQL DB. The following actions are currently enabled: *SQL Performance Monitoring*, *SQL Security Auditing* and *Read*. The first two actions are supported only at server level. *Modify* is not supported at this point.
1919

@@ -34,22 +34,22 @@ After you've registered your resources, you'll need to enable Data Use Managemen
3434
[How to enable Data Use Management](./how-to-enable-data-use-management.md)
3535

3636
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture. This will enable the access policies to be used with the given SQL server and all its contained databases.
37-
![Screenshot shows how to register a data source for policy.](./media/how-to-data-owner-policies-sql/register-data-source-for-policy-azure-sql-db.png)
37+
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-azure-sql-db.png)
3838

3939

4040
## Create and publish a data owner policy
4141

42-
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-data-owner-policy-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
42+
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
4343

4444
**Example #1: SQL Performance Monitor policy**. This policy assigns the Azure AD principal 'Mateo Gomez' to the *SQL Performance monitoring* action, in the scope of SQL server *relecloud-sql-srv2*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
4545

46-
![Screenshot shows a sample data owner policy giving SQL Performance Monitor access to an Azure SQL Database.](./media/how-to-data-owner-policies-sql/data-owner-policy-example-azure-sql-db-performance-monitor.png)
46+
![Screenshot shows a sample data owner policy giving SQL Performance Monitor access to an Azure SQL Database.](./media/how-to-policies-data-owner-sql/data-owner-policy-example-azure-sql-db-performance-monitor.png)
4747

4848
**Example #2: SQL Security Auditor policy**. Similar to example 1, but choose the *SQL Security auditing* action (instead of *SQL Performance monitoring*), when authoring the policy. Note: Policies related to this action are not supported below server level.
4949

5050
**Example #3: Read policy**. This policy assigns the Azure AD principal 'Robert Murphy' to the *SQL Data reader* action, in the scope of SQL server *relecloud-sql-srv2*. This policy has also been published to that server. Note: Policies related to this action are supported below server level (e.g., database, table)
5151

52-
![Screenshot shows a sample data owner policy giving Data Reader access to an Azure SQL Database.](./media/how-to-data-owner-policies-sql/data-owner-policy-example-azure-sql-db-data-reader.png)
52+
![Screenshot shows a sample data owner policy giving Data Reader access to an Azure SQL Database.](./media/how-to-policies-data-owner-sql/data-owner-policy-example-azure-sql-db-data-reader.png)
5353

5454

5555
>[!Important]
@@ -124,8 +124,8 @@ This section contains a reference of how actions in Microsoft Purview data polic
124124
## Next steps
125125
Check blog, demo and related how-to guides
126126
* [Demo of access policy for Azure Storage](https://learn-video.azurefd.net/vod/player?id=caa25ad3-7927-4dcc-88dd-6b74bcae98a2)
127-
* [Concepts for Microsoft Purview data owner policies](./concept-data-owner-policies.md)
127+
* [Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
128128
* Blog: [Microsoft Purview Data Policy for SQL DevOps access provisioning now in public preview](https://techcommunity.microsoft.com/t5/microsoft-purview-blog/microsoft-purview-data-policy-for-sql-devops-access-provisioning/ba-p/3403174)
129129
* Blog: [Controlling access to Azure SQL at scale with policies in Purview](https://techcommunity.microsoft.com/t5/azure-sql-blog/private-preview-controlling-access-to-azure-sql-at-scale-with/ba-p/2945491)
130-
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
131-
* [Enable Microsoft Purview data owner policies on an Arc-enabled SQL Server](./how-to-data-owner-policies-arc-sql-server.md)
130+
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
131+
* [Enable Microsoft Purview data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md)

0 commit comments

Comments
 (0)