You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/concept-policies-data-owner.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,5 +99,5 @@ A policy published to a data source could contain references to an asset belongi
99
99
## Next steps
100
100
Check the tutorials on how to create policies in Microsoft Purview that work on specific data systems such as Azure Storage:
101
101
102
-
*[Access provisioning by data owner to Azure Storage datasets](how-to-data-owner-policies-storage.md)
103
-
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
102
+
*[Access provisioning by data owner to Azure Storage datasets](how-to-policies-data-owner-storage.md)
103
+
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
Copy file name to clipboardExpand all lines: articles/purview/how-to-enable-data-use-management.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.custom:
18
18
19
19
Currently, a data owner can enable DUM on a data resource for these types of access policies:
20
20
21
-
*[Data owner access policies](concept-data-owner-policies.md) - access policies authored via Microsoft Purview data policy experience.
21
+
*[Data owner access policies](concept-policies-data-owner.md) - access policies authored via Microsoft Purview data policy experience.
22
22
*[Self-service access policies](concept-self-service-data-access-policy.md) - access policies automatically generated by Microsoft Purview after a [self-service access request](how-to-request-access.md) is approved.
23
23
24
24
To be able to create any data policy on a resource, DUM must first be enabled on that resource. This article will explain how to enable DUM on your resources in Microsoft Purview.
@@ -89,6 +89,6 @@ To disable Data Use Management for a source, resource group, or subscription, a
89
89
90
90
## Next steps
91
91
92
-
-[Create data owner policies for your resources](how-to-data-owner-policy-authoring-generic.md)
93
-
-[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
94
-
-[Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)
92
+
-[Create data owner policies for your resources](how-to-policies-data-owner-authoring-generic.md)
93
+
-[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
94
+
-[Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md)
[Access policies](concept-data-owner-policies.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
16
+
[Access policies](concept-policies-data-owner.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
17
17
18
18
This how-to guide describes how a data owner can delegate authoring policies in Microsoft Purview to enable access to SQL Server on Azure Arc-enabled servers. The following actions are currently enabled: *SQL Performance Monitoring*, *SQL Security Auditing* and *Read*. These 3 actions are only supported for policies at server level. *Modify* is not supported at this point.
19
19
@@ -60,7 +60,7 @@ This section describes the steps to configure the SQL Server on Azure Arc to use
60
60
1. Navigate to **Azure Active Directory** feature on the left pane
61
61
62
62
1. Verify that Azure Active Directory Authentication is configured and scroll down.
63
-

63
+

64
64
65
65
1. Set **External Policy Based Authorization** to enabled
66
66
@@ -76,7 +76,7 @@ Register each data source with Microsoft Purview to later define access policies
76
76
1. Sign in to Microsoft Purview Studio.
77
77
78
78
1. Navigate to the **Data map** feature on the left pane, select **Sources**, then select **Register**. Type "Azure Arc" in the search box and select **SQL Server on Azure Arc**. Then select **Continue**
79
-

79
+

80
80
81
81
1. Enter a **Name** for this registration. It is best practice to make the name of the registration the same as the server name in the next step.
82
82
@@ -92,24 +92,24 @@ Register each data source with Microsoft Purview to later define access policies
92
92
1. Select **Register** or **Apply** at the bottom
93
93
94
94
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
95
-

95
+

96
96
97
97
> [!Note]
98
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md).
98
+
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
99
99
100
100
## Create and publish a data owner policy
101
101
102
-
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-data-owner-policy-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
102
+
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
103
103
104
104
**Example #1: SQL Performance Monitor policy**. This policy assigns the Azure AD principal 'Christie Cline' to the *SQL Performance monitoring* action, in the scope of Arc-enabled SQL server *DESKTOP-xxx*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
105
105
106
-

106
+

107
107
108
108
**Example #2: SQL Security Auditor policy**. Similar to example 1, but choose the *SQL Security auditing* action (instead of *SQL Performance monitoring*), when authoring the policy. Note: Policies related to this action are not supported below server level.
109
109
110
110
**Example #3: Read policy**. This policy assigns the Azure AD principal 'sg-Finance' to the *SQL Data reader* action, in the scope of SQL server *DESKTOP-xxx*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
111
111
112
-

112
+

113
113
114
114
> [!Note]
115
115
> - Given that scan is not currently available for this data source, data reader policies can only be created at server level. Use the **Data sources** box instead of the Asset box when authoring the **data resources** part of the policy.
@@ -190,7 +190,7 @@ This section contains a reference of how actions in Microsoft Purview data polic
190
190
## Next steps
191
191
Check blog, demo and related how-to guides
192
192
*[Demo of access policy for Azure Storage](https://learn-video.azurefd.net/vod/player?id=caa25ad3-7927-4dcc-88dd-6b74bcae98a2)
193
-
*[Concepts for Microsoft Purview data owner policies](./concept-data-owner-policies.md)
193
+
*[Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
194
194
* Blog: [Private preview: controlling access to Azure SQL at scale with policies in Purview](https://techcommunity.microsoft.com/t5/azure-sql-blog/private-preview-controlling-access-to-azure-sql-at-scale-with/ba-p/2945491)
195
-
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
196
-
*[Enable Microsoft Purview data owner policies on an Azure SQL DB](./how-to-data-owner-policies-azure-sql-db.md)
195
+
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
196
+
*[Enable Microsoft Purview data owner policies on an Azure SQL DB](./how-to-policies-data-owner-azure-sql-db.md)
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-authoring-generic.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,5 +120,5 @@ Ensure you have the *Policy Author* permission as described [here](#permissions-
120
120
121
121
For specific guides on creating policies, you can follow these tutorials:
122
122
123
-
-[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
124
-
-[Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)
123
+
-[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
124
+
-[Enable Microsoft Purview data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md)
[Access policies](concept-data-owner-policies.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
16
+
[Access policies](concept-policies-data-owner.md) allow you to manage access from Microsoft Purview to data sources that have been registered for *Data Use Management*.
17
17
18
18
This how-to guide describes how a data owner can delegate authoring policies in Microsoft Purview to enable access to Azure SQL DB. The following actions are currently enabled: *SQL Performance Monitoring*, *SQL Security Auditing* and *Read*. The first two actions are supported only at server level. *Modify* is not supported at this point.
19
19
@@ -34,22 +34,22 @@ After you've registered your resources, you'll need to enable Data Use Managemen
34
34
[How to enable Data Use Management](./how-to-enable-data-use-management.md)
35
35
36
36
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture. This will enable the access policies to be used with the given SQL server and all its contained databases.
37
-

37
+

38
38
39
39
40
40
## Create and publish a data owner policy
41
41
42
-
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-data-owner-policy-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
42
+
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to one of the examples shown in the images.
43
43
44
44
**Example #1: SQL Performance Monitor policy**. This policy assigns the Azure AD principal 'Mateo Gomez' to the *SQL Performance monitoring* action, in the scope of SQL server *relecloud-sql-srv2*. This policy has also been published to that server. Note: Policies related to this action are not supported below server level.
45
45
46
-

46
+

47
47
48
48
**Example #2: SQL Security Auditor policy**. Similar to example 1, but choose the *SQL Security auditing* action (instead of *SQL Performance monitoring*), when authoring the policy. Note: Policies related to this action are not supported below server level.
49
49
50
50
**Example #3: Read policy**. This policy assigns the Azure AD principal 'Robert Murphy' to the *SQL Data reader* action, in the scope of SQL server *relecloud-sql-srv2*. This policy has also been published to that server. Note: Policies related to this action are supported below server level (e.g., database, table)
51
51
52
-

52
+

53
53
54
54
55
55
>[!Important]
@@ -124,8 +124,8 @@ This section contains a reference of how actions in Microsoft Purview data polic
124
124
## Next steps
125
125
Check blog, demo and related how-to guides
126
126
*[Demo of access policy for Azure Storage](https://learn-video.azurefd.net/vod/player?id=caa25ad3-7927-4dcc-88dd-6b74bcae98a2)
127
-
*[Concepts for Microsoft Purview data owner policies](./concept-data-owner-policies.md)
127
+
*[Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
128
128
* Blog: [Microsoft Purview Data Policy for SQL DevOps access provisioning now in public preview](https://techcommunity.microsoft.com/t5/microsoft-purview-blog/microsoft-purview-data-policy-for-sql-devops-access-provisioning/ba-p/3403174)
129
129
* Blog: [Controlling access to Azure SQL at scale with policies in Purview](https://techcommunity.microsoft.com/t5/azure-sql-blog/private-preview-controlling-access-to-azure-sql-at-scale-with/ba-p/2945491)
130
-
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
131
-
*[Enable Microsoft Purview data owner policies on an Arc-enabled SQL Server](./how-to-data-owner-policies-arc-sql-server.md)
130
+
*[Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
131
+
*[Enable Microsoft Purview data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md)
0 commit comments