You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-arc-sql-server.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,11 +44,9 @@ Register each data source with Microsoft Purview to later define access policies
44
44
45
45
1. Select **Register** or **Apply** at the bottom
46
46
47
-
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
47
+
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
48
48

49
49
50
-
> [!Note]
51
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data Use Management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-resource-group.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
6
6
ms.service: purview
7
7
ms.subservice: purview-data-policies
8
8
ms.topic: how-to
9
-
ms.date: 10/10/2022
9
+
ms.date: 11/14/2022
10
10
ms.custom: event-tier1-build-2022
11
11
---
12
12
@@ -22,10 +22,10 @@ In this guide we cover how to register an entire resource group or subscription
22
22
23
23
**Only these data sources are enabled for access policies on resource group or subscription**. Follow the **Prerequisites** section that is specific to the data source(s) in these guides:
24
24
*[Data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md#prerequisites)
25
-
*[Data owner policies on an Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md#prerequisites)*
26
-
*[Data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md#prerequisites)*
25
+
*[Data owner policies on an Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md#prerequisites)(*)
26
+
*[Data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md#prerequisites)(*)
27
27
28
-
(*) Only the *SQL Performance monitoring* and *Security auditing* actions are fully supported for SQL-type data sources. The *Read* action needs a workaround described later in this guide. The *Modify* action is not currently supported for SQL-type data sources.
28
+
(*) The *Modify* action is not currently supported for SQL-type data sources.
@@ -44,7 +44,8 @@ In the end, your resource will have the **Data Use Management** toggle **Enable
44
44

45
45
46
46
>[!Important]
47
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID.
47
+
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* to provide their App ID: [See this document](./how-to-policies-data-owner-arc-sql-server.md#register-data-sources-in-microsoft-purview).
48
+
48
49
49
50
## Create and publish a data owner policy
50
51
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to the example shown in the image: a policy that provides security group *sg-Finance**modify* access to resource group *finance-rg*. Use the Data source box in the Policy user experience.
@@ -55,9 +56,6 @@ Execute the steps in the **Create a new policy** and **Publish a policy** sectio
55
56
> - Publish is a background operation. For example, Azure Storage accounts can take up to **2 hours** to reflect the changes.
56
57
> - Changing a policy does not require a new publish operation. The changes will be picked up with the next pull.
57
58
58
-
>[!Warning]
59
-
> **Known Issues**
60
-
> - No implicit connect permission is provided to SQL type data sources (e.g.: Azure SQL DB, SQL server on Azure Arc-enabled servers) when creating a policy with *Read* action on a resource group or subscription. To support this scenario, provide the connect permission to the Azure AD principals locally, i.e. directly in the SQL-type data sources.
61
59
62
60
## Additional information
63
61
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers, for example, *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (that is, at container or sub-container level).
### Register the data source and enable Data use management
173
+
The Arc-enabled SQL Server data source needs to be registered first with Microsoft Purview, before policies can be created.
174
+
175
+
1. Sign in to Microsoft Purview Studio.
176
+
177
+
1. Navigate to the **Data map** feature on the left pane, select **Sources**, then select **Register**. Type "Azure Arc" in the search box and select **SQL Server on Azure Arc**. Then select **Continue**
178
+

179
+
180
+
1. Enter a **Name** for this registration. It is best practice to make the name of the registration the same as the server name in the next step.
181
+
182
+
1. select an **Azure subscription**, **Server name** and **Server endpoint**.
183
+
184
+
1.**Select a collection** to put this registration in.
185
+
186
+
1. Enable Data Use Management. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
187
+
188
+
1. Upon enabling Data Use Management, Microsoft Purview will automatically capture the **Application ID** of the App Registration related to this Arc-enabled SQL server. Come back to this screen and hit the refresh button on the side of it to refresh, in case the association between the Arc-enabled SQL server and the App Registration changes in the future.
189
+
190
+
1. Select **Register** or **Apply** at the bottom
191
+
192
+
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
193
+

194
+
195
+
### Create a policy
196
+
To create an access policy for Arc-enabled SQL Server, follow these guides:
197
+
*[DevOps policy on a single Arc-enabled SQL Server](./how-to-policies-devops-arc-sql-server.md#create-a-new-devops-policy)
198
+
*[Data owner policy on a single Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.mdmd#create-and-publish-a-data-owner-policy) - This guide will allow you to provision access on a single Arc-enabled SQL Server in your subscription.
199
+
*[Data owner policy covering all sources in a subscription or resource group](./how-to-policies-data-owner-resource-group.md) - This guide will allow you to provision access on all enabled data sources in a resource group, or across an Azure subscription. The pre-requisite is that the subscription or resource group is registered with the Data use management option enabled.
165
200
166
201
167
202
## Next steps
168
203
169
204
Now that you have registered your source, follow the below guides to learn more about Microsoft Purview and your data.
170
-
205
+
-[DevOps policies in Microsoft Purview](concept-policies-devops.md)
171
206
-[Data Estate Insights in Microsoft Purview](concept-insights.md)
172
207
-[Lineage in Microsoft Purview](catalog-lineage-user-guide.md)
0 commit comments