Skip to content

Commit 411d061

Browse files
committed
exapand on arc-enabled-sql
1 parent 4354345 commit 411d061

File tree

3 files changed

+45
-14
lines changed

3 files changed

+45
-14
lines changed

articles/purview/how-to-policies-data-owner-arc-sql-server.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,11 +44,9 @@ Register each data source with Microsoft Purview to later define access policies
4444

4545
1. Select **Register** or **Apply** at the bottom
4646

47-
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
47+
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
4848
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-arc-sql.png)
4949

50-
> [!Note]
51-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data Use Management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
5250

5351
## Create and publish a data owner policy
5452

articles/purview/how-to-policies-data-owner-resource-group.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 10/10/2022
9+
ms.date: 11/14/2022
1010
ms.custom: event-tier1-build-2022
1111
---
1212

@@ -22,10 +22,10 @@ In this guide we cover how to register an entire resource group or subscription
2222

2323
**Only these data sources are enabled for access policies on resource group or subscription**. Follow the **Prerequisites** section that is specific to the data source(s) in these guides:
2424
* [Data owner policies on an Azure Storage account](./how-to-policies-data-owner-storage.md#prerequisites)
25-
* [Data owner policies on an Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md#prerequisites)*
26-
* [Data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md#prerequisites)*
25+
* [Data owner policies on an Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md#prerequisites)(*)
26+
* [Data owner policies on an Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md#prerequisites)(*)
2727

28-
(*) Only the *SQL Performance monitoring* and *Security auditing* actions are fully supported for SQL-type data sources. The *Read* action needs a workaround described later in this guide. The *Modify* action is not currently supported for SQL-type data sources.
28+
(*) The *Modify* action is not currently supported for SQL-type data sources.
2929

3030
## Microsoft Purview configuration
3131
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
@@ -44,7 +44,8 @@ In the end, your resource will have the **Data Use Management** toggle **Enable
4444
![Screenshot shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.](./media/how-to-policies-data-owner-resource-group/register-resource-group-for-policy.png)
4545

4646
>[!Important]
47-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID.
47+
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* to provide their App ID: [See this document](./how-to-policies-data-owner-arc-sql-server.md#register-data-sources-in-microsoft-purview).
48+
4849

4950
## Create and publish a data owner policy
5051
Execute the steps in the **Create a new policy** and **Publish a policy** sections of the [data-owner policy authoring tutorial](./how-to-policies-data-owner-authoring-generic.md#create-a-new-policy). The result will be a data owner policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*. Use the Data source box in the Policy user experience.
@@ -55,9 +56,6 @@ Execute the steps in the **Create a new policy** and **Publish a policy** sectio
5556
> - Publish is a background operation. For example, Azure Storage accounts can take up to **2 hours** to reflect the changes.
5657
> - Changing a policy does not require a new publish operation. The changes will be picked up with the next pull.
5758
58-
>[!Warning]
59-
> **Known Issues**
60-
> - No implicit connect permission is provided to SQL type data sources (e.g.: Azure SQL DB, SQL server on Azure Arc-enabled servers) when creating a policy with *Read* action on a resource group or subscription. To support this scenario, provide the connect permission to the Azure AD principals locally, i.e. directly in the SQL-type data sources.
6159

6260
## Additional information
6361
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers, for example, *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (that is, at container or sub-container level).

articles/purview/register-scan-azure-arc-enabled-sql-server.md

Lines changed: 38 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -160,14 +160,49 @@ To create and run a new scan, do the following:
160160

161161
### Supported policies
162162
The following types of policies are supported on this data resource from Microsoft Purview:
163-
* [DevOps policies](how-to-policies-devops-arc-sql-server.md)
164-
* [Data Owner](how-to-policies-data-owner-arc-sql-server.md)
163+
- [DevOps policies](concept-policies-devops.md)
164+
- [Data owner policies](concept-policies-data-owner.md)
165+
166+
### Access policy pre-requisites on Arc enabled SQL Server
167+
[!INCLUDE [Access policies Arc enabled SQL Server pre-requisites](./includes/access-policies-prerequisites-arc-sql-server.md)]
168+
169+
### Configure the Microsoft Purview account for policies
170+
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
171+
172+
### Register the data source and enable Data use management
173+
The Arc-enabled SQL Server data source needs to be registered first with Microsoft Purview, before policies can be created.
174+
175+
1. Sign in to Microsoft Purview Studio.
176+
177+
1. Navigate to the **Data map** feature on the left pane, select **Sources**, then select **Register**. Type "Azure Arc" in the search box and select **SQL Server on Azure Arc**. Then select **Continue**
178+
![Screenshot shows how to select a source for registration.](./media/how-to-policies-data-owner-sql/select-arc-sql-server-for-registration.png)
179+
180+
1. Enter a **Name** for this registration. It is best practice to make the name of the registration the same as the server name in the next step.
181+
182+
1. select an **Azure subscription**, **Server name** and **Server endpoint**.
183+
184+
1. **Select a collection** to put this registration in.
185+
186+
1. Enable Data Use Management. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
187+
188+
1. Upon enabling Data Use Management, Microsoft Purview will automatically capture the **Application ID** of the App Registration related to this Arc-enabled SQL server. Come back to this screen and hit the refresh button on the side of it to refresh, in case the association between the Arc-enabled SQL server and the App Registration changes in the future.
189+
190+
1. Select **Register** or **Apply** at the bottom
191+
192+
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this picture.
193+
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-arc-sql.png)
194+
195+
### Create a policy
196+
To create an access policy for Arc-enabled SQL Server, follow these guides:
197+
* [DevOps policy on a single Arc-enabled SQL Server](./how-to-policies-devops-arc-sql-server.md#create-a-new-devops-policy)
198+
* [Data owner policy on a single Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.mdmd#create-and-publish-a-data-owner-policy) - This guide will allow you to provision access on a single Arc-enabled SQL Server in your subscription.
199+
* [Data owner policy covering all sources in a subscription or resource group](./how-to-policies-data-owner-resource-group.md) - This guide will allow you to provision access on all enabled data sources in a resource group, or across an Azure subscription. The pre-requisite is that the subscription or resource group is registered with the Data use management option enabled.
165200

166201

167202
## Next steps
168203

169204
Now that you have registered your source, follow the below guides to learn more about Microsoft Purview and your data.
170-
205+
- [DevOps policies in Microsoft Purview](concept-policies-devops.md)
171206
- [Data Estate Insights in Microsoft Purview](concept-insights.md)
172207
- [Lineage in Microsoft Purview](catalog-lineage-user-guide.md)
173208
- [Search Data Catalog](how-to-search-catalog.md)

0 commit comments

Comments
 (0)