You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes how a data owner can leverage Azure Purview to enable access to ALL data sources in a subscription or a resource group. This can be achieved through a single policy statement, and will cover all existing data sources, as well as data sources that are created afterwards. However, at this point, only the following data sources are supported:
17
-
- Blob storage
18
-
- Azure Data Lake Storage (ADLS) Gen2
16
+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. You can also [register an entire Azure resource group or subscription to a collection](register-scan-azure-multiple-sources.md), which will allow you to scan all available data sources in that resource group or subscription. If you create a single access policy against a registered resource group or subscription, a data owner can enable access to **all** available data sources in that resource group or subscription. That single policy will cover all existing data sources and any data sources that are created afterwards.
17
+
18
+
This article describes how a data owner can create a single access policy for **all available** data sources in a subscription or a resource group.
19
+
20
+
> [!IMPORTANT]
21
+
> Currently, these are the available data sources for access policies:
### Register the subscription or resource group in Azure Purview for Data use governance
29
-
The subscription or resource group needs to be registered with Azure Purview to later define access policies. You can follow this guide:
33
+
### Register the subscription or resource group for data use governance
34
+
The subscription or resource group needs to be registered with Azure Purview to later define access policies.
35
+
36
+
To register your resource, follow the **Prerequisites** and **Register** sections of this guide:
37
+
38
+
-[Register multiple sources in Azure Purview](register-scan-azure-multiple-sources.md#prerequisites)
39
+
40
+
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41
+
42
+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
-[How to enable data use governance](./how-to-enable-data-use-governance.md)
32
45
33
-
Follow this link to [Enable the resource group or subscription for access policies](./how-to-enable-data-use-governance.md) in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
46
+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
34
47
35
-

48
+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
36
49
37
50
## Create and publish a data owner policy
38
51
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance**modify* access to resource group *finance-rg*:
39
52
40
-

53
+
:::image type="content" source="./media/tutorial-data-owner-policies-resource-group/data-owner-policy-example-resource-group.png" alt-text="Screenshot that shows a sample data owner policy giving access to a resource group.":::
41
54
42
55
>[!Important]
43
56
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. At this point, only the following data sources are supported:
17
+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection.
18
+
19
+
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. Currently, these Azure Storage sources are supported:
18
20
- Blob storage
19
21
- Azure Data Lake Storage (ADLS) Gen2
20
22
@@ -27,20 +29,28 @@ This article describes how a data owner can use Azure Purview to enable access t
### Register the data sources in Azure Purview for Data use governance
30
-
Register and scan each Storage account with Azure Purview to later define access policies. You can follow these guides:
32
+
The Azure Storage resources need to be registered with Azure Purview to later define access policies.
33
+
34
+
To register your resources, follow the **Prerequisites** and **Register** sections of these guides:
35
+
36
+
-[Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md#prerequisites)
37
+
38
+
-[Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
39
+
40
+
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
31
41
32
-
-[Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md)
42
+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
33
43
34
-
-[Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md)
44
+
-[How to enable data use governance](./how-to-enable-data-use-governance.md)
35
45
36
-
Follow this link to [Enable the data source for access policies](./how-to-enable-data-use-governance.md) in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
46
+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
37
47
38
-

48
+
:::image type="content" source="./media/how-to-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Screenshot that shows how to register a data source for policy by toggling the enable tab in the resource editor.":::
39
49
40
50
## Create and publish a data owner policy
41
51
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides group *Contoso Team**read* access to Storage account *marketinglake1*:
42
52
43
-

53
+
:::image type="content" source="./media/how-to-data-owner-policies-storage/data-owner-policy-example-storage.png" alt-text="Screenshot that shows a sample data owner policy giving access to an Azure Storage account.":::
0 commit comments