Skip to content

Commit 4394e46

Browse files
committed
Edits to how-to pages.
1 parent 85184fc commit 4394e46

File tree

2 files changed

+41
-18
lines changed

2 files changed

+41
-18
lines changed

articles/purview/how-to-data-owner-policies-resource-group.md

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,21 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 3/14/2022
9+
ms.date: 4/08/2022
1010
ms.custom:
1111
---
1212

1313
# Resource group and subscription access provisioning by data owner (preview)
1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

16-
This article describes how a data owner can leverage Azure Purview to enable access to ALL data sources in a subscription or a resource group. This can be achieved through a single policy statement, and will cover all existing data sources, as well as data sources that are created afterwards. However, at this point, only the following data sources are supported:
17-
- Blob storage
18-
- Azure Data Lake Storage (ADLS) Gen2
16+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. You can also [register an entire Azure resource group or subscription to a collection](register-scan-azure-multiple-sources.md), which will allow you to scan all available data sources in that resource group or subscription. If you create a single access policy against a registered resource group or subscription, a data owner can enable access to **all** available data sources in that resource group or subscription. That single policy will cover all existing data sources and any data sources that are created afterwards.
17+
18+
This article describes how a data owner can create a single access policy for **all available** data sources in a subscription or a resource group.
19+
20+
> [!IMPORTANT]
21+
> Currently, these are the available data sources for access policies:
22+
> - Blob storage
23+
> - Azure Data Lake Storage (ADLS) Gen2
1924
2025
## Prerequisites
2126
[!INCLUDE [Access policies generic pre-requisites](./includes/access-policies-prerequisites-generic.md)]
@@ -25,19 +30,27 @@ This article describes how a data owner can leverage Azure Purview to enable acc
2530
## Configuration
2631
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
2732

28-
### Register the subscription or resource group in Azure Purview for Data use governance
29-
The subscription or resource group needs to be registered with Azure Purview to later define access policies. You can follow this guide:
33+
### Register the subscription or resource group for data use governance
34+
The subscription or resource group needs to be registered with Azure Purview to later define access policies.
35+
36+
To register your resource, follow the **Prerequisites** and **Register** sections of this guide:
37+
38+
- [Register multiple sources in Azure Purview](register-scan-azure-multiple-sources.md#prerequisites)
39+
40+
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41+
42+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
3043

31-
- [Register multiple sources - Azure Purview](register-scan-azure-multiple-sources.md)
44+
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
3245

33-
Follow this link to [Enable the resource group or subscription for access policies](./how-to-enable-data-use-governance.md) in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
46+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
3447

35-
![Image shows how to register a resource group or subscription for policy.](./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png)
48+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
3649

3750
## Create and publish a data owner policy
3851
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*:
3952

40-
![Image shows a sample data owner policy giving access to a resource group.](./media/tutorial-data-owner-policies-resource-group/data-owner-policy-example-resource-group.png)
53+
:::image type="content" source="./media/tutorial-data-owner-policies-resource-group/data-owner-policy-example-resource-group.png" alt-text="Screenshot that shows a sample data owner policy giving access to a resource group.":::
4154

4255
>[!Important]
4356
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).

articles/purview/how-to-data-owner-policies-storage.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,17 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 03/14/2022
9+
ms.date: 04/08/2022
1010
ms.custom:
1111
---
1212

1313
# Access provisioning by data owner to Azure Storage datasets (preview)
1414

1515
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1616

17-
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. At this point, only the following data sources are supported:
17+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection.
18+
19+
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. Currently, these Azure Storage sources are supported:
1820
- Blob storage
1921
- Azure Data Lake Storage (ADLS) Gen2
2022

@@ -27,20 +29,28 @@ This article describes how a data owner can use Azure Purview to enable access t
2729
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
2830

2931
### Register the data sources in Azure Purview for Data use governance
30-
Register and scan each Storage account with Azure Purview to later define access policies. You can follow these guides:
32+
The Azure Storage resources need to be registered with Azure Purview to later define access policies.
33+
34+
To register your resources, follow the **Prerequisites** and **Register** sections of these guides:
35+
36+
- [Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md#prerequisites)
37+
38+
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
39+
40+
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
3141

32-
- [Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md)
42+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
3343

34-
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md)
44+
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
3545

36-
Follow this link to [Enable the data source for access policies](./how-to-enable-data-use-governance.md) in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
46+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
3747

38-
![Image shows how to register a data source for policy.](./media/how-to-data-owner-policies-storage/register-data-source-for-policy-storage.png)
48+
:::image type="content" source="./media/how-to-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Screenshot that shows how to register a data source for policy by toggling the enable tab in the resource editor.":::
3949

4050
## Create and publish a data owner policy
4151
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides group *Contoso Team* *read* access to Storage account *marketinglake1*:
4252

43-
![Image shows a sample data owner policy giving access to an Azure Storage account.](./media/how-to-data-owner-policies-storage/data-owner-policy-example-storage.png)
53+
:::image type="content" source="./media/how-to-data-owner-policies-storage/data-owner-policy-example-storage.png" alt-text="Screenshot that shows a sample data owner policy giving access to an Azure Storage account.":::
4454

4555

4656
>[!Important]

0 commit comments

Comments
 (0)