You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-enable-data-use-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,8 +68,8 @@ To disable Data use management for a source, resource group, or subscription, a
68
68
69
69
## Additional considerations related to Data use management
70
70
- Make sure you write down the **Name** you use when registering in Microsoft Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
71
-
- To disable a source for *Data use management*, remove it first from being bound (i.e. published) in any policy.
72
-
- While user needs to have both data source *Owner* and Microsoft Purview *Data source admin* to enable a source for *Data use management*, either of those roles can independently disable it.
71
+
- To disable a source for *Data use management*, you first have to remove any published policies on that data source.
72
+
- While user needs to have both data source *Owner* and Microsoft Purview *Data source admin* to enable a source for *Data use management*, **any** Data Source admin for the collection can disable it.
73
73
- Disabling *Data use management* for a subscription will disable it also for all assets registered in that subscription.
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-authoring-generic.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Before authoring data policies in the Microsoft Purview governance portal, you'l
36
36
## Create a new policy
37
37
38
38
This section describes the steps to create a new policy in Microsoft Purview.
39
-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies).
39
+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies).
40
40
41
41
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
42
42
@@ -81,7 +81,7 @@ Now that you have created your policy, you will need to publish it for it to bec
81
81
## Publish a policy
82
82
A newly created policy is in the **draft** state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
83
83
84
-
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies)
84
+
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-publish-data-owner-policies)
85
85
86
86
The steps to publish a policy are as follows:
87
87
@@ -105,7 +105,7 @@ The steps to publish a policy are as follows:
105
105
## Update or delete a policy
106
106
107
107
Steps to update or delete a policy in Microsoft Purview are as follows.
108
-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies)
108
+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies)
109
109
110
110
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-configuration-generic.md
+23-18Lines changed: 23 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ ms.author: vlrodrig
4
4
ms.service: purview
5
5
ms.subservice: purview-data-policies
6
6
ms.topic: include
7
-
ms.date: 10/10/2022
7
+
ms.date: 10/28/2022
8
8
ms.custom:
9
9
---
10
10
@@ -17,32 +17,37 @@ This step is needed before a policy can be created in Microsoft Purview for that
17
17
18
18
Follow this [guide to configure Azure RBAC role permissions](../../role-based-access-control/check-access.md). The following screenshot shows how to access the Access Control section in Azure portal experience for the data resource to add a role assignment:
19
19
20
-

20
+

21
21
22
-
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role at the **root collection level**. See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23
-

22
+
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role for the collection or a parent collection (if inheritance is enabled). See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23
+

24
24
25
-
>[!IMPORTANT]
26
-
> Currently, Microsoft Purview roles related to access policy operations must be configured at **root collection level**.
25
+
#### Configure Microsoft Purview permissions needed to create or update access policies
26
+
The following permissions are needed in Microsoft Purview at the **root collection level**:
27
+
-*Policy authors* role can create, update and delete DevOps and Data Owner policies
28
+
29
+
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
27
30
28
-
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
29
31
>[!IMPORTANT]
30
-
> - Once a resource has been enabled for *Data Use Management*, **any** Microsoft Purview user with *Policy author* role at root-collection level will be able to provision access to that data source from Microsoft Purview.
31
-
> - The IAM Owner role for a data resource can be inherited from parent resource group, subscription or subscription Management group. Check which AAD users, groups and service principals hold or are inheriting IAM Owner for the resource.
32
-
> - Note that **Any** Microsoft Purview root *Collection admin* can assign **new** users to root-collection *Data Source Admin* and *Policy author* roles. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data Source Admin* or *Policy author* roles at root collection level.
33
-
> - If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time dependent on the specific data source. This can have implications both on security and data access availability. The Contributor and Owner roles in IAM are able to delete Microsoft Purview accounts. You can check these permissions by navigating to the Access control (IAM) section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [ARM locks](../../azure-resource-manager/management/lock-resources.md).
32
+
> Currently, Microsoft Purview roles related to creating/updating/deleting policies must be configured at **root collection level**.
33
+
34
+
>[!Note]
35
+
> **Known issues** related to permissions
36
+
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
34
37
35
-
#### Configure Microsoft Purview permissions needed to create and publish data owner policies
36
-
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it.
38
+
#### Configure Microsoft Purview permissions needed to publish Data Owner policies
39
+
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps policies are created/updated so it does not apply to this type of policies.
37
40
The following permissions are needed in Microsoft Purview at the **root collection level**:
38
-
-*Policy authors* role can create or edit policies.
39
41
-*Data source administrator* role can publish a policy.
40
42
41
43
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
42
44
43
45
>[!IMPORTANT]
44
-
> Currently, Microsoft Purview roles related to access policy operations must be configured at **root collection level**.
46
+
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at **root collection level**.
45
47
46
-
>[!Note]
47
-
> **Known issues** related to permissions
48
-
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
48
+
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
49
+
>[!IMPORTANT]
50
+
> - Once a resource has been enabled for *Data use management*, **any** Microsoft Purview user with *Policy author* role at root-collection level will be able to provision access to that data source from Microsoft Purview.
51
+
> - The IAM Owner role for a data resource can be inherited from parent resource group, subscription or subscription Management group. Check which AAD users, groups and service principals hold or are inheriting IAM Owner for the resource.
52
+
> - Note that **Any** Microsoft Purview root *Collection admin* can assign **new** users to root *Policy author* roles. **Any***Collection admin* can assign **new** users to *Data Source Admin* under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data Source Admin* or *Policy author* roles.
53
+
> - If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time dependent on the specific data source. This can have implications both on security and data access availability. The Contributor and Owner roles in IAM are able to delete Microsoft Purview accounts. You can check these permissions by navigating to the Access control (IAM) section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [ARM locks](../../azure-resource-manager/management/lock-resources.md).
0 commit comments