Skip to content

Commit 4ab6b18

Browse files
authored
Merge pull request #216397 from inward-eye/main
updated policies config generic
2 parents 45736e5 + 8ef91c5 commit 4ab6b18

File tree

3 files changed

+28
-23
lines changed

3 files changed

+28
-23
lines changed

articles/purview/how-to-enable-data-use-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,8 @@ To disable Data use management for a source, resource group, or subscription, a
6868

6969
## Additional considerations related to Data use management
7070
- Make sure you write down the **Name** you use when registering in Microsoft Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
71-
- To disable a source for *Data use management*, remove it first from being bound (i.e. published) in any policy.
72-
- While user needs to have both data source *Owner* and Microsoft Purview *Data source admin* to enable a source for *Data use management*, either of those roles can independently disable it.
71+
- To disable a source for *Data use management*, you first have to remove any published policies on that data source.
72+
- While user needs to have both data source *Owner* and Microsoft Purview *Data source admin* to enable a source for *Data use management*, **any** Data Source admin for the collection can disable it.
7373
- Disabling *Data use management* for a subscription will disable it also for all assets registered in that subscription.
7474

7575
> [!WARNING]

articles/purview/how-to-policies-data-owner-authoring-generic.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before authoring data policies in the Microsoft Purview governance portal, you'l
3636
## Create a new policy
3737

3838
This section describes the steps to create a new policy in Microsoft Purview.
39-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies).
39+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies).
4040

4141
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
4242

@@ -81,7 +81,7 @@ Now that you have created your policy, you will need to publish it for it to bec
8181
## Publish a policy
8282
A newly created policy is in the **draft** state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
8383

84-
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies)
84+
Ensure you have the *Data Source Admin* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-publish-data-owner-policies)
8585

8686
The steps to publish a policy are as follows:
8787

@@ -105,7 +105,7 @@ The steps to publish a policy are as follows:
105105
## Update or delete a policy
106106

107107
Steps to update or delete a policy in Microsoft Purview are as follows.
108-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-and-publish-data-owner-policies)
108+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies)
109109

110110
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
111111

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 10/10/2022
7+
ms.date: 10/28/2022
88
ms.custom:
99
---
1010

@@ -17,32 +17,37 @@ This step is needed before a policy can be created in Microsoft Purview for that
1717

1818
Follow this [guide to configure Azure RBAC role permissions](../../role-based-access-control/check-access.md). The following screenshot shows how to access the Access Control section in Azure portal experience for the data resource to add a role assignment:
1919

20-
![Screenshot shows how to access Access Control in Azure Portal to add a role assignment](../media/how-to-policies-data-owner-authoring-generic/assign-IAM-permissions.png)
20+
![Screenshot shows how to access Access Control in Azure Portal to add a role assignment.](../media/how-to-policies-data-owner-authoring-generic/assign-IAM-permissions.png)
2121

22-
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role at the **root collection level**. See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23-
![Screenshot shows how to assign Data Source Admin at root collection level](../media/how-to-policies-data-owner-authoring-generic/assign-purview-permissions.png)
22+
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role for the collection or a parent collection (if inheritance is enabled). See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23+
![Screenshot shows how to assign Data Source Admin at root collection level.](../media/how-to-policies-data-owner-authoring-generic/assign-purview-permissions.png)
2424

25-
>[!IMPORTANT]
26-
> Currently, Microsoft Purview roles related to access policy operations must be configured at **root collection level**.
25+
#### Configure Microsoft Purview permissions needed to create or update access policies
26+
The following permissions are needed in Microsoft Purview at the **root collection level**:
27+
- *Policy authors* role can create, update and delete DevOps and Data Owner policies
28+
29+
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
2730

28-
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
2931
>[!IMPORTANT]
30-
> - Once a resource has been enabled for *Data Use Management*, **any** Microsoft Purview user with *Policy author* role at root-collection level will be able to provision access to that data source from Microsoft Purview.
31-
> - The IAM Owner role for a data resource can be inherited from parent resource group, subscription or subscription Management group. Check which AAD users, groups and service principals hold or are inheriting IAM Owner for the resource.
32-
> - Note that **Any** Microsoft Purview root *Collection admin* can assign **new** users to root-collection *Data Source Admin* and *Policy author* roles. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data Source Admin* or *Policy author* roles at root collection level.
33-
> - If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time dependent on the specific data source. This can have implications both on security and data access availability. The Contributor and Owner roles in IAM are able to delete Microsoft Purview accounts. You can check these permissions by navigating to the Access control (IAM) section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [ARM locks](../../azure-resource-manager/management/lock-resources.md).
32+
> Currently, Microsoft Purview roles related to creating/updating/deleting policies must be configured at **root collection level**.
33+
34+
>[!Note]
35+
> **Known issues** related to permissions
36+
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
3437
35-
#### Configure Microsoft Purview permissions needed to create and publish data owner policies
36-
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it.
38+
#### Configure Microsoft Purview permissions needed to publish Data Owner policies
39+
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps policies are created/updated so it does not apply to this type of policies.
3740
The following permissions are needed in Microsoft Purview at the **root collection level**:
38-
- *Policy authors* role can create or edit policies.
3941
- *Data source administrator* role can publish a policy.
4042

4143
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
4244

4345
>[!IMPORTANT]
44-
> Currently, Microsoft Purview roles related to access policy operations must be configured at **root collection level**.
46+
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at **root collection level**.
4547
46-
>[!Note]
47-
> **Known issues** related to permissions
48-
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
48+
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
49+
>[!IMPORTANT]
50+
> - Once a resource has been enabled for *Data use management*, **any** Microsoft Purview user with *Policy author* role at root-collection level will be able to provision access to that data source from Microsoft Purview.
51+
> - The IAM Owner role for a data resource can be inherited from parent resource group, subscription or subscription Management group. Check which AAD users, groups and service principals hold or are inheriting IAM Owner for the resource.
52+
> - Note that **Any** Microsoft Purview root *Collection admin* can assign **new** users to root *Policy author* roles. **Any** *Collection admin* can assign **new** users to *Data Source Admin* under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data Source Admin* or *Policy author* roles.
53+
> - If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time dependent on the specific data source. This can have implications both on security and data access availability. The Contributor and Owner roles in IAM are able to delete Microsoft Purview accounts. You can check these permissions by navigating to the Access control (IAM) section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [ARM locks](../../azure-resource-manager/management/lock-resources.md).

0 commit comments

Comments
 (0)