Skip to content

Commit 4c26da2

Browse files
authored
Merge pull request #195371 from whhender/7-azure-purview-to-microsoft-purview
Purview Includes - Azure Purview to Microsoft Purview
2 parents 398faac + 9f1d68e commit 4c26da2

8 files changed

+30
-30
lines changed

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,51 +8,51 @@ ms.date: 04/18/2022
88
ms.custom:
99
---
1010

11-
### Register Azure Purview as a resource provider in other subscriptions
12-
Execute this step only if the data sources and the Azure Purview account are in different subscriptions. Register Azure Purview as a resource provider in each subscription where data sources reside by following this guide: [Register resource provider](../../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider).
11+
### Register Microsoft Purview as a resource provider in other subscriptions
12+
Execute this step only if the data sources and the Microsoft Purview account are in different subscriptions. Register Microsoft Purview as a resource provider in each subscription where data sources reside by following this guide: [Register resource provider](../../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider).
1313

14-
The Azure Purview resource provider is:
14+
The Microsoft Purview resource provider is:
1515
```
1616
Microsoft.Purview
1717
```
1818

1919
### Configure permissions for policy management actions
2020
This section discusses the permissions needed to:
21-
- Make a data resource available for *data use governance*. This step is needed before a policy can be created in Azure Purview for that resource.
22-
- Author and publish policies in Azure Purview.
21+
- Make a data resource available for *data use governance*. This step is needed before a policy can be created in Microsoft Purview for that resource.
22+
- Author and publish policies in Microsoft Purview.
2323

2424
>[!IMPORTANT]
25-
> Currently, Azure Purview roles related to policy operations must be configured at **root collection level** and not child collection level.
25+
> Currently, Microsoft Purview roles related to policy operations must be configured at **root collection level** and not child collection level.
2626
2727
#### Permissions to make a data resource available for *Data use governance*
28-
To enable the *data use governance* (DUG) toggle for a data source, resource group, or subscription, the same user needs to have both certain IAM privileges on the resource and certain Azure Purview privileges.
28+
To enable the *data use governance* (DUG) toggle for a data source, resource group, or subscription, the same user needs to have both certain IAM privileges on the resource and certain Microsoft Purview privileges.
2929

3030
1) User needs to have **either one of the following** IAM role combinations on the resource:
3131
- IAM *Owner*
3232
- Both IAM *Contributor* + IAM *User Access Administrator*
3333

3434
Follow this [guide to configure Azure RBAC role permissions](../../role-based-access-control/check-access.md).
3535

36-
2) In addition, the same user needs to have Azure Purview Data source administrator (DSA) role at the **root collection level**. See the guide on [managing Azure Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users).
36+
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role at the **root collection level**. See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users).
3737

3838
#### Permissions for policy authoring and publishing
39-
The following permissions are needed in Azure Purview at the **root collection level**:
39+
The following permissions are needed in Microsoft Purview at the **root collection level**:
4040
- *Policy authors* role can create or edit policies.
4141
- *Data source administrator* role can publish a policy.
4242

43-
Check the section on managing Azure Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
43+
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
4444

4545
>[!WARNING]
4646
> **Known issues** related to permissions
47-
> - In addition to Azure Purview *Policy authors* role, user requires *Directory Reader* permission in Azure Active Directory to create data owner policy. Learn more about permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers)
47+
> - In addition to Microsoft Purview *Policy authors* role, user requires *Directory Reader* permission in Azure Active Directory to create data owner policy. Learn more about permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers)
4848
49-
#### Delegation of access control responsibility to Azure Purview
49+
#### Delegation of access control responsibility to Microsoft Purview
5050

5151
>[!WARNING]
5252
> - IAM Owner role for a data source can be inherited from parent resource group, subscription or subscription Management Group.
53-
> - Once a resource has been enabled for *Data use Governance*, **any** Azure Purview root-collection *policy author* will be able to create access policies against it, and **any** Azure Purview root-collection *Data source admin* will be able to publish those policies at **any point afterwards**.
54-
> - **Any** Azure Purview root *Collection admin* can assign **new** root-collection *Data Source Admin* and *Policy author* roles.
53+
> - Once a resource has been enabled for *Data use Governance*, **any** Microsoft Purview root-collection *policy author* will be able to create access policies against it, and **any** Microsoft Purview root-collection *Data source admin* will be able to publish those policies at **any point afterwards**.
54+
> - **Any** Microsoft Purview root *Collection admin* can assign **new** root-collection *Data Source Admin* and *Policy author* roles.
5555
5656
With these warnings in mind, here are some **suggested best practices for permissions:**
57-
- Minimize the number of people that hold Azure Purview root *Collection admin*, root *Data Source Admin* or root *Policy author* roles.
58-
- To ensure check and balances, assign the Azure Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it.
57+
- Minimize the number of people that hold Microsoft Purview root *Collection admin*, root *Data Source Admin* or root *Policy author* roles.
58+
- To ensure check and balances, assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it.

articles/purview/includes/access-policies-prerequisites-generic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ ms.date: 01/28/2022
88
ms.custom:
99
---
1010
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
11-
- Create a new, or use an existing Azure Purview account. You can [follow our quick-start guide to create one](../create-catalog-portal.md).
11+
- Create a new, or use an existing Microsoft Purview account. You can [follow our quick-start guide to create one](../create-catalog-portal.md).
1212
- Create a new, or use an existing resource group, and place new data sources under it. [Follow this guide to create a new resource group](../../azure-resource-manager/management/manage-resource-groups-portal.md).

articles/purview/includes/access-policies-prerequisites-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom:
99
---
1010

1111
### Enable access policy enforcement for the Azure Storage account
12-
To enable Azure Purview to manage policies for one or more Azure Storage accounts, execute the following PowerShell commands in the subscription where you'll deploy your Azure Storage account. These PowerShell commands will enable Azure Purview to manage policies on all **newly created** Azure Storage accounts in that subscription.
12+
To enable Microsoft Purview to manage policies for one or more Azure Storage accounts, execute the following PowerShell commands in the subscription where you'll deploy your Azure Storage account. These PowerShell commands will enable Microsoft Purview to manage policies on all **newly created** Azure Storage accounts in that subscription.
1313

1414
If you’re executing these commands locally, be sure to run PowerShell as an administrator.
1515
Alternatively, you can use the [Azure Cloud Shell](../../cloud-shell/overview.md) in the Azure portal: [https://shell.azure.com](https://shell.azure.com).
@@ -27,14 +27,14 @@ If the output of the last command shows *RegistrationState* as *Registered*, the
2727
If the output is *Registering*, wait at least 10 minutes, and then retry the command. **Do not continue unless the RegistrationState shows as *Registered***.
2828

2929
>[!IMPORTANT]
30-
> The access policy feature is only available on **new** Azure Storage accounts. Storage accounts must meet the following requirements to enforce access policies published from Azure Purview.
30+
> The access policy feature is only available on **new** Azure Storage accounts. Storage accounts must meet the following requirements to enforce access policies published from Microsoft Purview.
3131
> - Storage account versions >= 81.x.x.
3232
> - Created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*.
3333
3434
### Create a new Azure Storage account
3535
After you’ve enabled the access policy above, create new Azure Storage account(s) in one of the regions listed below. You can [follow this guide to create one](../../storage/common/storage-account-create.md).
3636

37-
Currently, Azure Purview access policies can only be enforced in the following Azure Storage regions:
37+
Currently, Microsoft Purview access policies can only be enforced in the following Azure Storage regions:
3838
- France Central
3939
- Canada Central
4040
- East US

articles/purview/includes/authentication-to-enumerate-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,5 @@ ms.date: 02/04/2022
99
1. Go to the subscription or the resource group in the Azure portal.
1010
1. Select **Access Control (IAM)** from the left menu.
1111
1. Select **+Add**.
12-
1. In the **Select input** box, select the **Reader** role and enter your Azure Purview account name (which represents its MSI file name).
13-
1. Select **Save** to finish the role assignment. This will allow Azure Purview to list resources under a subscription or resource group.
12+
1. In the **Select input** box, select the **Reader** role and enter your Microsoft Purview account name (which represents its MSI file name).
13+
1. Select **Save** to finish the role assignment. This will allow Microsoft Purview to list resources under a subscription or resource group.

articles/purview/includes/data-factory-common-supported-capabilities.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ ms.date: 11/01/2021
3434
| SQL Server \* | Yes |
3535
| Teradata \* | Yes |
3636

37-
*\* Azure Purview currently doesn't support query or stored procedure for lineage or scanning. Lineage is limited to table and view sources only.*
37+
*\* Microsoft Purview currently doesn't support query or stored procedure for lineage or scanning. Lineage is limited to table and view sources only.*
3838

3939
If you use Self-hosted Integration Runtime, note the minimal version with lineage support for:
4040

@@ -71,8 +71,8 @@ In additional to lineage, the data asset schema (shown in Asset -> Schema tab) i
7171
| Azure Synapse Analytics \* | Yes |
7272
| Azure Dedicated SQL pool (formerly SQL DW) \* | Yes |
7373

74-
*\* Azure Purview currently doesn't support query or stored procedure for lineage or scanning. Lineage is limited to table and view sources only.*
74+
*\* Microsoft Purview currently doesn't support query or stored procedure for lineage or scanning. Lineage is limited to table and view sources only.*
7575

7676
#### Limitations on data flow lineage
7777

78-
Currently, data flow lineage doesn't integrate with Azure Purview [resource set](../concept-resource-sets.md).
78+
Currently, data flow lineage doesn't integrate with Microsoft Purview [resource set](../concept-resource-sets.md).

articles/purview/includes/manage-scans.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 1/20/2021
1313
1414
To create and run a new scan, do the following:
1515

16-
1. Select the **Data Map** tab on the left pane in the [Azure Purview Studio](https://web.purview.azure.com/resource/).
16+
1. Select the **Data Map** tab on the left pane in the [Microsoft Purview Studio](https://web.purview.azure.com/resource/).
1717

1818
1. Select the data source that you registered.
1919

articles/purview/includes/purview-quickstart-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.date: 04/05/2022
2323
1. Then select **My permissions**.
2424
1. If you have access to multiple subscriptions, select the appropriate subscription.
2525

26-
* No [Azure Policies](../../governance/policy/overview.md) preventing creation of **Storage accounts** or **Event Hub namespaces**. Azure Purview will deploy a managed Storage account and Event Hub when it is created. If a blocking policy exists and needs to remain in place, please follow our [Azure Purview exception tag guide](../create-azure-purview-portal-faq.md) and follow the steps to create an exception for Azure Purview accounts.
26+
* No [Azure Policies](../../governance/policy/overview.md) preventing creation of **Storage accounts** or **Event Hub namespaces**. Microsoft Purview will deploy a managed Storage account and Event Hubs when it is created. If a blocking policy exists and needs to remain in place, please follow our [Microsoft Purview exception tag guide](../create-azure-purview-portal-faq.md) and follow the steps to create an exception for Microsoft Purview accounts.
2727

2828
## Sign in to Azure
2929

articles/purview/includes/view-and-manage-scans.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: ignite-fall-2021
1212

1313
To view existing scans, do the following:
1414

15-
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/). Select the **Data Map** tab under the left pane.
15+
1. Go to the [Microsoft Purview Studio](https://web.purview.azure.com/resource/). Select the **Data Map** tab under the left pane.
1616

1717
1. Select the desired data source. You will see a list of existing scans on that data source under **Recent scans**, or can view all scans under the **Scans** tab.
1818

@@ -24,7 +24,7 @@ To view existing scans, do the following:
2424

2525
To manage or delete a scan, do the following:
2626

27-
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/). Select the **Data Map** tab under the left pane.
27+
1. Go to the [Microsoft Purview Studio](https://web.purview.azure.com/resource/). Select the **Data Map** tab under the left pane.
2828

2929
1. Select the desired data source. You will see a list of existing scans on that data source under **Recent scans**, or can view all scans under the **Scans** tab.
3030

@@ -36,4 +36,4 @@ To manage or delete a scan, do the following:
3636

3737
> [!NOTE]
3838
> * Deleting your scan does not delete catalog assets created from previous scans.
39-
> * The asset will no longer be updated with schema changes if your source table has changed and you re-scan the source table after editing the description in the schema tab of Azure Purview.
39+
> * The asset will no longer be updated with schema changes if your source table has changed and you re-scan the source table after editing the description in the schema tab of Microsoft Purview.

0 commit comments

Comments
 (0)