Skip to content

Commit 510d764

Browse files
authored
Merge pull request #194557 from whhender/new-policy-proposal
New Policy Proposal
2 parents 8f2d5fe + 776c993 commit 510d764

33 files changed

+377
-166
lines changed

articles/purview/.openpublishing.redirection.purview.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,11 @@
144144
"source_path_from_root": "/articles/purview/scan-insights.md",
145145
"redirect_url": "/azure/purview/how-to-monitor-scan-runs",
146146
"redirect_document_id": true
147+
},
148+
{
149+
"source_path_from_root": "/articles/purview/tutorial-data-owner-policies-resource-group.md",
150+
"redirect_url": "/azure/purview/how-to-data-owner-policies-resource-group",
151+
"redirect_document_id": true
147152
}
148153
]
149154
}

articles/purview/concept-data-owner-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,5 +99,5 @@ A policy published to a data source could contain references to an asset belongi
9999
## Next steps
100100
Check the tutorials on how to create policies in Azure Purview that work on specific data systems such as Azure Storage:
101101

102-
* [Access provisioning by data owner to Azure Storage datasets](tutorial-data-owner-policies-storage.md)
103-
* [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
102+
* [Access provisioning by data owner to Azure Storage datasets](how-to-data-owner-policies-storage.md)
103+
* [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)

articles/purview/concept-self-service-data-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article helps you understand Azure Purview Self-service data access policy.
1818
1919
## Important limitations
2020

21-
The self-service data access policy is only supported when the prerequisites mentioned in [data use governance](./tutorial-data-owner-policies-storage.md) are satisfied.
21+
The self-service data access policy is only supported when the prerequisites mentioned in [data use governance](./how-to-enable-data-use-governance.md#prerequisites) are satisfied.
2222

2323
## Overview
2424

@@ -44,12 +44,12 @@ With self-service data access workflow, data consumers can not only find data as
4444

4545
A default self-service data access workflow template is provided with every Azure Purview account.The default template can be amended to add more approvers and/or set the approver's email address. For more details refer [Create and enable self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md).
4646

47-
Whenever a data consumer requests access to a dataset, the notification is sent to the workflow approver(s). The approver(s) can view the request and approve it either from Azure purview portal or from within the email notification. When the request is approved, a policy is auto-generated and applied against the respective data source. Self-service data access policy gets auto-generated only if the data source is registered for **data use governance**. The pre-requisites mentioned within the [data use governance](./tutorial-data-owner-policies-storage.md) have to be satisfied.
47+
Whenever a data consumer requests access to a dataset, the notification is sent to the workflow approver(s). The approver(s) can view the request and approve it either from Azure purview portal or from within the email notification. When the request is approved, a policy is auto-generated and applied against the respective data source. Self-service data access policy gets auto-generated only if the data source is registered for **data use governance**. The pre-requisites mentioned within the [data use governance](./how-to-enable-data-use-governance.md#prerequisites) have to be satisfied.
4848

4949
## Next steps
5050

5151
If you would like to preview these features in your environment, follow the link below.
52-
- [Enable data use governance](./tutorial-data-owner-policies-storage.md)
52+
- [Enable data use governance](./how-to-enable-data-use-governance.md#prerequisites)
5353
- [create self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md)
5454
- [working with policies at file level](https://techcommunity.microsoft.com/t5/azure-purview-blog/data-policy-features-accessing-data-when-file-level-permission/ba-p/3102166)
5555
- [working with policies at folder level](https://techcommunity.microsoft.com/t5/azure-purview-blog/data-policy-features-accessing-data-when-folder-level-permission/ba-p/3109583)
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Resource group and subscription access provisioning by data owner
3+
description: Step-by-step guide showing how a data owner can create access policies to resource groups or subscriptions.
4+
author: inward-eye
5+
ms.author: vlrodrig
6+
ms.service: purview
7+
ms.subservice: purview-data-policies
8+
ms.topic: how-to
9+
ms.date: 4/08/2022
10+
ms.custom:
11+
---
12+
13+
# Resource group and subscription access provisioning by data owner (preview)
14+
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
15+
16+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. You can also [register an entire Azure resource group or subscription to a collection](register-scan-azure-multiple-sources.md), which will allow you to scan all available data sources in that resource group or subscription. If you create a single access policy against a registered resource group or subscription, a data owner can enable access to **all** available data sources in that resource group or subscription. That single policy will cover all existing data sources and any data sources that are created afterwards.
17+
18+
This article describes how a data owner can create a single access policy for **all available** data sources in a subscription or a resource group.
19+
20+
> [!IMPORTANT]
21+
> Currently, these are the available data sources for access policies:
22+
> - Blob storage
23+
> - Azure Data Lake Storage (ADLS) Gen2
24+
25+
## Prerequisites
26+
[!INCLUDE [Access policies generic pre-requisites](./includes/access-policies-prerequisites-generic.md)]
27+
28+
[!INCLUDE [Azure Storage specific pre-requisites](./includes/access-policies-prerequisites-storage.md)]
29+
30+
## Configuration
31+
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
32+
33+
### Register the subscription or resource group for data use governance
34+
The subscription or resource group needs to be registered with Azure Purview to later define access policies.
35+
36+
To register your resource, follow the **Prerequisites** and **Register** sections of this guide:
37+
38+
- [Register multiple sources in Azure Purview](register-scan-azure-multiple-sources.md#prerequisites)
39+
40+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41+
42+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
43+
44+
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
45+
46+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
47+
48+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
49+
50+
## Create and publish a data owner policy
51+
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*:
52+
53+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/data-owner-policy-example-resource-group.png" alt-text="Screenshot that shows a sample data owner policy giving access to a resource group.":::
54+
55+
>[!Important]
56+
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).
57+
58+
## Additional information
59+
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers, for example, *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (that is, at container or subcontainer level).
60+
61+
### Limits
62+
The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
63+
64+
## Next steps
65+
Check blog, demo and related tutorials:
66+
67+
* [Concepts for Azure Purview data owner policies](./concept-data-owner-policies.md)
68+
* [Data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)
69+
* [Blog: resource group-level governance can significantly reduce effort](https://techcommunity.microsoft.com/t5/azure-purview-blog/data-policy-features-resource-group-level-governance-can/ba-p/3096314)
70+
* [Demo of data owner access policies for Azure Storage](/video/media/8ce7c554-0d48-430f-8f63-edf94946947c/purview-policy-storage-dataowner-scenario_mid.mp4)
Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
---
2+
title: Access provisioning by data owner to Azure Storage datasets
3+
description: Step-by-step guide showing how data owners can create access policies to datasets in Azure Storage
4+
author: inward-eye
5+
ms.author: vlrodrig
6+
ms.service: purview
7+
ms.subservice: purview-data-policies
8+
ms.topic: how-to
9+
ms.date: 04/08/2022
10+
ms.custom:
11+
---
12+
13+
# Access provisioning by data owner to Azure Storage datasets (preview)
14+
15+
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
16+
17+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection.
18+
19+
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. Currently, these Azure Storage sources are supported:
20+
- Blob storage
21+
- Azure Data Lake Storage (ADLS) Gen2
22+
23+
## Prerequisites
24+
[!INCLUDE [Access policies generic pre-requisites](./includes/access-policies-prerequisites-generic.md)]
25+
26+
[!INCLUDE [Azure Storage specific pre-requisites](./includes/access-policies-prerequisites-storage.md)]
27+
28+
## Configuration
29+
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
30+
31+
### Register the data sources in Azure Purview for Data use governance
32+
The Azure Storage resources need to be registered with Azure Purview to later define access policies.
33+
34+
To register your resources, follow the **Prerequisites** and **Register** sections of these guides:
35+
36+
- [Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md#prerequisites)
37+
38+
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
39+
40+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41+
42+
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
43+
44+
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
45+
46+
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
47+
48+
:::image type="content" source="./media/how-to-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Screenshot that shows how to register a data source for policy by toggling the enable tab in the resource editor.":::
49+
50+
## Create and publish a data owner policy
51+
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides group *Contoso Team* *read* access to Storage account *marketinglake1*:
52+
53+
:::image type="content" source="./media/how-to-data-owner-policies-storage/data-owner-policy-example-storage.png" alt-text="Screenshot that shows a sample data owner policy giving access to an Azure Storage account.":::
54+
55+
56+
>[!Important]
57+
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).
58+
59+
60+
## Additional information
61+
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there's no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
62+
- [*abfs* for ADLS Gen2](../hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2.md#access-files-from-the-cluster)
63+
- [*az storage blob download* for Blob Storage](../storage/blobs/storage-quickstart-blobs-cli.md#download-a-blob)
64+
- Creating a policy at Storage account level will enable the Subjects to access system containers, for example *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (that is, at container or subcontainer level).
65+
66+
67+
### Limits
68+
- The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
69+
70+
### Known issues
71+
72+
> [!Warning]
73+
> **Known issues** related to Policy creation
74+
> - Do not create policy statements based on Azure Purview resource sets. Even if displayed in Azure Purview policy authoring UI, they are not yet enforced. Learn more about [resource sets](concept-resource-sets.md).
75+
76+
### Policy action mapping
77+
78+
This section contains a reference of how actions in Azure Purview data policies map to specific actions in Azure Storage.
79+
80+
| **Azure Purview policy action** | **Data source specific actions** |
81+
|---------------------------|-----------------------------------------------------------------------------------------|
82+
|||
83+
| *Read* |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/read |
84+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read |
85+
|||
86+
| *Modify* |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read |
87+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write |
88+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action |
89+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action |
90+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete |
91+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/read |
92+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/write |
93+
| |<sub>Microsoft.Storage/storageAccounts/blobServices/containers/delete |
94+
|||
95+
96+
97+
## Next steps
98+
Check blog, demo and related tutorials:
99+
100+
* [Demo of access policy for Azure Storage](/video/media/8ce7c554-0d48-430f-8f63-edf94946947c/purview-policy-storage-dataowner-scenario_mid.mp4)
101+
* [Concepts for Azure Purview data owner policies](./concept-data-owner-policies.md)
102+
* [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
103+
* [Blog: What's New in Azure Purview at Microsoft Ignite 2021](https://techcommunity.microsoft.com/t5/azure-purview/what-s-new-in-azure-purview-at-microsoft-ignite-2021/ba-p/2915954)
104+
* [Blog: Accessing data when folder level permission is granted](https://techcommunity.microsoft.com/t5/azure-purview-blog/data-policy-features-accessing-data-when-folder-level-permission/ba-p/3109583)
105+
* [Blog: Accessing data when file level permission is granted](https://techcommunity.microsoft.com/t5/azure-purview-blog/data-policy-features-accessing-data-when-file-level-permission/ba-p/3102166)

articles/purview/how-to-data-owner-policy-authoring-generic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,5 +125,5 @@ Steps to update or delete a policy in Azure Purview are as follows.
125125

126126
For specific guides on creating policies, you can follow these tutorials:
127127

128-
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
129-
- [Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)
128+
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
129+
- [Enable Azure Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)

articles/purview/how-to-delete-self-service-data-access-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This guide describes how to delete self-service data access policies that have b
2222
Self-service policies must exist for them to be deleted. Refer to the articles below to create
2323
self-service policies
2424

25-
- [Enable Data Use Governance](./tutorial-data-owner-policies-storage.md)
25+
- [Enable Data Use Governance](./how-to-enable-data-use-governance.md)
2626
- [Create a self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md)
2727
- [Approve self-service data access request](how-to-workflow-manage-requests-approvals.md)
2828

articles/purview/how-to-enable-data-use-governance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,5 +80,5 @@ To disable data use governance for a source, resource group, or subscription, a
8080
## Next steps
8181

8282
- [Create data owner policies for your resources](how-to-data-owner-policy-authoring-generic.md)
83-
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
84-
- [Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)
83+
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./how-to-data-owner-policies-resource-group.md)
84+
- [Enable Azure Purview data owner policies on an Azure Storage account](./how-to-data-owner-policies-storage.md)

articles/purview/how-to-view-self-service-data-access-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This guide describes how to view self-service data access policies that have bee
2222
Self-service policies must exist for them to be viewed. Refer to the articles below to create
2323
self-service policies
2424

25-
- [Enable Data Use Governance](./tutorial-data-owner-policies-storage.md)
25+
- [Enable Data Use Governance](./how-to-enable-data-use-governance.md)
2626
- [Create a self-service data access workflow](./how-to-workflow-self-service-data-access-hybrid.md)
2727
- [Approve self-service data access request](how-to-workflow-manage-requests-approvals.md)
2828

0 commit comments

Comments
 (0)