You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Register the subscription or resource group for Data Use Management
34
-
The subscription or resource group needs to be registered with Microsoft Purview to later define access policies.
35
-
36
-
To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
34
+
The subscription or resource group needs to be registered with Microsoft Purview before you can create access policies. To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
37
35
38
36
-[Register multiple sources in Microsoft Purview](register-scan-azure-multiple-sources.md#prerequisites)
39
37
@@ -44,7 +42,7 @@ In the end, your resource will have the **Data Use Management** toggle **Enable
44
42

45
43
46
44
>[!Important]
47
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management*to provide their App ID: [See this document](./how-to-policies-data-owner-arc-sql-server.md#register-data-sources-in-microsoft-purview).
45
+
> - If you create a policy on a resource group or subscription and want to have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management*which captures their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
**Only these data sources are enabled for access policies on resource group or subscription**. Follow the **Prerequisites** section that is specific to the data source(s) in these guides:
23
22
*[DevOps policies on an Azure SQL Database](./how-to-policies-devops-azure-sql-db.md#prerequisites)
@@ -27,20 +26,18 @@ In this guide we cover how to register an entire resource group or subscription
### Register the subscription or resource group for Data Use Management
30
-
The subscription or resource group needs to be registered with Microsoft Purview to later define access policies.
31
-
32
-
To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
29
+
The subscription or resource group needs to be registered with Microsoft Purview before you can create access policies. To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
33
30
34
31
-[Register multiple sources in Microsoft Purview](register-scan-azure-multiple-sources.md#prerequisites)
35
32
36
-
After you've registered your resources, you'll need to enable Data Use Management. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
33
+
After you've registered your resources, you'll need to enable the Data Use Management option. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
37
34
38
35
In the end, your resource will have the **Data Use Management** toggle **Enabled**, as shown in the screenshot:
39
36
40
37

41
38
42
39
>[!Important]
43
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management*to provide their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
40
+
> - If you create a policy on a resource group or subscription and want to have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management*which captures their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-configuration-generic.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,27 +22,25 @@ This step is needed before a policy can be created in Microsoft Purview for that
22
22
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role for the collection or a parent collection (if inheritance is enabled). See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
23
23

24
24
25
-
#### Configure Microsoft Purview permissions needed to createor update access policies
25
+
#### Configure Microsoft Purview permissions to create, update or delete access policies
26
26
The following permissions are needed in Microsoft Purview at the **root collection level**:
27
27
-*Policy authors* role can create, update and delete DevOps and Data Owner policies
28
+
-*Policy authors* role can delete Self-service access policies
28
29
29
30
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
30
31
31
-
>[!IMPORTANT]
32
+
>[!NOTE]
32
33
> Currently, Microsoft Purview roles related to creating/updating/deleting policies must be configured at **root collection level**.
33
-
34
-
>[!Note]
35
-
> **Known issues** related to permissions
36
34
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
37
35
38
36
#### Configure Microsoft Purview permissions needed to publish Data Owner policies
39
-
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps policies are created/updated so it does not apply to this type of policies.
37
+
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps or Self-service access policies are created/updated so it does not apply to these types of policies.
40
38
The following permissions are needed in Microsoft Purview at the **root collection level**:
41
39
-*Data source administrator* role can publish a policy.
42
40
43
41
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
44
42
45
-
>[!IMPORTANT]
43
+
>[!NOTE]
46
44
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at **root collection level**.
47
45
48
46
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
0 commit comments