You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-policies-data-owner-arc-sql-server.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,14 +59,14 @@ This section describes the steps to configure the SQL Server on Azure Arc to use
59
59
60
60
1. Navigate to **Azure Active Directory** feature on the left pane
61
61
62
-
1. Verify that Azure Active Directory Authentication is configuredand scroll down.
62
+
1. Verify that Azure Active Directory Authentication is configured. This means that all these have been entered: an admin login, a SQL Server service certificate, and a SQL Server app registration.
63
63

64
64
65
-
1.Set**External Policy Based Authorization** to enabled
65
+
1.Scroll down to set**External Policy Based Authorization** to enabled
66
66
67
67
1. Enter **Microsoft Purview Endpoint** in the format *https://\<purview-account-name\>.purview.azure.com*. You can see the names of Microsoft Purview accounts in your tenant through [this link](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Purview%2FAccounts). Optionally, you can confirm the endpoint by navigating to the Microsoft Purview account, then to the Properties section on the left menu and scrolling down until you see "Scan endpoint". The full endpoint path will be the one listed without the "/Scan" at the end.
68
68
69
-
1. Make a note of the **App registration ID**, as you will need it when you register and enable this data source for *Data use Management* in Microsoft Purview.
69
+
1. Make a note of the **App registration ID**, as you will need it when you register and enable this data source for *Data Use Management* in Microsoft Purview.
70
70
71
71
1. Select the **Save** button to save the configuration.
72
72
@@ -95,7 +95,7 @@ Once your data source has the **Data Use Management** toggle *Enabled*, it will
95
95

96
96
97
97
> [!Note]
98
-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data use management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
98
+
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently for *Data Use Management* to provide their App ID. See this document on how to create policies at resource group or subscription level: [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md).
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-prerequisites-azure-sql-db.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ ms.author: vlrodrig
4
4
ms.service: purview
5
5
ms.subservice: purview-data-policies
6
6
ms.topic: include
7
-
ms.date: 08/11/2022
7
+
ms.date: 09/16/2022
8
8
ms.custom:
9
9
---
10
10
@@ -18,7 +18,10 @@ ms.custom:
18
18
- Central India
19
19
20
20
### Azure SQL Database configuration
21
-
Each Azure SQL Database server needs a Managed Identity assigned to it. In Azure portal navigate to the Azure SQL Server that hosts the Azure SQL DB and then navigate to Identity on the side menu. Under System assigned managed identity check status to *On* and save. See screenshot:
21
+
Azure SQL Database needs an Azure Active Directory Admin to be configured to honor policies from Microsoft Purview. In Azure portal navigate to the Azure SQL Server that hosts the Azure SQL DB and then navigate to Azure Active Directory on the side menu. Set an Admin name and then Save. See screenshot:
22
+

23
+
24
+
Then navigate to Identity on the side menu. Under System assigned managed identity check status to *On* and save. See screenshot:
22
25

23
26
24
27
You'll also need to enable (and verify) external policy based authorization on the Azure SQL server. You can do this in PowerShell:
0 commit comments