You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-access-policies-storage.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,10 +20,19 @@ This guide describes how to configure Azure Storage to enforce data access polic
20
20
> These capabilities are currently in preview. This preview version is provided without a service level agreement, and should not be used for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure
- We highly encourage you to register all data sources for use governance and manage all associated access policies from a single Azure Purview account.
25
+
- If you want to use multiple Purview accounts, be aware of these valid and invalid configurations. In the diagram below:
26
+
-**Case 1** shows a valid configuration where a Storage account is being registered in a Purview account in the same subscription.
27
+
-**Case 2** shows a valid configuration where a Storage account is being registered in a Purview account in a different subscription.
28
+
-**Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are being registered to different Purview accounts.
29
+
30
+
:::image type="content" source="./media/how-to-access-policies-storage/valid-and-invalid configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Purview accounts to manage policies.":::
31
+
32
+
23
33
## Important limitations
24
34
1. The access policy feature is only available on new Azure Purview and Azure Storage accounts.
25
-
2. Register all data sources for use governance and manage all associated access policies in a single Azure Purview account.
26
-
3. This feature can only be used in the regions listed below, where access policy management and enforcement functionality are deployed.
35
+
2. This feature can only be used in the regions listed below, where access policy management and enforcement functionality are deployed.
27
36
28
37
### Supported regions
29
38
@@ -86,9 +95,9 @@ Execute this step only if the Storage account you want to manage access to is in
86
95
[Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md)
87
96
88
97
#### Configure permissions for policy management actions
89
-
- User needs to be both Data source owner AND Purview Data source admin to register a source for Data use governance. However, any of those roles independently can de-register the source for Data use governance.
90
-
- User needs to be part of Purview Policy Author role at root collection level to perform policy authoring/management actions.
91
-
- User needs to be part of Purview data source admin role at the root collection level to publish the policy.
98
+
- User needs to be both *Data source owner* AND *Purview Data source admins* to register a source for Data use governance. However, any of those roles independently can de-register the source for Data use governance.
99
+
- User needs to be part of Purview *Policy authors* role at root collection level to perform policy authoring/management actions.
100
+
- User needs to be part of Purview *Data source admin* role at the root collection level to publish the policy.
92
101
93
102
See the section on managing role assignments in this guide: [How to create and manage collections](how-to-create-and-manage-collections.md)
94
103
@@ -106,7 +115,9 @@ During registration, enable the data source for access policy through the **Data
106
115
:::image type="content" source="./media/how-to-access-policies-storage/register-data-source-for-policy.png" alt-text="Image shows how to register a data source for policy.":::
107
116
108
117
> [!NOTE]
109
-
> The behavior of the toggle will enforce that all the data sources in a given subscription can only be registered for data use governance in a single Purview account. That Purview account itself could be in any subscription in the tenant.
118
+
> The behavior of the toggle will enforce that all the data sources in the same subscription can only be registered for data use governance in a single Purview account. That Purview account itself could be in any subscription in the tenant.
119
+
120
+
110
121
111
122
## Policy authoring
112
123
@@ -212,8 +223,8 @@ This section contains a reference of how actions in Azure Purview data policies
212
223
213
224
## Known issues
214
225
These are known issues in the current release
215
-
1. In addition to Policy author role, user requires Directory reader permission in Azure Active Directory (AAD) to create data owner policy.
216
-
1. Policy author role is not sufficient to create policies. It also requires Purview Data source admin role as well.
226
+
1. In addition to *Policy authors* role, user requires directory *Reader* permission in Azure Active Directory (AAD) to create data owner policy.
227
+
1.*Policy author* role is not sufficient to create policies. It also requires Purview *Data source admin* role as well.
217
228
218
229
## Next steps
219
230
Check the blog and demo related to the capabilities mentioned in this how-to guide
0 commit comments