Skip to content

Commit 66cec24

Browse files
authored
Merge pull request #180472 from vlrodrig/master
providing more clarity
2 parents d1b01b5 + 0111127 commit 66cec24

File tree

2 files changed

+19
-8
lines changed

2 files changed

+19
-8
lines changed

articles/purview/how-to-access-policies-storage.md

Lines changed: 19 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,19 @@ This guide describes how to configure Azure Storage to enforce data access polic
2020
> These capabilities are currently in preview. This preview version is provided without a service level agreement, and should not be used for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure
2121
Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2222

23+
## Best practices
24+
- We highly encourage you to register all data sources for use governance and manage all associated access policies from a single Azure Purview account.
25+
- If you want to use multiple Purview accounts, be aware of these valid and invalid configurations. In the diagram below:
26+
- **Case 1** shows a valid configuration where a Storage account is being registered in a Purview account in the same subscription.
27+
- **Case 2** shows a valid configuration where a Storage account is being registered in a Purview account in a different subscription.
28+
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are being registered to different Purview accounts.
29+
30+
:::image type="content" source="./media/how-to-access-policies-storage/valid-and-invalid configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Purview accounts to manage policies.":::
31+
32+
2333
## Important limitations
2434
1. The access policy feature is only available on new Azure Purview and Azure Storage accounts.
25-
2. Register all data sources for use governance and manage all associated access policies in a single Azure Purview account.
26-
3. This feature can only be used in the regions listed below, where access policy management and enforcement functionality are deployed.
35+
2. This feature can only be used in the regions listed below, where access policy management and enforcement functionality are deployed.
2736

2837
### Supported regions
2938

@@ -86,9 +95,9 @@ Execute this step only if the Storage account you want to manage access to is in
8695
[Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md)
8796

8897
#### Configure permissions for policy management actions
89-
- User needs to be both Data source owner AND Purview Data source admin to register a source for Data use governance. However, any of those roles independently can de-register the source for Data use governance.
90-
- User needs to be part of Purview Policy Author role at root collection level to perform policy authoring/management actions.
91-
- User needs to be part of Purview data source admin role at the root collection level to publish the policy.
98+
- User needs to be both *Data source owner* AND *Purview Data source admins* to register a source for Data use governance. However, any of those roles independently can de-register the source for Data use governance.
99+
- User needs to be part of Purview *Policy authors* role at root collection level to perform policy authoring/management actions.
100+
- User needs to be part of Purview *Data source admin* role at the root collection level to publish the policy.
92101

93102
See the section on managing role assignments in this guide: [How to create and manage collections](how-to-create-and-manage-collections.md)
94103

@@ -106,7 +115,9 @@ During registration, enable the data source for access policy through the **Data
106115
:::image type="content" source="./media/how-to-access-policies-storage/register-data-source-for-policy.png" alt-text="Image shows how to register a data source for policy.":::
107116

108117
> [!NOTE]
109-
> The behavior of the toggle will enforce that all the data sources in a given subscription can only be registered for data use governance in a single Purview account. That Purview account itself could be in any subscription in the tenant.
118+
> The behavior of the toggle will enforce that all the data sources in the same subscription can only be registered for data use governance in a single Purview account. That Purview account itself could be in any subscription in the tenant.
119+
120+
110121

111122
## Policy authoring
112123

@@ -212,8 +223,8 @@ This section contains a reference of how actions in Azure Purview data policies
212223

213224
## Known issues
214225
These are known issues in the current release
215-
1. In addition to Policy author role, user requires Directory reader permission in Azure Active Directory (AAD) to create data owner policy.
216-
1. Policy author role is not sufficient to create policies. It also requires Purview Data source admin role as well.
226+
1. In addition to *Policy authors* role, user requires directory *Reader* permission in Azure Active Directory (AAD) to create data owner policy.
227+
1. *Policy author* role is not sufficient to create policies. It also requires Purview *Data source admin* role as well.
217228

218229
## Next steps
219230
Check the blog and demo related to the capabilities mentioned in this how-to guide
66.6 KB
Loading

0 commit comments

Comments
 (0)