Skip to content

Commit 6f7b690

Browse files
authored
Merge pull request #157793 from zeinab-mk/zeinam-purview
Zeinam purview
2 parents c4716cd + fe95ec8 commit 6f7b690

23 files changed

+88
-57
lines changed

articles/purview/manage-credentials.md

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: viseshag
66
ms.service: purview
77
ms.subservice: purview-data-catalog
88
ms.topic: how-to
9-
ms.date: 02/11/2021
9+
ms.date: 05/08/2021
1010
---
1111

1212
# Credentials for source authentication in Azure Purview
@@ -52,6 +52,19 @@ Before you can create a Credential, first associate one or more of your existing
5252

5353
## Grant the Purview managed identity access to your Azure Key Vault
5454

55+
Currently Azure Key Vault supports two permission models:
56+
57+
- Option 1 - Access Policies
58+
- Option 2 - Role-based Access Control
59+
60+
Before assigning access to Purview managed identity, first identify your Azure Key Vault permission model from Key Vault resource **Access Policies** in the menu. Follow steps below based on relevant the permission model.
61+
62+
:::image type="content" source="media/manage-credentials/akv-permission-model.png" alt-text="Azure Key Vault Permission Model":::
63+
64+
### Option 1 - Assign access using using Key Vault Access Policy
65+
66+
Follow these steps only if permission model in your Azure Key Vault resource is set to **Vault Access Policy**:
67+
5568
1. Navigate to your Azure Key Vault.
5669

5770
2. Select the **Access policies** page.
@@ -72,6 +85,21 @@ Before you can create a Credential, first associate one or more of your existing
7285

7386
:::image type="content" source="media/manage-credentials/save-access-policy.png" alt-text="Save access policy":::
7487

88+
### Option 2 - Assign access using Key Vault Azure role-based access control
89+
90+
Follow these steps only if permission model in your Azure Key Vault resource is set to **Azure role-based access control**:
91+
92+
1. Navigate to your Azure Key Vault.
93+
94+
2. Select **Access Control (IAM)** from the left navigation menu.
95+
96+
3. Select **+ Add**.
97+
98+
4. Set the **Role** to **Key Vault Secrets User** and enter your enter your Azure Purview account name under **Select** input box. Then, select Save to give this role assignment to your Purview account.
99+
100+
:::image type="content" source="media/manage-credentials/akv-add-rbac.png" alt-text="Azure Key Vault RBAC":::
101+
102+
75103
## Create a new credential
76104

77105
These credential types are supported in Purview:

articles/purview/manage-data-sources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ Use the following steps to register a new source.
2525

2626
:::image type="content" source="media/manage-data-sources/select-source-type.png" alt-text="Select a data source type in the Register sources page":::
2727

28-
1. Fill out the form on the **Register sources** page. Select a name for your source and enter the relevant information. If you chose **From Azure subscription** as your account selection method, the sources in your subscription appear in a dropdown list. Alternatively, you can enter your source information manually.
28+
2. Fill out the form on the **Register sources** page. Select a name for your source and enter the relevant information. If you chose **From Azure subscription** as your account selection method, the sources in your subscription appear in a dropdown list.
2929

3030
:::image type="content" source="media/manage-data-sources/register-sources-form.png" alt-text="Form for data source information":::
3131

32-
1. Select **Finish**.
32+
3. Select **Register**.
3333

3434
## View sources
3535

9.4 KB
Loading
126 KB
Loading
102 KB
Loading
-6.55 KB
Loading
789 Bytes
Loading
-2.36 KB
Loading
409 Bytes
Loading
837 Bytes
Loading

0 commit comments

Comments
 (0)