Skip to content

Commit 7c82cfa

Browse files
committed
restructured to leverage how-to-enable-data-use-governance file
1 parent 50f0e42 commit 7c82cfa

6 files changed

+36
-32
lines changed

articles/purview/how-to-enable-data-use-governance.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,28 @@ To disable data use governance for a source, resource group, or subscription, a
5656

5757
1. Set the **Data use governance** toggle to **Disabled**.
5858

59-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
59+
60+
### Important considerations related to Data use governance
61+
1. Make sure you write down the **Name** you use when registering in Azure Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
62+
2. To disable a source for *Data use governance*, remove it first from being bound (i.e. published) in any policy.
63+
3. While user needs to have both data source *Owner* and Azure Purview *Data source admin* to enable a source for *Data use governance*, either of those roles can independently disable it.
64+
4. Disabling *Data use governance* for a subscription will disable it also for all assets registered in that subscription.
65+
66+
> [!WARNING]
67+
> **Known issues** related to source registration
68+
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
69+
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
70+
71+
### Data use governance best practices
72+
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
73+
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
74+
- **Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
75+
- **Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
76+
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only enable in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
77+
- If the *Data use governance* toggle is greyed out and cannot be enabled, hover over it to know the name of the Azure Purview account that has registered the data resource first.
78+
79+
![Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.](../media/access-policies-common/valid-and-invalid-configurations.png)
80+
6081

6182
## Next steps
6283

articles/purview/includes/access-policies-registration-generic.md

Lines changed: 2 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,27 +4,8 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 03/07/2022
7+
ms.date: 03/14/2022
88
ms.custom:
99
---
1010

11-
### Important considerations related to Data use governance
12-
1. Make sure you write down the **Name** you use when registering in Azure Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
13-
2. To disable a source for *Data use governance*, remove it first from being bound (i.e. published) in any policy.
14-
3. While user needs to have both data source *Owner* and Azure Purview *Data source admin* to enable a source for *Data use governance*, either of those roles can independently disable it.
15-
4. Disabling *Data use governance* for a subscription will disable it also for all assets registered in that subscription.
16-
17-
> [!WARNING]
18-
> **Known issues** related to source registration
19-
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
20-
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
21-
22-
### Data use governance best practices
23-
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
24-
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
25-
- **Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
26-
- **Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
27-
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only enable in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
28-
- If the *Data use governance* toggle is greyed out and cannot be enabled, hover over it to know the name of the Azure Purview account that has registered the data resource first.
29-
30-
![Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.](../media/access-policies-common/valid-and-invalid-configurations.png)
11+
Kept for future use

articles/purview/index.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,12 @@ landingContent:
165165
links:
166166
- text: Self-service data access policy
167167
url: concept-self-service-data-access-policy.md
168+
- linkListType: how-to-guide
169+
links:
170+
- text: Registering data sources for Data use governance
171+
url: how-to-enable-data-use-governance.md
172+
- text: Authoring and publishing data owner access policies
173+
url: how-to-data-owner-policy-authoring-generic.md
168174
- linkListType: tutorial
169175
links:
170176
- text: Data owner policies for Azure Storage

articles/purview/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -293,10 +293,10 @@ items:
293293
href: catalog-conditional-access.md
294294
- name: Data policies
295295
items:
296-
- name: Authoring and publishing data owner access policies
297-
href: how-to-data-owner-policy-authoring-generic.md
298296
- name: Registering data sources for Data use governance
299297
href: how-to-enable-data-use-governance.md
298+
- name: Authoring and publishing data owner access policies
299+
href: how-to-data-owner-policy-authoring-generic.md
300300
- name: Self-service data access policy
301301
href: concept-self-service-data-access-policy.md
302302
- name: View Self-service data access policy

articles/purview/tutorial-data-owner-policies-resource-group.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: tutorial
9-
ms.date: 2/3/2022
9+
ms.date: 3/14/2022
1010
ms.custom:
1111
---
1212

@@ -41,9 +41,7 @@ Enable the resource group or the subscription for access policies in Azure Purvi
4141

4242
![Image shows how to register a resource group or subscription for policy.](./media/tutorial-data-owner-policies-resource-group/register-resource-group-for-policy.png)
4343

44-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
45-
46-
More here on [registering a data source for Data use governance](./how-to-enable-data-use-governance.md)
44+
Follow this link for more information and best practices related to [registering a data resource for Data use governance](./how-to-enable-data-use-governance.md)
4745

4846
## Create and publish a data owner policy
4947
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*:

articles/purview/tutorial-data-owner-policies-storage.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: tutorial
9-
ms.date: 03/08/2022
9+
ms.date: 03/14/2022
1010
ms.custom:
1111
---
1212

@@ -44,9 +44,7 @@ Enable the data source for access policies in Azure Purview by setting the **Dat
4444

4545
![Image shows how to register a data source for policy.](./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png)
4646

47-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
48-
49-
More here on [registering a data source for Data use governance](./how-to-enable-data-use-governance.md)
47+
Follow this link for more information and best practices related to [registering a data resource for Data use governance](./how-to-enable-data-use-governance.md)
5048

5149
## Create and publish a data owner policy
5250
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides group *Contoso Team* *read* access to Storage account *marketinglake1*:

0 commit comments

Comments
 (0)