Skip to content

Commit 88227d7

Browse files
authored
Merge pull request #218417 from inward-eye/main
added devops policy on resource group or subscription
2 parents 0189430 + eddf49c commit 88227d7

File tree

4 files changed

+12
-19
lines changed

4 files changed

+12
-19
lines changed

articles/purview/how-to-policies-data-owner-authoring-generic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before authoring data policies in the Microsoft Purview governance portal, you'l
3636
## Create a new policy
3737

3838
This section describes the steps to create a new policy in Microsoft Purview.
39-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies).
39+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-to-create-update-or-delete-access-policies).
4040

4141
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
4242

@@ -120,7 +120,7 @@ The steps to publish a policy are as follows:
120120
## Update or delete a policy
121121

122122
Steps to update or delete a policy in Microsoft Purview are as follows.
123-
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-needed-to-create-or-update-access-policies)
123+
Ensure you have the *Policy Author* permission as described [here](how-to-enable-data-use-management.md#configure-microsoft-purview-permissions-to-create-update-or-delete-access-policies)
124124

125125
1. Sign in to the [Microsoft Purview governance portal](https://web.purview.azure.com/resource/).
126126

articles/purview/how-to-policies-data-owner-resource-group.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,7 @@ In this guide we cover how to register an entire resource group or subscription
3131
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
3232

3333
### Register the subscription or resource group for Data Use Management
34-
The subscription or resource group needs to be registered with Microsoft Purview to later define access policies.
35-
36-
To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
34+
The subscription or resource group needs to be registered with Microsoft Purview before you can create access policies. To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
3735

3836
- [Register multiple sources in Microsoft Purview](register-scan-azure-multiple-sources.md#prerequisites)
3937

@@ -44,7 +42,7 @@ In the end, your resource will have the **Data Use Management** toggle **Enable
4442
![Screenshot shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.](./media/how-to-policies-data-owner-resource-group/register-resource-group-for-policy.png)
4543

4644
>[!Important]
47-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* to provide their App ID: [See this document](./how-to-policies-data-owner-arc-sql-server.md#register-data-sources-in-microsoft-purview).
45+
> - If you create a policy on a resource group or subscription and want to have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* which captures their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
4846
4947

5048
## Create and publish a data owner policy

articles/purview/how-to-policies-devops-resource-group.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ In this guide we cover how to register an entire resource group or subscription
1717

1818
## Prerequisites
1919
[!INCLUDE [Access policies generic pre-requisites](./includes/access-policies-prerequisites-generic.md)]
20-
[!INCLUDE [Access policies Azure SQL Database pre-requisites](./includes/access-policies-prerequisites-azure-sql-db.md)]
2120

2221
**Only these data sources are enabled for access policies on resource group or subscription**. Follow the **Prerequisites** section that is specific to the data source(s) in these guides:
2322
* [DevOps policies on an Azure SQL Database](./how-to-policies-devops-azure-sql-db.md#prerequisites)
@@ -27,20 +26,18 @@ In this guide we cover how to register an entire resource group or subscription
2726
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
2827

2928
### Register the subscription or resource group for Data Use Management
30-
The subscription or resource group needs to be registered with Microsoft Purview to later define access policies.
31-
32-
To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
29+
The subscription or resource group needs to be registered with Microsoft Purview before you can create access policies. To register your subscription or resource group, follow the **Prerequisites** and **Register** sections of this guide:
3330

3431
- [Register multiple sources in Microsoft Purview](register-scan-azure-multiple-sources.md#prerequisites)
3532

36-
After you've registered your resources, you'll need to enable Data Use Management. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
33+
After you've registered your resources, you'll need to enable the Data Use Management option. Data Use Management needs certain permissions and can affect the security of your data, as it delegates to certain Microsoft Purview roles to manage access to the data sources. **Go through the secure practices related to Data Use Management in this guide**: [How to enable Data Use Management](./how-to-enable-data-use-management.md)
3734

3835
In the end, your resource will have the **Data Use Management** toggle **Enabled**, as shown in the screenshot:
3936

4037
![Screenshot shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.](./media/how-to-policies-data-owner-resource-group/register-resource-group-for-policy.png)
4138

4239
>[!Important]
43-
> - If you want to create a policy on a resource group or subscription and have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* to provide their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
40+
> - If you create a policy on a resource group or subscription and want to have it enforced in Arc-enabled SQL servers, you will need to also register those servers independently and enable *Data use management* which captures their App ID: [See this document](./how-to-policies-devops-arc-sql-server.md#register-data-sources-in-microsoft-purview).
4441
4542

4643
## Create a new DevOps policy

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,27 +22,25 @@ This step is needed before a policy can be created in Microsoft Purview for that
2222
2) In addition, the same user needs to have Microsoft Purview Data source administrator (DSA) role for the collection or a parent collection (if inheritance is enabled). See the guide on [managing Microsoft Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users). The following screenshot shows how to assign Data Source Admin at root collection level:
2323
![Screenshot shows how to assign Data Source Admin at root collection level.](../media/how-to-policies-data-owner-authoring-generic/assign-purview-permissions.png)
2424

25-
#### Configure Microsoft Purview permissions needed to create or update access policies
25+
#### Configure Microsoft Purview permissions to create, update or delete access policies
2626
The following permissions are needed in Microsoft Purview at the **root collection level**:
2727
- *Policy authors* role can create, update and delete DevOps and Data Owner policies
28+
- *Policy authors* role can delete Self-service access policies
2829

2930
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
3031

31-
>[!IMPORTANT]
32+
>[!NOTE]
3233
> Currently, Microsoft Purview roles related to creating/updating/deleting policies must be configured at **root collection level**.
33-
34-
>[!Note]
35-
> **Known issues** related to permissions
3634
> In addition to Microsoft Purview *Policy authors* role, user may need *Directory Reader* permission in Azure Active Directory to create a policy. This is a common permission for users in an Azure tenant. You can check permissions for [Azure AD Directory Reader](../../active-directory/roles/permissions-reference.md#directory-readers).
3735
3836
#### Configure Microsoft Purview permissions needed to publish Data Owner policies
39-
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps policies are created/updated so it does not apply to this type of policies.
37+
Data owner policies allow for check and balances if you assign the Microsoft Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it. Publishing is automatic once DevOps or Self-service access policies are created/updated so it does not apply to these types of policies.
4038
The following permissions are needed in Microsoft Purview at the **root collection level**:
4139
- *Data source administrator* role can publish a policy.
4240

4341
Check the section on managing Microsoft Purview role assignments in this [guide](../how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
4442

45-
>[!IMPORTANT]
43+
>[!NOTE]
4644
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at **root collection level**.
4745
4846
#### Delegation of access provisioning responsibility to roles in Microsoft Purview

0 commit comments

Comments
 (0)