Skip to content

Commit 9be0b1c

Browse files
authored
Merge pull request #222263 from ShawnJackson/register-scan-azure-sql-database
edit pass: register-scan-azure-sql-database
2 parents 29656e4 + c77a567 commit 9be0b1c

6 files changed

+286
-238
lines changed

articles/purview/concept-scans-and-ingestion.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Whenever possible, a Managed Identity is the preferred authentication method bec
3838

3939
When scanning a source, you have a choice to scan the entire data source or choose only specific entities (folders/tables) to scan. Available options depend on the source you're scanning, and can be defined for both one-time and scheduled scans.
4040

41-
For example, when [creating and running a scan for an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan), you can choose which tables to scan, or select the entire database.
41+
For example, when [creating and running a scan for an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan), you can choose which tables to scan, or select the entire database.
4242

4343
### Scan rule set
4444

@@ -74,5 +74,5 @@ The technical metadata or classifications identified by the scanning process are
7474
For more information, or for specific instructions for scanning sources, follow the links below.
7575

7676
* To understand resource sets, see our [resource sets article](concept-resource-sets.md).
77-
* [How to govern an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan)
77+
* [How to govern an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan)
7878
* [Lineage in Microsoft Purview](catalog-lineage-user-guide.md)

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,15 +53,15 @@ For more information about managing Microsoft Purview role assignments, see [Cre
5353
>[!NOTE]
5454
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at the root collection level.
5555
56-
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
56+
#### Delegate access provisioning responsibility to roles in Microsoft Purview
5757

5858
After a resource has been enabled for **Data use management**, any Microsoft Purview user with the *Policy author* role at the root collection level can provision access to that data source from Microsoft Purview.
5959

6060
The *IAM Owner* role for a data resource can be inherited from a parent resource group, a subscription, or a subscription management group. Check which Azure AD users, groups, and service principals hold or are inheriting the *IAM Owner* role for the resource.
6161

6262
> [!NOTE]
63-
> Any Microsoft Purview root *Collection admin* can assign new users to root *Policy author* roles. Any *Collection admin* can assign new users to a *Data source admin* role under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data source admin*, or *Policy author* roles.
63+
> Any Microsoft Purview root *Collection admin* can assign new users to root *Policy author* roles. Any *Collection admin* can assign new users to a *Data source admin* role under the collection. Minimize and carefully vet the users who hold Microsoft Purview *Collection admin*, *Data source admin*, or *Policy author* roles.
6464
6565
If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time that depends on the specific data source. This change can have implications on both security and data access availability. The Contributor and Owner roles in IAM can delete Microsoft Purview accounts.
6666

67-
You can check these permissions by going to the **Access control (IAM)** section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [Resource Manager locks](../../azure-resource-manager/management/lock-resources.md).
67+
You can check these permissions by going to the **Access control (IAM)** section for your Microsoft Purview account and selecting **Role Assignments**. You can also use a lock to prevent the Microsoft Purview account from being deleted through [Resource Manager locks](../../azure-resource-manager/management/lock-resources.md).

articles/purview/includes/access-policies-prerequisites-azure-sql-db.md

Lines changed: 37 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -8,45 +8,55 @@ ms.date: 12/01/2022
88
ms.custom: references_regions
99
---
1010

11-
- Create a new Azure SQL Database or use an existing one in one of the currently available regions for this preview feature. You can [follow this guide to create a new Azure SQL Database](/azure/azure-sql/database/single-database-create-quickstart).
11+
Create a new SQL database, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create a SQL database](/azure/azure-sql/database/single-database-create-quickstart).
1212

1313
#### Region support
14-
- All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
15-
- Enforcement of Microsoft Purview policies is only available in the following regions for Azure SQL Database:
16-
- East US
17-
- East US2
18-
- South Central US
19-
- West Central US
20-
- West US3
21-
- Canada Central
22-
- Brazil South
23-
- West Europe
24-
- North Europe
25-
- France Central
26-
- UK South
27-
- South Africa North
28-
- Central India
29-
- East Asia
30-
- Australia East
14+
All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
15+
16+
Enforcement of Microsoft Purview policies is available only in the following regions for Azure SQL Database:
17+
18+
- East US
19+
- East US2
20+
- South Central US
21+
- West Central US
22+
- West US3
23+
- Canada Central
24+
- Brazil South
25+
- West Europe
26+
- North Europe
27+
- France Central
28+
- UK South
29+
- South Africa North
30+
- Central India
31+
- East Asia
32+
- Australia East
3133

32-
#### Configure the Azure SQL Database for policies from Microsoft Purview
33-
You need to configure an Azure Active Directory Admin for the Azure SQL Server to honor policies from Microsoft Purview. In Azure portal, navigate to the Azure SQL Server that hosts the Azure SQL Database and then navigate to Azure Active Directory on the side menu. Set an Admin name to any Azure Active Directory user or group you prefer, and then select **Save**. See screenshot:
34-
![Screenshot shows how to assign Active Directory Admin to Azure SQL Server.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
34+
#### Configure the SQL database for policies from Microsoft Purview
35+
For the logical server to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin:
3536

36-
Then navigate to Identity on the side menu. Under System assigned managed identity check status to *On* and then select **Save**. See screenshot:
37-
![Screenshot shows how to assign system managed identity to Azure SQL Server.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
37+
1. In the Azure portal, go to the logical server that hosts the SQL database.
3838

39-
You'll also need to enable (and verify) external policy based authorization on the Azure SQL server. You can do this in PowerShell:
39+
1. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
40+
41+
![Screenshot shows the assignment of an Active Directory admin to a logical server.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
42+
43+
1. On the side menu, select **Identity**. Under **System assigned managed identity**, turn the status to **On**. Then select **Save**.
44+
45+
![Screenshot that shows the assignment of a system-assigned managed identity to a logical server.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
46+
47+
48+
You also need to enable (and verify) external policy-based authorization on the logical server. You can do this in PowerShell:
4049

4150
```powershell
4251
Connect-AzAccount -UseDeviceAuthentication -TenantId xxxx-xxxx-xxxx-xxxx-xxxx -SubscriptionId xxxx-xxxx-xxxx-xxxx
4352
4453
$server = Get-AzSqlServer -ResourceGroupName "RESOURCEGROUPNAME" -ServerName "SERVERNAME"
4554
46-
#Initiate the call to the REST API to set externalPolicyBasedAuthorization to true
55+
#Initiate the call to the REST API to set the externalPolicyBasedAuthorization property to true
4756
Invoke-AzRestMethod -Method PUT -Path "$($server.ResourceId)/externalPolicyBasedAuthorizations/MicrosoftPurview?api-version=2021-11-01-preview" -Payload '{"properties":{"externalPolicyBasedAuthorization":true}}'
4857
49-
# Now, verify that the property "externalPolicyBasedAuthorization" has been set to true
58+
# Verify that externalPolicyBasedAuthorization is set to true
5059
Invoke-AzRestMethod -Method GET -Path "$($server.ResourceId)/externalPolicyBasedAuthorizations/MicrosoftPurview?api-version=2021-11-01-preview"
5160
```
52-
After issuing the GET, you should see in the response, under Content, "properties":{"externalPolicyBasedAuthorization":true}
61+
62+
In the response, `"properties":{"externalPolicyBasedAuthorization":true}` should appear under `Content`.

articles/purview/microsoft-purview-connector-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The table below shows the supported capabilities for each data source. Select th
3232
|| [Azure Database for PostgreSQL](register-scan-azure-postgresql.md) | [Yes](register-scan-azure-postgresql.md#register) | [Yes](register-scan-azure-postgresql.md#scan) | No* | No | No |
3333
|| [Azure Dedicated SQL pool (formerly SQL DW)](register-scan-azure-synapse-analytics.md)| [Yes](register-scan-azure-synapse-analytics.md#register) | [Yes](register-scan-azure-synapse-analytics.md#scan)| No* | No | No |
3434
|| [Azure Files](register-scan-azure-files-storage-source.md)|[Yes](register-scan-azure-files-storage-source.md#register) | [Yes](register-scan-azure-files-storage-source.md#scan) | Limited* | No | No |
35-
|| [Azure SQL Database](register-scan-azure-sql-database.md)| [Yes](register-scan-azure-sql-database.md#register) |[Yes](register-scan-azure-sql-database.md#scan)| [Yes (Preview)](register-scan-azure-sql-database.md#lineagepreview) | [Yes](register-scan-azure-sql-database.md#access-policy) (Preview) | No |
35+
|| [Azure SQL Database](register-scan-azure-sql-database.md)| [Yes](register-scan-azure-sql-database.md#register-the-data-source) |[Yes](register-scan-azure-sql-database.md#scope-and-run-the-scan)| [Yes (Preview)](register-scan-azure-sql-database.md#extract-lineage-preview) | [Yes](register-scan-azure-sql-database.md#set-up-access-policies) (Preview) | No |
3636
|| [Azure SQL Managed Instance](register-scan-azure-sql-managed-instance.md)| [Yes](register-scan-azure-sql-managed-instance.md#scan) | [Yes](register-scan-azure-sql-managed-instance.md#scan) | No* | No | No |
3737
|| [Azure Synapse Analytics (Workspace)](register-scan-synapse-workspace.md)| [Yes](register-scan-synapse-workspace.md#register) | [Yes](register-scan-synapse-workspace.md#scan)| [Yes - Synapse pipelines](how-to-lineage-azure-synapse-analytics.md)| No| No |
3838
|Database| [Amazon RDS](register-scan-amazon-rds.md) | [Yes](register-scan-amazon-rds.md#register-an-amazon-rds-data-source) | [Yes](register-scan-amazon-rds.md#scan-an-amazon-rds-database) | No | No | No |
@@ -62,7 +62,7 @@ The table below shows the supported capabilities for each data source. Select th
6262
\* Besides the lineage on assets within the data source, lineage is also supported if dataset is used as a source/sink in [Data Factory](how-to-link-azure-data-factory.md) or [Synapse pipeline](how-to-lineage-azure-synapse-analytics.md).
6363

6464
> [!NOTE]
65-
> Currently, the Microsoft Purview Data Map can't scan an asset that has `/`, `\`, or `#` in its name. To scope your scan and avoid scanning assets that have those characters in the asset name, use the example in [Register and scan an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan).
65+
> Currently, the Microsoft Purview Data Map can't scan an asset that has `/`, `\`, or `#` in its name. To scope your scan and avoid scanning assets that have those characters in the asset name, use the example in [Register and scan an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan).
6666
6767
> [!IMPORTANT]
6868
> If you plan on using a self-hosted integration runtime, scanning some data sources requires additional setup on the self-hosted integration runtime machine. For example, JDK, Visual C++ Redistributable, or specific driver.

articles/purview/register-scan-azure-multiple-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To learn how to add permissions on each resource type within a subscription or r
5252
- [Azure Blob Storage](register-scan-azure-blob-storage-source.md#authentication-for-a-scan)
5353
- [Azure Data Lake Storage Gen1](register-scan-adls-gen1.md#authentication-for-a-scan)
5454
- [Azure Data Lake Storage Gen2](register-scan-adls-gen2.md#authentication-for-a-scan)
55-
- [Azure SQL Database](register-scan-azure-sql-database.md#authentication-for-a-scan)
55+
- [Azure SQL Database](register-scan-azure-sql-database.md#configure-authentication-for-a-scan)
5656
- [Azure SQL Managed Instance](register-scan-azure-sql-managed-instance.md#authentication-for-registration)
5757
- [Azure Synapse Analytics](register-scan-azure-synapse-analytics.md#authentication-for-registration)
5858

0 commit comments

Comments
 (0)