You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/concept-scans-and-ingestion.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Whenever possible, a Managed Identity is the preferred authentication method bec
38
38
39
39
When scanning a source, you have a choice to scan the entire data source or choose only specific entities (folders/tables) to scan. Available options depend on the source you're scanning, and can be defined for both one-time and scheduled scans.
40
40
41
-
For example, when [creating and running a scan for an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan), you can choose which tables to scan, or select the entire database.
41
+
For example, when [creating and running a scan for an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan), you can choose which tables to scan, or select the entire database.
42
42
43
43
### Scan rule set
44
44
@@ -74,5 +74,5 @@ The technical metadata or classifications identified by the scanning process are
74
74
For more information, or for specific instructions for scanning sources, follow the links below.
75
75
76
76
* To understand resource sets, see our [resource sets article](concept-resource-sets.md).
77
-
*[How to govern an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan)
77
+
*[How to govern an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan)
78
78
*[Lineage in Microsoft Purview](catalog-lineage-user-guide.md)
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-configuration-generic.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,15 +53,15 @@ For more information about managing Microsoft Purview role assignments, see [Cre
53
53
>[!NOTE]
54
54
> Currently, Microsoft Purview roles related to publishing Data Owner policies must be configured at the root collection level.
55
55
56
-
#### Delegation of access provisioning responsibility to roles in Microsoft Purview
56
+
#### Delegate access provisioning responsibility to roles in Microsoft Purview
57
57
58
58
After a resource has been enabled for **Data use management**, any Microsoft Purview user with the *Policy author* role at the root collection level can provision access to that data source from Microsoft Purview.
59
59
60
60
The *IAM Owner* role for a data resource can be inherited from a parent resource group, a subscription, or a subscription management group. Check which Azure AD users, groups, and service principals hold or are inheriting the *IAM Owner* role for the resource.
61
61
62
62
> [!NOTE]
63
-
> Any Microsoft Purview root *Collection admin* can assign new users to root *Policy author* roles. Any *Collection admin* can assign new users to a *Data source admin* role under the collection. Minimize and carefully vet the users that hold Microsoft Purview *Collection admin*, *Data source admin*, or *Policy author* roles.
63
+
> Any Microsoft Purview root *Collection admin* can assign new users to root *Policy author* roles. Any *Collection admin* can assign new users to a *Data source admin* role under the collection. Minimize and carefully vet the users who hold Microsoft Purview *Collection admin*, *Data source admin*, or *Policy author* roles.
64
64
65
65
If a Microsoft Purview account with published policies is deleted, such policies will stop being enforced within an amount of time that depends on the specific data source. This change can have implications on both security and data access availability. The Contributor and Owner roles in IAM can delete Microsoft Purview accounts.
66
66
67
-
You can check these permissions by going to the **Access control (IAM)** section for your Microsoft Purview account and selecting **Role Assignments**. You can also place a lock to prevent the Microsoft Purview account from being deleted through [Resource Manager locks](../../azure-resource-manager/management/lock-resources.md).
67
+
You can check these permissions by going to the **Access control (IAM)** section for your Microsoft Purview account and selecting **Role Assignments**. You can also use a lock to prevent the Microsoft Purview account from being deleted through [Resource Manager locks](../../azure-resource-manager/management/lock-resources.md).
Copy file name to clipboardExpand all lines: articles/purview/includes/access-policies-prerequisites-azure-sql-db.md
+37-27Lines changed: 37 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,45 +8,55 @@ ms.date: 12/01/2022
8
8
ms.custom: references_regions
9
9
---
10
10
11
-
-Create a new Azure SQL Database or use an existing one in one of the currently available regions for this preview feature. You can [follow this guide to create a new Azure SQL Database](/azure/azure-sql/database/single-database-create-quickstart).
11
+
Create a new SQL database, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create a SQL database](/azure/azure-sql/database/single-database-create-quickstart).
12
12
13
13
#### Region support
14
-
- All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
15
-
- Enforcement of Microsoft Purview policies is only available in the following regions for Azure SQL Database:
16
-
- East US
17
-
- East US2
18
-
- South Central US
19
-
- West Central US
20
-
- West US3
21
-
- Canada Central
22
-
- Brazil South
23
-
- West Europe
24
-
- North Europe
25
-
- France Central
26
-
- UK South
27
-
- South Africa North
28
-
- Central India
29
-
- East Asia
30
-
- Australia East
14
+
All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
15
+
16
+
Enforcement of Microsoft Purview policies is available only in the following regions for Azure SQL Database:
17
+
18
+
- East US
19
+
- East US2
20
+
- South Central US
21
+
- West Central US
22
+
- West US3
23
+
- Canada Central
24
+
- Brazil South
25
+
- West Europe
26
+
- North Europe
27
+
- France Central
28
+
- UK South
29
+
- South Africa North
30
+
- Central India
31
+
- East Asia
32
+
- Australia East
31
33
32
-
#### Configure the Azure SQL Database for policies from Microsoft Purview
33
-
You need to configure an Azure Active Directory Admin for the Azure SQL Server to honor policies from Microsoft Purview. In Azure portal, navigate to the Azure SQL Server that hosts the Azure SQL Database and then navigate to Azure Active Directory on the side menu. Set an Admin name to any Azure Active Directory user or group you prefer, and then select **Save**. See screenshot:
34
-

34
+
#### Configure the SQL database for policies from Microsoft Purview
35
+
For the logical server to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin:
35
36
36
-
Then navigate to Identity on the side menu. Under System assigned managed identity check status to *On* and then select **Save**. See screenshot:
37
-

37
+
1. In the Azure portal, go to the logical server that hosts the SQL database.
38
38
39
-
You'll also need to enable (and verify) external policy based authorization on the Azure SQL server. You can do this in PowerShell:
39
+
1. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
40
+
41
+

42
+
43
+
1. On the side menu, select **Identity**. Under **System assigned managed identity**, turn the status to **On**. Then select **Save**.
44
+
45
+

46
+
47
+
48
+
You also need to enable (and verify) external policy-based authorization on the logical server. You can do this in PowerShell:
Copy file name to clipboardExpand all lines: articles/purview/microsoft-purview-connector-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The table below shows the supported capabilities for each data source. Select th
32
32
||[Azure Database for PostgreSQL](register-scan-azure-postgresql.md)|[Yes](register-scan-azure-postgresql.md#register)|[Yes](register-scan-azure-postgresql.md#scan)| No*| No | No |
33
33
||[Azure Dedicated SQL pool (formerly SQL DW)](register-scan-azure-synapse-analytics.md)|[Yes](register-scan-azure-synapse-analytics.md#register)|[Yes](register-scan-azure-synapse-analytics.md#scan)| No*| No | No |
34
34
||[Azure Files](register-scan-azure-files-storage-source.md)|[Yes](register-scan-azure-files-storage-source.md#register)|[Yes](register-scan-azure-files-storage-source.md#scan)| Limited*| No | No |
35
-
||[Azure SQL Database](register-scan-azure-sql-database.md)|[Yes](register-scan-azure-sql-database.md#register)|[Yes](register-scan-azure-sql-database.md#scan)|[Yes (Preview)](register-scan-azure-sql-database.md#lineagepreview)|[Yes](register-scan-azure-sql-database.md#access-policy) (Preview) | No |
35
+
||[Azure SQL Database](register-scan-azure-sql-database.md)|[Yes](register-scan-azure-sql-database.md#register-the-data-source)|[Yes](register-scan-azure-sql-database.md#scope-and-run-the-scan)|[Yes (Preview)](register-scan-azure-sql-database.md#extract-lineage-preview)|[Yes](register-scan-azure-sql-database.md#set-up-access-policies) (Preview) | No |
36
36
||[Azure SQL Managed Instance](register-scan-azure-sql-managed-instance.md)|[Yes](register-scan-azure-sql-managed-instance.md#scan)|[Yes](register-scan-azure-sql-managed-instance.md#scan)| No*| No | No |
37
37
||[Azure Synapse Analytics (Workspace)](register-scan-synapse-workspace.md)|[Yes](register-scan-synapse-workspace.md#register)|[Yes](register-scan-synapse-workspace.md#scan)|[Yes - Synapse pipelines](how-to-lineage-azure-synapse-analytics.md)| No| No |
38
38
|Database|[Amazon RDS](register-scan-amazon-rds.md)|[Yes](register-scan-amazon-rds.md#register-an-amazon-rds-data-source)|[Yes](register-scan-amazon-rds.md#scan-an-amazon-rds-database)| No | No | No |
@@ -62,7 +62,7 @@ The table below shows the supported capabilities for each data source. Select th
62
62
\* Besides the lineage on assets within the data source, lineage is also supported if dataset is used as a source/sink in [Data Factory](how-to-link-azure-data-factory.md) or [Synapse pipeline](how-to-lineage-azure-synapse-analytics.md).
63
63
64
64
> [!NOTE]
65
-
> Currently, the Microsoft Purview Data Map can't scan an asset that has `/`, `\`, or `#` in its name. To scope your scan and avoid scanning assets that have those characters in the asset name, use the example in [Register and scan an Azure SQL Database](register-scan-azure-sql-database.md#creating-the-scan).
65
+
> Currently, the Microsoft Purview Data Map can't scan an asset that has `/`, `\`, or `#` in its name. To scope your scan and avoid scanning assets that have those characters in the asset name, use the example in [Register and scan an Azure SQL Database](register-scan-azure-sql-database.md#create-the-scan).
66
66
67
67
> [!IMPORTANT]
68
68
> If you plan on using a self-hosted integration runtime, scanning some data sources requires additional setup on the self-hosted integration runtime machine. For example, JDK, Visual C++ Redistributable, or specific driver.
0 commit comments