Skip to content

Commit 9d6d16a

Browse files
authored
Merge pull request #229590 from MicrosoftDocs/release-preview-update-purview-share
Release preview update purview share--scheduled release at 10AM of 3/07
2 parents 4aa5838 + 28393df commit 9d6d16a

File tree

90 files changed

+2090
-1089
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+2090
-1089
lines changed

articles/cosmos-db/synapse-link-frequently-asked-questions.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ sections:
218218
Yes, You can control network access to the data in the transactional and analytical stores independently. Network isolation is done using separate managed private endpoints for each store, within managed virtual networks in Azure Synapse workspaces. To learn more, see how to [Configure private endpoints for analytical store](analytical-store-private-endpoints.md) article.
219219
220220
- question: |
221-
I'm getting error 403 (Could not retrieve Analytical Store status for one or more containers Response status code does not indicate success: 403 (Forbidden)) after Azure Private Link was enable for my database account. What's happening?
221+
I'm getting error 403 (Could not retrieve Analytical Store status for one or more containers Response status code does not indicate success: 403 (Forbidden)) after Azure Private Link was enabled for my database account. What's happening?
222222
answer: |
223223
Usually, 403's are due to network/firewall settings that prevent users from accessing specific data, even from the portal. The most common cause for this problem is that step 1 of the enable Network isolation process using private endpoints has not been performed. You need to use Azure CLI or PowerShell for this. More details [here](analytical-store-private-endpoints.md).
224224

articles/purview/.openpublishing.redirection.purview.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,11 @@
249249
"source_path_from_root": "/articles/purview/how-to-monitor-scan-runs.md",
250250
"redirect_url": "/azure/purview/how-to-monitor-data-map-population",
251251
"redirect_document_id": true
252+
},
253+
{
254+
"source_path_from_root": "/articles/purview/how-to-link-azure-data-share.md",
255+
"redirect_url": "/azure/purview/how-to-lineage-purview-data-sharing",
256+
"redirect_document_id": true
252257
}
253258
]
254259
}

articles/purview/catalog-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ The Microsoft Purview governance portal uses a set of predefined roles to contro
2828
A collection administrator on the [root collection](reference-azure-purview-glossary.md#root-collection) also automatically has permission to the Microsoft Purview governance portal. If your **root collection administrator** ever needs to be changed, you can [follow the steps in the section below](#administrator-change).
2929
- **Data curators** - a role that provides access to the data catalog to manage assets, configure custom classifications, set up glossary terms, and view data estate insights. Data curators can create, read, modify, move, and delete assets. They can also apply annotations to assets.
3030
- **Data readers** - a role that provides read-only access to data assets, classifications, classification rules, collections and glossary terms.
31-
- **Data share contributor** - A role that can share data within an organization and with other organizations using data sharing capabilities in Microsoft Purview. Data share contributors can view, create, update, and delete sent and received shares.
3231
- **Data source administrator** - a role that allows a user to manage data sources and scans. If a user is granted only to **Data source admin** role on a given data source, they can run new scans using an existing scan rule. To create new scan rules, the user must be also granted as either **Data reader** or **Data curator** roles.
3332
- **Insights reader** - a role that provides read-only access to insights reports for collections where the insights reader also has at least the **Data reader** role. For more information, see [insights permissions.](insights-permissions.md)
3433
- **Policy author (Preview)** - a role that allows a user to view, update, and delete Microsoft Purview policies through the policy management app within Microsoft Purview.
@@ -52,7 +51,8 @@ The Microsoft Purview governance portal uses a set of predefined roles to contro
5251
|I need to put users into roles in the Microsoft Purview governance portal| Collection administrator |
5352
|I need to create and publish access policies | Data source administrator and policy author |
5453
|I need to create workflows for my Microsoft Purview account in the governance portal| Workflow administrator |
55-
|I need to share data from sources registered in Microsoft Purview | Data share contributor|
54+
|I need to share data from sources registered in Microsoft Purview | Data reader |
55+
|I need to receive shared data in Microsoft Purview | Data reader |
5656
|I need to view insights for collections I'm a part of | Insights reader **or** data curator |
5757
|I need to create or manage our [self-hosted integration runtime (SHIR)](manage-integration-runtimes.md) | Data source administrator |
5858
|I need to create managed private endpoints | Data source administrator |

articles/purview/concept-data-share.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
22
title: Azure Storage in-place data sharing with Microsoft Purview (preview)
33
description: This article describes Microsoft Purview Data Sharing and its features.
4-
author: jifems
5-
ms.author: jife
4+
author: sidontha
5+
ms.author: sidontha
66
ms.service: purview
77
ms.subservice: purview-data-share
88
ms.topic: conceptual
9-
ms.date: 06/28/2022
9+
ms.date: 02/16/2023
1010
---
1111

1212
# Azure Storage in-place data sharing with Microsoft Purview (preview)
1313

1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

16-
Traditionally, organizations have shared data with internal teams or external partners by generating data feeds requiring investment in data copy and refresh pipelines. The result is higher cost for data storage and movement, data proliferation (that is, multiple copies of data), and delay in access to time-sensitive data.
16+
Traditionally, organizations have shared data with internal teams or external partners by generating data feeds, requiring investment in data copy and refresh pipelines. The result is higher cost for data storage and movement, data proliferation (that is, multiple copies of data), and delay in access to time-sensitive data.
1717

1818
With Microsoft Purview Data Sharing, data providers can now share data **in-place** from Azure Data Lake Storage Gen2 and Azure Storage accounts, both within and across organizations. Share data directly with users and partners without data duplication and centrally manage your sharing activities from within Microsoft Purview.
1919

@@ -43,13 +43,13 @@ Microsoft Purview Data Sharing only stores metadata about your share. It doesn't
4343
* Share data from ADLS Gen2 or Blob storage in-place without data duplication.
4444
* Share data with multiple recipients.
4545
* Access shared data in near real time.
46-
* Centrally manage sharing relationships and keep track of who the data is shared with/from.
47-
* Revoke or terminate share access at any time.
46+
* Manage sharing relationships and keep track of who the data is shared with/from, for each ADLSGen2 or Blob Storage account.
47+
* Terminate share access at any time.
4848
* Flexible experience through Microsoft Purview governance portal or via REST APIs.
4949

5050
## Get started
5151

52-
Get started with Microsoft Purview in-place data sharing for Azure Storage by watching a [demo](https://aka.ms/purview-data-share/overview-demo) and following the [Data Sharing Quickstart](quickstart-data-share.md).
52+
Get started with Microsoft Purview in-place data sharing for Azure Storage by reviewing the [next steps](#next-steps) or following the [Data Sharing Quickstart](quickstart-data-share.md).
5353

5454
## Data sharing scenarios
5555

articles/purview/how-to-data-share-faq.md

Lines changed: 31 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,85 +1,89 @@
11
---
22
title: Microsoft Purview Data Sharing FAQ
33
description: Microsoft Purview Data Sharing frequently asked questions (FAQ) and answers.
4-
author: jifems
5-
ms.author: jife
4+
author: sidontha
5+
ms.author: sidontha
66
ms.service: purview
77
ms.subservice: purview-data-share
88
ms.topic: how-to
9-
ms.date: 06/28/2022
9+
ms.date: 02/16/2023
1010
---
1111
# FAQ: Azure Storage in-place data share with Microsoft Purview Data Sharing (preview)
1212

13-
Here are some frequently asked questions for Microsoft Purview Data Sharing.
13+
Here are some frequently asked questions for Microsoft Purview Data Sharing.
1414

1515
## What are the key terms related to data sharing?
1616

17-
* **Data Provider** - Organization that shares data.
17+
* **Data Provider** - Organization that shares data.
1818
* **Data Consumer** - Organization that receives shared data from a data provider.
19+
* **Asset** - For storage in-place sharing, an asset is a storage account, and the list of files and folders you want to share from the storage account.
1920
* **Share** - A share is a set of data that can be shared from provider to consumer. It's a set of assets. You can have one asset with files/folders from one storage account, and another asset with files/folders from a different storage account.
2021
* **Collection** - A [collection](catalog-permissions.md) is a tool Microsoft Purview uses to group assets, sources, shares, and other artifacts into a hierarchy for discoverability and to manage access control. A root collection is created automatically when you create your Microsoft Purview account and you're granted all the roles to the root collection. You can use the root collection (default) or create child collections for data sharing.
21-
* **Asset** - For storage in-place sharing, an asset is a storage account. You can specify a list of files and folders you want to share from the storage account.
22-
* **Recipient** - A recipient is a user or service principal to which the share is sent.
22+
* **Recipient** - A recipient is a user or service principal to which the share is sent.
23+
24+
## Can I use the API or SDK for storage in-place sharing?
2325

24-
## Can I use the API or SDK for storage in-place sharing?
2526
Yes, you can use [REST API](/rest/api/purview/) or [.NET SDK](/dotnet/api/overview/azure/purview) for programmatic experience to share data.
2627

27-
## What are the roles and permissions required to share data or receive shares?
28+
We have a [guide for getting started with the .NET SDK](quickstart-data-share-dotnet.md).
29+
30+
## What are the roles and permissions required to share data or receive shares?
2831

2932
| **Operations** | **Roles and Permissions** |
3033
|---|---|
31-
|**Data provider**: create share, add asset and recipients, revoke access | **Microsoft Purview collection role**: Data Share Contributor |
34+
|**Data provider**: create share, add asset and recipients, revoke access | **Microsoft Purview collection role**: minimum of Data Reader to use the Microsoft Purview compliance portal experience, none to use API or SDK |
3235
| |**Storage account role** checked when adding and updating asset: Owner or Storage Blob Data Owner |
3336
| |**Storage account permissions** checked when adding and updating asset: Microsoft.Authorization/roleAssignments/write OR Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/|
34-
|**Data consumer**: Receive share, map asset, terminate share |**Microsoft Purview collection role**: Data Share Contributor |
35-
| |**Storage account role** checked when mapping asset: Contributor OR Owner OR Storage Blob Data Contributor OR Storage Blob Data Owner |
36-
| |**Storage account permissions** checked when mapping asset: Microsoft.Storage/storageAccounts/write OR Microsoft.Storage/storageAccounts/blobServices/containers/write|
37+
|**Data consumer**: Receive share, attach share, delete share |**Microsoft Purview collection role**: minimum of Data Reader to use the Microsoft Purview compliance portal experience, none to use API or SDK |
38+
| |**Storage account role** checked when attaching share: Contributor OR Owner OR Storage Blob Data Contributor OR Storage Blob Data Owner |
39+
| |**Storage account permissions** checked when attaching share: Microsoft.Storage/storageAccounts/write OR Microsoft.Storage/storageAccounts/blobServices/containers/write|
3740
|**Data consumer**: Access shared data| No share-specific role required. You can access shared data with regular storage account permission just like any other data. Data consumer's ability to apply ACLs for shared data is currently not supported.|
3841

39-
## How can I share data from containers?
42+
## How can I share data from containers?
4043

41-
When adding assets, you can select the container(s) that you would like to share.
44+
When adding assets, you can select the container(s) that you would like to share.
4245

43-
## Can I share data in-place with storage account in a different Azure region?
46+
## Can I share data in-place with storage account in a different Azure region?
4447

4548
Cross-region in-place data sharing isn't currently supported for storage account. Data provider and data consumer's storage accounts need to be in the same Azure region.
4649

47-
## Is there support for read-write shares?
50+
## Is there support for read-write shares?
4851

49-
Storage in-place sharing supports read-only shares. Data consumer can't write to the shared data.
52+
Storage in-place sharing supports read-only shares. Data consumer can't write to the shared data.
5053

5154
To share data back to the data provider, the data consumer can create a share and share with the data provider.
5255

5356
## Can I access shared data from analytics tools like Azure Synapse?
5457

55-
You can access shared data from storage clients, Azure Synapse Analytics Spark and Databricks. You won't be able to access shared data using Azure Data Factory, Power BI or AzCopy.
58+
You can access shared data from storage clients like Azure Synapse Analytics Spark and Databricks. You won't be able to access shared data using Azure Data Factory, Power BI, or AzCopy.
5659

5760
## Does the recipient of the share need to be a user's email address or can I share data with an application?
5861

59-
Through the UI, you can share data with recipient's Azure sign in email or using service principal's object ID and tenant ID.
62+
Through the UI, you can share data with recipient's Azure sign-in email or using service principal's object ID and tenant ID.
6063

61-
Through API and SDK, you also send invitation to object ID of a user principal or service principal. Also, you can optionally specify a tenant ID for which you want the share to be received into.
64+
[Through API and SDK, you also send invitation to object ID of a user principal or service principal](quickstart-data-share-dotnet.md#send-invitation-to-a-service). Also, you can optionally specify a tenant ID that you want the share to be received into.
6265

6366
## Is the recipient accepting the share only for themselves?
6467

65-
When the recipient accepts the share and maps asset to a target storage account, any user or application that has access to the target storage account will be able to access shared data.
68+
When the recipient attaches the share to a target storage account, any user or application that has access to the target storage account will be able to access shared data.
6669

6770
## If the recipient leaves the organization, what happens to the received share?
6871

69-
Once the received share is accepted and asset is mapped to a target storage account, any users with appropriate permissions to the target storage account can continue to access the shared data even after the recipient has left the organization.
72+
Once the received share is accepted and attached to a target storage account, any users with appropriate permissions to the target storage account can continue to access the shared data even after the recipient has left the organization.
7073

71-
Once the received share is accepted, any user with Data Share Contributor permission to the Microsoft Purview collection that the share is received into can view and update the received share.
74+
Once the received share is accepted, any user with data reader permission to the Microsoft Purview collection that the share is received into can view and update the received share.
7275

7376
## How do I request an increase in limits for the number of shares?
7477

75-
Data provider's source storage account can support up to 20 targets, and data consumer's target storage account can support up to 100 sources. To request a limit increase, contact support.
78+
Data provider's source storage account can support up to 20 targets, and data consumer's target storage account can support up to 100 sources. To request a limit increase, [contact support](https://azure.microsoft.com/support/create-ticket/).
7679

7780
## How do I troubleshoot data sharing issues?
7881

79-
To troubleshoot issues with sharing data, refer to the [Troubleshoot section of How to share data](how-to-share-data.md#troubleshoot). To troubleshoot issues with receiving share, refer to the [Troubleshoot section of How to receive share](how-to-receive-share.md#troubleshoot).
82+
To troubleshoot issues with sharing data, refer to the [troubleshooting section of the how to share data article](how-to-share-data.md#troubleshoot). To troubleshoot issues with receiving share, refer to the [troubleshooting section of the how to receive share article](how-to-receive-share.md#troubleshoot).
8083

8184
## Is there support for Private endpoints, VNET and IP restrictions?
82-
Private endpoints, VNET, and IP restrictions are supported for data share for storage. Blob should be chosen as the target sub-resource when creating a private endpoint for storage accounts.
85+
86+
Private endpoints, VNET, and IP restrictions are supported for data share for storage. Blob should be chosen as the target subresource when creating a private endpoint for storage accounts.
8387

8488
## Next steps
8589

0 commit comments

Comments
 (0)