Skip to content

Commit 9fa6713

Browse files
committed
Moving Data Use Governance to its own page
1 parent 97ab98e commit 9fa6713

File tree

3 files changed

+110
-114
lines changed

3 files changed

+110
-114
lines changed

articles/purview/how-to-data-owner-policy-authoring-generic.md

Lines changed: 14 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 2/2/2022
10-
ms.custom:
9+
ms.date: 2/24/2022
1110
---
1211

1312
# Authoring and publishing data owner access policies (Preview)
@@ -22,108 +21,23 @@ This tutorial describes how a data owner can create, update and publish access p
2221

2322
### Required permissions
2423

25-
To register a data source, resource group, or subscription in Azure Purview with the *Data use Governance* option set (that is, with access policies), a user have **either one of the following** IAM role combinations on that resource:
26-
27-
- IAM *Owner*
28-
- Both IAM *Contributor* + IAM *User Access Administrator*
29-
30-
Follow this [guide to configure Azure RBAC permissions](../role-based-access-control/check-access.md).
31-
32-
### Source configuration
33-
To apply these policies to data sources in your environment, you'll need to configure your sources.
34-
35-
Check the [Azure Purview supported data sources table](azure-purview-connector-overview.md#azure-purview-data-sources) and select the link in the **Access Policy** column for sources where access policies are available.
36-
37-
Currently these are the supported sources:
38-
39-
- [Azure Blob Storage](register-scan-azure-blob-storage-source.md#access-policy)
40-
- [Azure Data Lake Gen2](register-scan-adls-gen2.md#access-policy)
41-
42-
## Create policies for individual sources
43-
44-
To create an access policy for a resource, the resource will first need to be registered in Azure Purview.
45-
Once you have your resource registered, follow the rest of the steps steps to enable an individual resource for access policy.
46-
47-
1. Follow the **Prerequisites** and **Register** sections of the source pages for your resources:
48-
49-
- [Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md)
50-
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md)
51-
52-
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
53-
54-
1. Select the **Data map** tab in the left menu.
55-
56-
1. Select the **Sources** tab in the left menu.
57-
58-
1. Select the source you want to enable access policies for.
59-
60-
1. At the top of the source page, select **Edit source**.
61-
62-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
63-
64-
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to **Enabled** at the bottom of the menu.":::
65-
66-
> [!WARNING]
67-
> **Known issues** related to source registration:
68-
>
69-
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
70-
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
71-
72-
Now that you've enabled your resource for access policies, you can [create your access policies](#create-a-new-policy).
73-
74-
## Create policies for resource groups or subscriptions
75-
76-
A data owner can use Azure Purview to enable access to ALL data sources in a subscription or a resource group. This can be achieved through a single policy statement, and will cover all existing data sources, and data sources that are created afterwards.
77-
78-
To create a policy for a resource group, Azure Purview will need permissions to list resources in a subscription or group, then the subscription or group will need to be registered as a source.
79-
80-
To create an access policy across a resource group or subscription, follow these instructions:
81-
82-
[!INCLUDE [Permissions to list resources](./includes/authentication-to-enumerate-resources.md)]
83-
84-
1. To create an access policy for a resource group or subscription, the resource group or subscription will need to be registered as a source in Azure Purview. Follow the **Prerequisites** and **Register** sections for [multiple Azure sources in Azure Purview](register-scan-azure-multiple-sources.md).
85-
86-
1. Now that you have your resource group or subscription registered in Azure Purview, go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
87-
88-
1. Select the **Data map** tab in the left menu.
89-
90-
1. Select the **Sources** tab in the left menu.
91-
92-
1. Select the source you want to enable access policies for.
93-
94-
1. At the top of the source page, select **Edit source**.
95-
96-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
97-
98-
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to 'Enabled' at the bottom of the menu.":::
99-
100-
1. Enable the resource group or the subscription for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
101-
102-
![Image shows how to register a resource group or subscription for policy.](./media/tutorial-data-owner-policies-resource-group/register-resource-group-for-policy.png)
103-
10424
>[!IMPORTANT]
105-
>Make sure you write down the **Name** you use when registering in Azure Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
106-
107-
Now that you've enabled your resource for access policies, you can [create your access policies](#create-a-new-policy).
108-
109-
## Disable policies
110-
111-
To disable access policies for a source, resource group, or subscription, a user needs to either be a data source **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
112-
113-
1. Remove the source from any currently existing access policies. If the source is listed in any current policies, you won't be able to disable it.
114-
115-
1. Then, to disable the source, select the **Data map** tab in the left menu.
25+
> - Currently, policy operations are only supported at **root collection level** and not child collection level.
11626
117-
1. Select the **Sources** tab in the left menu.
27+
- User needs Azure Purview *Data source administrator* role at the root collection level to:
28+
- Register a data source, resource group or subscription for *Data use governance*.
29+
- Publish a policy.
30+
- User needs Azure Purview *Policy authors* role at root collection level to create or edit policies.
11831

119-
1. Select the source you want to disable access policies for.
32+
For more information, see the guide on [managing Azure Purview role assignments](../how-to-create-and-manage-collections.md).
12033

121-
1. At the top of the source page, select **Edit source**.
34+
### Source configuration
12235

123-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Disabled**, as shown in the image below.
36+
To apply these policies to data sources in your environment, you'll need to configure your sources.
12437

125-
>[!NOTE]
126-
> Disabling **Data use governance** for a subscription will disable it also for all assets registered in that subscription.
38+
1. Your source needs to already be registered to Azure Purview. To register a resource, follow the **Prerequisites** and **Register** sections of the [source pages](azure-purview-connector-overview.md) for your resources.
39+
1. [Enable data use governance on your resource](how-to-enable-data-use-governance.md#enable-data-use-governance).
40+
1. Follow any policy-specific prerequisites for your source. Check the [Azure Purview supported data sources table](azure-purview-connector-overview.md#azure-purview-data-sources) and select the link in the **Access Policy** column for sources where access policies are available. Follow any steps listed in the Policy section.
12741

12842
## Create a new policy
12943

@@ -185,7 +99,7 @@ Steps to create a new policy in Azure Purview are as follows.
18599

186100
## Publish the policy
187101

188-
A newly created policy is in the draft state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
102+
A newly created policy is in the **draft** state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
189103

190104
The steps to publish a policy are as follows
191105

@@ -206,20 +120,9 @@ The steps to publish a policy are as follows
206120
>[!Note]
207121
> After making changes to a policy, there is no need to publish it again for it to take effect if the data source(s) continues to be the same.
208122
209-
## Data use governance best practices
210-
211-
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
212-
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
213-
- **Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
214-
- **Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
215-
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only work in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
216-
217-
:::image type="content" source="./media/access-policies-common/valid-and-invalid-configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.":::
218-
219123
## Next steps
220124

221-
Check blog, demo and related tutorials
125+
Check blog, demo and related tutorials:
222126

223-
- [Demo of data owner access policies for Azure Storage](https://www.youtube.com/watch?v=CFE8ltT19Ss)
224127
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
225128
- [Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)
Lines changed: 93 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,93 @@
1+
---
2+
title: Authoring and publishing data owner access policies
3+
description: Step-by-step guide on how a data owner can author and publish access policies in Azure Purview
4+
author: inward-eye
5+
ms.author: vlrodrig
6+
ms.service: purview
7+
ms.subservice: purview-data-policies
8+
ms.topic: how-to
9+
ms.date: 2/24/2022
10+
ms.custom:
11+
---
12+
13+
# Enable data use governance on your Azure Purview sources
14+
15+
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
16+
17+
Data use governance is a feature within your registered Azure Purview resources that lets Azure Purview administrators manage data use from within Azure Purview.
18+
19+
## Prerequisites
20+
21+
To register a data source, resource group, or subscription in Azure Purview with the *Data use Governance* option set (that is, with access policies), a user have **either one of the following** IAM role combinations on that resource:
22+
23+
- IAM *Owner*
24+
- Both IAM *Contributor* + IAM *User Access Administrator*
25+
26+
Follow this [guide to configure Azure RBAC role permissions](../role-based-access-control/check-access.md).
27+
28+
29+
## Enable data use governance
30+
31+
To create an access policy for a resource, the resource will first need to be registered in Azure Purview.
32+
To register a resource, follow the **Prerequisites** and **Register** sections of the [source pages](azure-purview-connector-overview.md) for your resources.
33+
34+
Once you have your resource registered, follow the rest of the steps to enable an individual resource for access policy.
35+
36+
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
37+
38+
1. Select the **Data map** tab in the left menu.
39+
40+
1. Select the **Sources** tab in the left menu.
41+
42+
1. Select the source you want to enable access policies for.
43+
44+
1. At the top of the source page, select **Edit source**.
45+
46+
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
47+
48+
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to **Enabled** at the bottom of the menu.":::
49+
50+
> [!WARNING]
51+
> **Known issues** related to source registration:
52+
>
53+
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
54+
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
55+
56+
57+
## Disable data use governance
58+
59+
>[!Note]
60+
>If your resource is currently a part of any active access policy, you will not be able to disable data use governance. First [remove the resource from the policy](how-to-data-owner-policy-authoring-generic.md#update-or-delete-a-policy), then disable data use governance.
61+
62+
To disable data use governance for a source, resource group, or subscription, a user needs to either be a data source **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
63+
64+
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
65+
66+
1. Select the **Data map** tab in the left menu.
67+
68+
1. Select the **Sources** tab in the left menu.
69+
70+
1. Select the source you want to disable data use governance for.
71+
72+
1. At the top of the source page, select **Edit source**.
73+
74+
1. Set the **Data use governance** toggle to **Disabled**.
75+
76+
>[!NOTE]
77+
> Disabling **Data use governance** for a subscription source will disable it also for all assets registered in that subscription.
78+
79+
## Data use governance best practices
80+
81+
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
82+
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
83+
- **Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
84+
- **Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
85+
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only work in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
86+
87+
:::image type="content" source="./media/access-policies-common/valid-and-invalid-configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.":::
88+
89+
## Next steps
90+
91+
- [Create data owner policies for your resources](how-to-data-owner-policy-authoring-generic.md)
92+
- [Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
93+
- [Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)

articles/purview/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -281,9 +281,9 @@ items:
281281
- name: Conditional access
282282
href: catalog-conditional-access.md
283283
- name: Data owner policies
284-
items:
285-
- name: Authoring and publishing data owner access policies
286-
href: how-to-data-owner-policy-authoring-generic.md
284+
href: how-to-data-owner-policy-authoring-generic.md
285+
- name: Data use governance
286+
href: how-to-enable-data-use-governance.md
287287
- name: Manage Kafka notifications - .NET
288288
href: manage-kafka-dotnet.md
289289
- name: Disaster recovery

0 commit comments

Comments
 (0)