You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Authoring and publishing data owner access policies (Preview)
@@ -22,108 +21,23 @@ This tutorial describes how a data owner can create, update and publish access p
22
21
23
22
### Required permissions
24
23
25
-
To register a data source, resource group, or subscription in Azure Purview with the *Data use Governance* option set (that is, with access policies), a user have **either one of the following** IAM role combinations on that resource:
26
-
27
-
- IAM *Owner*
28
-
- Both IAM *Contributor* + IAM *User Access Administrator*
29
-
30
-
Follow this [guide to configure Azure RBAC permissions](../role-based-access-control/check-access.md).
31
-
32
-
### Source configuration
33
-
To apply these policies to data sources in your environment, you'll need to configure your sources.
34
-
35
-
Check the [Azure Purview supported data sources table](azure-purview-connector-overview.md#azure-purview-data-sources) and select the link in the **Access Policy** column for sources where access policies are available.
-[Azure Data Lake Gen2](register-scan-adls-gen2.md#access-policy)
41
-
42
-
## Create policies for individual sources
43
-
44
-
To create an access policy for a resource, the resource will first need to be registered in Azure Purview.
45
-
Once you have your resource registered, follow the rest of the steps steps to enable an individual resource for access policy.
46
-
47
-
1. Follow the **Prerequisites** and **Register** sections of the source pages for your resources:
48
-
49
-
-[Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md)
50
-
-[Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md)
51
-
52
-
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
53
-
54
-
1. Select the **Data map** tab in the left menu.
55
-
56
-
1. Select the **Sources** tab in the left menu.
57
-
58
-
1. Select the source you want to enable access policies for.
59
-
60
-
1. At the top of the source page, select **Edit source**.
61
-
62
-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
63
-
64
-
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to **Enabled** at the bottom of the menu.":::
65
-
66
-
> [!WARNING]
67
-
> **Known issues** related to source registration:
68
-
>
69
-
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
70
-
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
71
-
72
-
Now that you've enabled your resource for access policies, you can [create your access policies](#create-a-new-policy).
73
-
74
-
## Create policies for resource groups or subscriptions
75
-
76
-
A data owner can use Azure Purview to enable access to ALL data sources in a subscription or a resource group. This can be achieved through a single policy statement, and will cover all existing data sources, and data sources that are created afterwards.
77
-
78
-
To create a policy for a resource group, Azure Purview will need permissions to list resources in a subscription or group, then the subscription or group will need to be registered as a source.
79
-
80
-
To create an access policy across a resource group or subscription, follow these instructions:
81
-
82
-
[!INCLUDE [Permissions to list resources](./includes/authentication-to-enumerate-resources.md)]
83
-
84
-
1. To create an access policy for a resource group or subscription, the resource group or subscription will need to be registered as a source in Azure Purview. Follow the **Prerequisites** and **Register** sections for [multiple Azure sources in Azure Purview](register-scan-azure-multiple-sources.md).
85
-
86
-
1. Now that you have your resource group or subscription registered in Azure Purview, go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
87
-
88
-
1. Select the **Data map** tab in the left menu.
89
-
90
-
1. Select the **Sources** tab in the left menu.
91
-
92
-
1. Select the source you want to enable access policies for.
93
-
94
-
1. At the top of the source page, select **Edit source**.
95
-
96
-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
97
-
98
-
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to 'Enabled' at the bottom of the menu.":::
99
-
100
-
1. Enable the resource group or the subscription for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the picture.
101
-
102
-

103
-
104
24
>[!IMPORTANT]
105
-
>Make sure you write down the **Name** you use when registering in Azure Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
106
-
107
-
Now that you've enabled your resource for access policies, you can [create your access policies](#create-a-new-policy).
108
-
109
-
## Disable policies
110
-
111
-
To disable access policies for a source, resource group, or subscription, a user needs to either be a data source **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
112
-
113
-
1. Remove the source from any currently existing access policies. If the source is listed in any current policies, you won't be able to disable it.
114
-
115
-
1. Then, to disable the source, select the **Data map** tab in the left menu.
25
+
> - Currently, policy operations are only supported at **root collection level** and not child collection level.
116
26
117
-
1. Select the **Sources** tab in the left menu.
27
+
- User needs Azure Purview *Data source administrator* role at the root collection level to:
28
+
- Register a data source, resource group or subscription for *Data use governance*.
29
+
- Publish a policy.
30
+
- User needs Azure Purview *Policy authors* role at root collection level to create or edit policies.
118
31
119
-
1. Select the source you want to disable access policies for.
32
+
For more information, see the guide on [managing Azure Purview role assignments](../how-to-create-and-manage-collections.md).
120
33
121
-
1. At the top of the source page, select **Edit source**.
34
+
### Source configuration
122
35
123
-
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Disabled**, as shown in the image below.
36
+
To apply these policies to data sources in your environment, you'll need to configure your sources.
124
37
125
-
>[!NOTE]
126
-
> Disabling **Data use governance** for a subscription will disable it also for all assets registered in that subscription.
38
+
1. Your source needs to already be registered to Azure Purview. To register a resource, follow the **Prerequisites** and **Register** sections of the [source pages](azure-purview-connector-overview.md) for your resources.
39
+
1.[Enable data use governance on your resource](how-to-enable-data-use-governance.md#enable-data-use-governance).
40
+
1. Follow any policy-specific prerequisites for your source. Check the [Azure Purview supported data sources table](azure-purview-connector-overview.md#azure-purview-data-sources) and select the link in the **Access Policy** column for sources where access policies are available. Follow any steps listed in the Policy section.
127
41
128
42
## Create a new policy
129
43
@@ -185,7 +99,7 @@ Steps to create a new policy in Azure Purview are as follows.
185
99
186
100
## Publish the policy
187
101
188
-
A newly created policy is in the draft state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
102
+
A newly created policy is in the **draft** state. The process of publishing associates the new policy with one or more data sources under governance. This is called "binding" a policy to a data source.
189
103
190
104
The steps to publish a policy are as follows
191
105
@@ -206,20 +120,9 @@ The steps to publish a policy are as follows
206
120
>[!Note]
207
121
> After making changes to a policy, there is no need to publish it again for it to take effect if the data source(s) continues to be the same.
208
122
209
-
## Data use governance best practices
210
-
211
-
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
212
-
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
213
-
-**Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
214
-
-**Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
215
-
-**Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only work in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
216
-
217
-
:::image type="content" source="./media/access-policies-common/valid-and-invalid-configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.":::
218
-
219
123
## Next steps
220
124
221
-
Check blog, demo and related tutorials
125
+
Check blog, demo and related tutorials:
222
126
223
-
-[Demo of data owner access policies for Azure Storage](https://www.youtube.com/watch?v=CFE8ltT19Ss)
224
127
-[Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
225
128
-[Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)
Data use governance is a feature within your registered Azure Purview resources that lets Azure Purview administrators manage data use from within Azure Purview.
18
+
19
+
## Prerequisites
20
+
21
+
To register a data source, resource group, or subscription in Azure Purview with the *Data use Governance* option set (that is, with access policies), a user have **either one of the following** IAM role combinations on that resource:
22
+
23
+
- IAM *Owner*
24
+
- Both IAM *Contributor* + IAM *User Access Administrator*
25
+
26
+
Follow this [guide to configure Azure RBAC role permissions](../role-based-access-control/check-access.md).
27
+
28
+
29
+
## Enable data use governance
30
+
31
+
To create an access policy for a resource, the resource will first need to be registered in Azure Purview.
32
+
To register a resource, follow the **Prerequisites** and **Register** sections of the [source pages](azure-purview-connector-overview.md) for your resources.
33
+
34
+
Once you have your resource registered, follow the rest of the steps to enable an individual resource for access policy.
35
+
36
+
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
37
+
38
+
1. Select the **Data map** tab in the left menu.
39
+
40
+
1. Select the **Sources** tab in the left menu.
41
+
42
+
1. Select the source you want to enable access policies for.
43
+
44
+
1. At the top of the source page, select **Edit source**.
45
+
46
+
1. Enable the data source for access policies in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
47
+
48
+
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to **Enabled** at the bottom of the menu.":::
49
+
50
+
> [!WARNING]
51
+
> **Known issues** related to source registration:
52
+
>
53
+
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
54
+
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
55
+
56
+
57
+
## Disable data use governance
58
+
59
+
>[!Note]
60
+
>If your resource is currently a part of any active access policy, you will not be able to disable data use governance. First [remove the resource from the policy](how-to-data-owner-policy-authoring-generic.md#update-or-delete-a-policy), then disable data use governance.
61
+
62
+
To disable data use governance for a source, resource group, or subscription, a user needs to either be a data source **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
63
+
64
+
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
65
+
66
+
1. Select the **Data map** tab in the left menu.
67
+
68
+
1. Select the **Sources** tab in the left menu.
69
+
70
+
1. Select the source you want to disable data use governance for.
71
+
72
+
1. At the top of the source page, select **Edit source**.
73
+
74
+
1. Set the **Data use governance** toggle to **Disabled**.
75
+
76
+
>[!NOTE]
77
+
> Disabling **Data use governance** for a subscription source will disable it also for all assets registered in that subscription.
78
+
79
+
## Data use governance best practices
80
+
81
+
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
82
+
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
83
+
-**Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
84
+
-**Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
85
+
-**Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only work in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
86
+
87
+
:::image type="content" source="./media/access-policies-common/valid-and-invalid-configurations.png" alt-text="Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.":::
88
+
89
+
## Next steps
90
+
91
+
-[Create data owner policies for your resources](how-to-data-owner-policy-authoring-generic.md)
92
+
-[Enable Azure Purview data owner policies on all data sources in a subscription or a resource group](./tutorial-data-owner-policies-resource-group.md)
93
+
-[Enable Azure Purview data owner policies on an Azure Storage account](./tutorial-data-owner-policies-storage.md)
0 commit comments