Skip to content

Commit ae83db7

Browse files
Merge pull request #227726 from svchandramohan/patch-11
Update concept-policies-data-owner.md
2 parents c0588e6 + e328214 commit ae83db7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/purview/concept-policies-data-owner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: conceptual
9-
ms.date: 03/20/2022
9+
ms.date: 02/17/2023
1010
---
1111

1212
# Concepts for Microsoft Purview data owner policies (preview)
@@ -88,7 +88,7 @@ Then let’s assume that user ‘user1’, who is part of two groups:
8888
*Finance-analyst* and *Finance-contractors*, executes a call to blob read API. Since both policies will be applicable, Microsoft Purview will choose the most restrictive one, which is *Deny* of *Read*. Thus, the access request will be denied.
8989

9090
> [!Note]
91-
> Currently, the only supported effect is **Allow**.
91+
> As mentioned in the Effect section above, currently, the only supported effect is **Allow**. The above example is to explain how multiple policies on a single asset are evaluated.
9292
9393
## Policy publishing
9494

0 commit comments

Comments
 (0)