Skip to content

Commit bb9c2e2

Browse files
authored
Merge pull request #216427 from inward-eye/main
comment on M365 groups not supported
2 parents c851f51 + 3a6e4d4 commit bb9c2e2

7 files changed

+21
-13
lines changed

articles/purview/how-to-enable-data-use-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 8/10/2022
9+
ms.date: 10/31/2022
1010
ms.custom:
1111
---
1212

@@ -17,8 +17,8 @@ ms.custom:
1717
*Data use management* is an option within the data source registration in Microsoft Purview. This option lets Microsoft Purview manage data access for your resources. The high level concept is that the data owner allows its data resource to be available for access policies by enabling *Data use management*.
1818

1919
Currently, a data owner can enable Data use management on a data resource, which enables it for these types of access policies:
20-
21-
* [Data owner access policies](concept-policies-data-owner.md) - access policies authored via Microsoft Purview data policy experience.
20+
* [DevOps policies](concept-policies-devops.md)
21+
* [Data owner access policies](concept-policies-data-owner.md)
2222
* [Self-service access policies](concept-self-service-data-access-policy.md) - access policies automatically generated by Microsoft Purview after a [self-service access request](how-to-request-access.md) is approved.
2323

2424
To be able to create any data policy on a resource, Data use management must first be enabled on that resource. This article will explain how to enable Data use management on your resources in Microsoft Purview.

articles/purview/how-to-policies-data-owner-authoring-generic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Ensure you have the *Policy Author* permission as described [here](how-to-enable
6868

6969
:::image type="content" source="./media/how-to-policies-data-owner-authoring-generic/select-asset.png" alt-text="Screenshot showing data owner can select the asset when creating or editing a policy statement.":::
7070

71-
1. Select the **Subjects** button and enter the subject identity as a principal, group, or MSI. Then select the **OK** button. This will take you back to the policy editor
71+
1. Select the **Subjects** button and enter the subject identity as a principal, group, or MSI. Note that Microsoft 365 groups are not supported. Then select the **OK** button. This will take you back to the policy editor.
7272

7373
:::image type="content" source="./media/how-to-policies-data-owner-authoring-generic/select-subject.png" alt-text="Screenshot showing data owner can select the subject when creating or editing a policy statement.":::
7474

articles/purview/how-to-policies-devops-authoring-generic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To create a new DevOps policy, ensure first that you have the Microsoft Purview
4141
1. Select the **Data source type** and then one of the listed data sources under **Data source name**. Then click on **Select**. This will take you back to the New Policy experience
4242
![Screenshot shows to select a data source for policy.](./media/how-to-policies-devops-authoring-generic/select-a-data-source.png)
4343

44-
1. Select one of two roles, *SQL Performance monitor* or *SQL Security auditor*. Then select **Add/remove subjects**. This will open the Subject window. Type the name of an Azure AD principal (user, group or service principal) in the **Select subjects** box. Keep adding or removing subjects until you are satisfied. Select **Save**. This will take you back to the prior window.
44+
1. Select one of two roles, *SQL Performance monitor* or *SQL Security auditor*. Then select **Add/remove subjects**. This will open the Subject window. Type the name of an Azure AD principal (user, group or service principal) in the **Select subjects** box. Note that Microsoft 365 groups are not supported. Keep adding or removing subjects until you are satisfied. Select **Save**. This will take you back to the prior window.
4545
![Screenshot shows to select role and subject for policy.](./media/how-to-policies-devops-authoring-generic/select-role-and-subjects.png)
4646

4747
1. Select **Save** to save the policy. A policy has been created and automatically published. Enforcement will start at the data source within 5 minutes.

articles/purview/index.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -190,10 +190,14 @@ landingContent:
190190
links:
191191
- text: Registering data sources for Data Use Management
192192
url: how-to-enable-data-use-management.md
193+
- text: DevOps policies - Create, list, update and delete policies
194+
url: how-to-policies-devops-authoring-generic.md
195+
- text: DevOps policies - Azure SQL Database
196+
url: how-to-policies-devops-azure-sql-db.md
197+
- text: DevOps policies - Azure Arc enabled SQL Servers
198+
url: how-to-policies-devops-arc-sql-server.md
193199
- text: Authoring and publishing data owner access policies
194200
url: how-to-policies-data-owner-authoring-generic.md
195-
- linkListType: tutorial
196-
links:
197201
- text: Data owner policies for Azure Storage
198202
url: how-to-policies-data-owner-storage.md
199203
- text: Data owner policies on resource groups or subscriptions

articles/purview/microsoft-purview-connector-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The table below shows the supported capabilities for each data source. Select th
4848
|| [SAP HANA](register-scan-sap-hana.md) | [Yes](register-scan-sap-hana.md#register) | No | No | No | No |
4949
|| [Snowflake](register-scan-snowflake.md) | [Yes](register-scan-snowflake.md#register) | No | [Yes](register-scan-snowflake.md#lineage) | No | No |
5050
|| [SQL Server](register-scan-on-premises-sql-server.md)| [Yes](register-scan-on-premises-sql-server.md#register) |[Yes](register-scan-on-premises-sql-server.md#scan) | No* | No| No |
51-
|| SQL Server on Azure-Arc| No |No | No |[Yes (Preview)](how-to-policies-data-owner-arc-sql-server.md) | No |
51+
|| **SQL Server on Azure-Arc**| No |No | No |Preview: [1.DevOps policies](how-to-policies-devops-arc-sql-server.md) [2.Data Owner](how-to-policies-data-owner-arc-sql-server.md) | No |
5252
|| [Teradata](register-scan-teradata-source.md)| [Yes](register-scan-teradata-source.md#register)| [Yes](register-scan-teradata-source.md#scan)| [Yes*](register-scan-teradata-source.md#lineage) | No| No |
5353
|File|[Amazon S3](register-scan-amazon-s3.md)|[Yes](register-scan-amazon-s3.md)| [Yes](register-scan-amazon-s3.md)| Limited* | No| No |
5454
||[HDFS](register-scan-hdfs.md)|[Yes](register-scan-hdfs.md)| [Yes](register-scan-hdfs.md)| No | No| No |

articles/purview/register-scan-azure-multiple-sources.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.author: viseshag
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 11/02/2021
10-
ms.custom: template-how-to, ignite-fall-2021
9+
ms.date: 10/28/2022
10+
ms.custom: template-how-to
1111
---
1212

1313
# Connect to and manage multiple Azure sources in Microsoft Purview
@@ -156,6 +156,7 @@ To manage a scan, do the following:
156156

157157
### Supported policies
158158
The following types of policies are supported on this data resource from Microsoft Purview:
159+
- [DevOps policies](concept-policies-devops.md)
159160
- [Data owner policies](concept-policies-data-owner.md)
160161

161162

@@ -178,6 +179,7 @@ Once your data source has the **Data Use Management** option set to **Enabled**
178179

179180
### Create a policy
180181
To create an access policy on an entire Azure subscription or resource group, follow these guide:
182+
* [DevOps policy covering all sources in a subscription or resource group](./how-to-policies-devops-authoring-generic.md#create-a-new-devops-policy)
181183
* [Data owner policy covering all sources in a subscription or resource group](./how-to-policies-data-owner-resource-group.md#create-and-publish-a-data-owner-policy) - This guide will allow you to provision access on all enabled data sources in a resource group, or across an Azure subscription. The pre-requisite is that the subscription or resource group is registered with the Data use management option enabled.
182184

183185

articles/purview/register-scan-azure-sql-database.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ author: athenads
55
ms.author: athenadsouza
66
ms.service: purview
77
ms.topic: how-to
8-
ms.date: 10/04/2022
9-
ms.custom: template-how-to, ignite-fall-2021
8+
ms.date: 10/28/2022
9+
ms.custom: template-how-to
1010
---
1111
# Connect to Azure SQL Database in Microsoft Purview
1212

@@ -362,6 +362,7 @@ Scans can be managed or run again on completion
362362
363363
### Supported policies
364364
The following types of policies are supported on this data resource from Microsoft Purview:
365+
- [DevOps policies](concept-policies-devops.md)
365366
- [Data owner policies](concept-policies-data-owner.md)
366367
367368
### Access policy pre-requisites on Azure SQL Database
@@ -382,7 +383,8 @@ Once your data source has the **Data Use Management** option *Enabled*, it will
382383
383384
### Create a policy
384385
To create an access policy for Azure SQL Database, follow these guides:
385-
* [Data owner policy on a single Azure SQL Database account](./how-to-policies-data-owner-azure-sql-db.md#create-and-publish-a-data-owner-policy) - This guide will allow you to provision access on a single Azure SQL Database account in your subscription.
386+
* [DevOps policy on a single Azure SQL Database](./how-to-policies-devops-azure-sql-db.md#create-a-new-devops-policy)
387+
* [Data owner policy on a single Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md#create-and-publish-a-data-owner-policy) - This guide will allow you to provision access on a single Azure SQL Database account in your subscription.
386388
* [Data owner policy covering all sources in a subscription or resource group](./how-to-policies-data-owner-resource-group.md) - This guide will allow you to provision access on all enabled data sources in a resource group, or across an Azure subscription. The pre-requisite is that the subscription or resource group is registered with the Data use management option enabled.
387389
388390
## Lineage (Preview)

0 commit comments

Comments
 (0)