Skip to content

Commit d0c5ee6

Browse files
authored
Merge pull request #190357 from inward-eye/patch-9
Update how-to-enable-data-use-governance.md
2 parents 8845716 + 0a2f95d commit d0c5ee6

File tree

1 file changed

+21
-14
lines changed

1 file changed

+21
-14
lines changed

articles/purview/how-to-enable-data-use-governance.md

Lines changed: 21 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,60 +6,63 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 2/24/2022
9+
ms.date: 3/02/2022
1010
ms.custom:
1111
---
1212

1313
# Enable data use governance on your Azure Purview sources
1414

1515
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1616

17-
Data use governance is a feature within your registered Azure Purview resources that lets Azure Purview administrators manage data use from within Azure Purview.
17+
*Data use governance* (DUG) is an option in the data source registration in Azure Purview. Its purpose is to make those data sources available in the policy authoring experience of Azure Purview Studio. In other words, access policies can only be written on data sources that have been previously registered and with DUG toggle set to enable.
1818

1919
## Prerequisites
2020

21-
To register a data source, resource group, or subscription in Azure Purview with the *Data use Governance* option set, a user needs to have **either one of the following** IAM role combinations on that resource:
21+
To enable the *Data use Governance* (DUG) toggle for a data source, resource group, or subscription, the same user needs to have both certain IAM privileges on the resource and certain Azure Purview privileges.
2222

23+
1) User needs to have **either one of the following** IAM role combinations on the resource:
2324
- IAM *Owner*
2425
- Both IAM *Contributor* + IAM *User Access Administrator*
2526

2627
Follow this [guide to configure Azure RBAC role permissions](../role-based-access-control/check-access.md).
2728

29+
2) In addition, the same user needs to have Azure Purview Data source administrator role at the root collection level. See the guide on [managing Azure Purview role assignments](catalog-permissions.md#assign-permissions-to-your-users).
2830

29-
## Enable data use governance
31+
>[!IMPORTANT]
32+
> - Currently, policy operations are only supported at **root collection level** and not child collection level.
3033
31-
To enable data use governance for a resource, the resource will first need to be registered in Azure Purview.
34+
## Enable Data use governance
35+
36+
To enable *Data use governance* for a resource, the resource will first need to be registered in Azure Purview.
3237
To register a resource, follow the **Prerequisites** and **Register** sections of the [source pages](azure-purview-connector-overview.md) for your resources.
3338

34-
Once you have your resource registered, follow the rest of the steps to enable an individual resource for data use governance.
39+
Once you have your resource registered, follow the rest of the steps to enable an individual resource for *Data use governance*.
3540

3641
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
3742

3843
1. Select the **Data map** tab in the left menu.
3944

4045
1. Select the **Sources** tab in the left menu.
4146

42-
1. Select the source you want to enable data use governance for.
47+
1. Select the source where you want to enable *Data use governance*.
4348

4449
1. At the top of the source page, select **Edit source**.
4550

46-
1. Enable the data source for data use governance in Azure Purview by setting the **Data use governance** toggle to **Enabled**, as shown in the image below.
51+
1. Set the *Data use governance* toggle to **Enabled**, as shown in the image below.
4752

4853
:::image type="content" source="./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Set Data use governance toggle to **Enabled** at the bottom of the menu.":::
4954

5055
> [!WARNING]
51-
> **Known issues** related to source registration:
52-
>
56+
> **Known issues**
5357
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
54-
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
5558
5659

57-
## Disable data use governance
60+
## Disable Data use governance
5861

5962
>[!Note]
60-
>If your resource is currently a part of any active access policy, you will not be able to disable data use governance. First [remove the resource from the policy](how-to-data-owner-policy-authoring-generic.md#update-or-delete-a-policy), then disable data use governance.
63+
>If your resource is currently a part of any active access policy, you will not be able to disable data use governance. First [un-publish the policy from the resource](how-to-data-owner-policy-authoring-generic.md#update-or-delete-a-policy), then disable data use governance.
6164
62-
To disable data use governance for a source, resource group, or subscription, a user needs to either be a data source **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
65+
To disable data use governance for a source, resource group, or subscription, a user needs to either be a resource IAM **Owner** or an Azure Purview **Data source admin**. Once you have those permissions follow these steps:
6366

6467
1. Go to the [Azure Purview Studio](https://web.purview.azure.com/resource/).
6568

@@ -76,6 +79,10 @@ To disable data use governance for a source, resource group, or subscription, a
7679
>[!NOTE]
7780
> Disabling **Data use governance** for a subscription source will disable it also for all assets registered in that subscription.
7881
82+
> [!WARNING]
83+
> **Known issues**
84+
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that
85+
7986
## Data use governance best practices
8087

8188
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.

0 commit comments

Comments
 (0)