Skip to content

Commit d246140

Browse files
authored
Merge pull request #191697 from inward-eye/master
restructured to leverage how-to-enable-data-use-governance file
2 parents ddb4c7a + 3448fae commit d246140

8 files changed

+44
-64
lines changed

articles/purview/how-to-enable-data-use-governance.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,28 @@ To disable data use governance for a source, resource group, or subscription, a
5656

5757
1. Set the **Data use governance** toggle to **Disabled**.
5858

59-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
59+
60+
### Important considerations related to Data use governance
61+
- Make sure you write down the **Name** you use when registering in Azure Purview. You will need it when you publish a policy. The recommended practice is to make the registered name exactly the same as the endpoint name.
62+
- To disable a source for *Data use governance*, remove it first from being bound (i.e. published) in any policy.
63+
- While user needs to have both data source *Owner* and Azure Purview *Data source admin* to enable a source for *Data use governance*, either of those roles can independently disable it.
64+
- Disabling *Data use governance* for a subscription will disable it also for all assets registered in that subscription.
65+
66+
> [!WARNING]
67+
> **Known issues** related to source registration
68+
> - Moving data sources to a different resource group or subscription is not yet supported. If want to do that, de-register the data source in Azure Purview before moving it and then register it again after that happens.
69+
> - Once a subscription gets disabled for *Data use governance* any underlying assets that are enabled for *Data use governance* will be disabled, which is the right behavior. However, policy statements based on those assets will still be allowed after that.
70+
71+
### Data use governance best practices
72+
- We highly encourage registering data sources for *Data use governance* and managing all associated access policies in a single Azure Purview account.
73+
- Should you have multiple Azure Purview accounts, be aware that **all** data sources belonging to a subscription must be registered for *Data use governance* in a single Azure Purview account. That Azure Purview account can be in any subscription in the tenant. The *Data use governance* toggle will become greyed out when there are invalid configurations. Some examples of valid and invalid configurations follow in the diagram below:
74+
- **Case 1** shows a valid configuration where a Storage account is registered in an Azure Purview account in the same subscription.
75+
- **Case 2** shows a valid configuration where a Storage account is registered in an Azure Purview account in a different subscription.
76+
- **Case 3** shows an invalid configuration arising because Storage accounts S3SA1 and S3SA2 both belong to Subscription 3, but are registered to different Azure Purview accounts. In that case, the *Data use governance* toggle will only enable in the Azure Purview account that wins and registers a data source in that subscription first. The toggle will then be greyed out for the other data source.
77+
- If the *Data use governance* toggle is greyed out and cannot be enabled, hover over it to know the name of the Azure Purview account that has registered the data resource first.
78+
79+
![Diagram shows valid and invalid configurations when using multiple Azure Purview accounts to manage policies.](./media/access-policies-common/valid-and-invalid-configurations.png)
80+
6081

6182
## Next steps
6283

articles/purview/includes/access-policies-prerequisites-storage.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 01/24/2022
8-
ms.custom: references_regions
7+
ms.date: 03/14/2022
8+
ms.custom:
99
---
1010

1111
### Enable access policy enforcement for the Azure Storage account
@@ -32,8 +32,11 @@ If the output is *Registering*, wait at least 10 minutes, and then retry the com
3232
> - Created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*
3333
3434
### Create a new Azure Storage account
35-
After you’ve enabled the access policy above, create new Azure Storage account(s) in one of the regions listed below:
36-
37-
[!INCLUDE [Azure Storage specific pre-requisites](access-policies-storage-regions.md)]
38-
39-
You can [follow this guide to create one](../../storage/common/storage-account-create.md).
35+
After you’ve enabled the access policy above, create new Azure Storage account(s) in one of the regions listed below. You can [follow this guide to create one](../../storage/common/storage-account-create.md).
36+
37+
Currently, Azure Purview access policies can only be enforced in the following Azure Storage regions:
38+
- France Central
39+
- Canada Central
40+
- East US
41+
- East US2
42+
- West Europe

articles/purview/includes/access-policies-registration-generic.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

articles/purview/includes/access-policies-storage-regions.md

Lines changed: 0 additions & 16 deletions
This file was deleted.

articles/purview/index.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,12 @@ landingContent:
165165
links:
166166
- text: Self-service data access policy
167167
url: concept-self-service-data-access-policy.md
168+
- linkListType: how-to-guide
169+
links:
170+
- text: Registering data sources for Data use governance
171+
url: how-to-enable-data-use-governance.md
172+
- text: Authoring and publishing data owner access policies
173+
url: how-to-data-owner-policy-authoring-generic.md
168174
- linkListType: tutorial
169175
links:
170176
- text: Data owner policies for Azure Storage

articles/purview/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -293,10 +293,10 @@ items:
293293
href: catalog-conditional-access.md
294294
- name: Data policies
295295
items:
296-
- name: Authoring and publishing data owner access policies
297-
href: how-to-data-owner-policy-authoring-generic.md
298296
- name: Registering data sources for Data use governance
299297
href: how-to-enable-data-use-governance.md
298+
- name: Authoring and publishing data owner access policies
299+
href: how-to-data-owner-policy-authoring-generic.md
300300
- name: Self-service data access policy
301301
href: concept-self-service-data-access-policy.md
302302
- name: View Self-service data access policy

articles/purview/tutorial-data-owner-policies-resource-group.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: tutorial
9-
ms.date: 2/3/2022
9+
ms.date: 3/14/2022
1010
ms.custom:
1111
---
1212

@@ -41,9 +41,7 @@ Enable the resource group or the subscription for access policies in Azure Purvi
4141

4242
![Image shows how to register a resource group or subscription for policy.](./media/tutorial-data-owner-policies-resource-group/register-resource-group-for-policy.png)
4343

44-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
45-
46-
More here on [registering a data source for Data use governance](./how-to-enable-data-use-governance.md)
44+
Follow this link for more information and best practices related to [registering a data resource for Data use governance](./how-to-enable-data-use-governance.md)
4745

4846
## Create and publish a data owner policy
4947
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*:

articles/purview/tutorial-data-owner-policies-storage.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: tutorial
9-
ms.date: 03/08/2022
9+
ms.date: 03/14/2022
1010
ms.custom:
1111
---
1212

@@ -44,9 +44,7 @@ Enable the data source for access policies in Azure Purview by setting the **Dat
4444

4545
![Image shows how to register a data source for policy.](./media/tutorial-data-owner-policies-storage/register-data-source-for-policy-storage.png)
4646

47-
[!INCLUDE [Access policies generic registration](./includes/access-policies-registration-generic.md)]
48-
49-
More here on [registering a data source for Data use governance](./how-to-enable-data-use-governance.md)
47+
Follow this link for more information and best practices related to [registering a data resource for Data use governance](./how-to-enable-data-use-governance.md)
5048

5149
## Create and publish a data owner policy
5250
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides group *Contoso Team* *read* access to Storage account *marketinglake1*:

0 commit comments

Comments
 (0)