Skip to content

Commit d3544da

Browse files
authored
Update access-policies-prerequisites-arc-sql-server.md
1 parent c9e3b2d commit d3544da

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/purview/includes/access-policies-prerequisites-arc-sql-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Policy enforcement is available in all Microsoft Purview regions except:
2626
#### Security considerations for Azure Arc-enabled SQL Server
2727

2828
- The server admin can turn off the Microsoft Purview policy enforcement.
29-
- Azure Arc admin and server admin permissions provide the ability to change the Azure Resource Manager path of the server. Because mappings in Microsoft Purview use Resource Manager paths, this can lead to wrong policy enforcements.
29+
- Azure Arc admin and server admin permissions provide the ability to change the Azure Resource Manager path of the server. Because mappings in Microsoft Purview use Resource Manager paths, it can lead to wrong policy enforcements.
3030
- A SQL Server admin (database admin) can gain the power of a server admin and can tamper with the cached policies from Microsoft Purview.
3131
- The recommended configuration is to create a separate app registration for each SQL server instance. This configuration prevents the second SQL Server instance from reading the policies meant for the first SQL Server instance, in case a rogue admin in the second SQL Server instance tampers with the Resource Manager path.
3232

33-
#### Verify the pre-requisites
33+
#### Verify the prerequisites
3434

3535
1. Sign in to the Azure portal through [this link](https://portal.azure.com/#view/Microsoft_Azure_HybridCompute/AzureArcCenterBlade/~/overview)
3636

0 commit comments

Comments
 (0)