Skip to content

Commit e01cbfd

Browse files
authored
Merge pull request #231144 from inward-eye/main
updates for Storage account with ZRS
2 parents 1b0ca19 + 2829461 commit e01cbfd

12 files changed

+64
-99
lines changed

articles/purview/how-to-policies-data-owner-arc-sql-server.md

Lines changed: 8 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 11/23/2022
9+
ms.date: 03/17/2023
1010
ms.custom: references_regions, event-tier1-build-2022
1111
---
1212
# Provision access by data owner for Azure Arc-enabled SQL Server (preview)
@@ -76,49 +76,14 @@ Follow this link for the steps to [update or delete a data owner policy in Micro
7676

7777
## Test the policy
7878

79-
The Azure AD Accounts referenced in the access policies should now be able to connect to any database in the server to which the policies are published.
79+
After creating the policy, any of the Azure AD users in the Subject should now be able to connect to the data sources in the scope of the policy. To test, use SSMS or any SQL client and try to query. Attempt access to a SQL table you have provided read access to.
8080

81-
### Force policy download
82-
It is possible to force an immediate download of the latest published policies to the current SQL database by running the following command. The minimal permission required to run it is membership in ##MS_ServerStateManager##-server role.
81+
If you require additional troubleshooting, see the [Next steps](#next-steps) section in this guide.
8382

84-
```sql
85-
-- Force immediate download of latest published policies
86-
exec sp_external_policy_refresh reload
87-
```
83+
## Role definition detail
84+
This section contains a reference of how relevant Microsoft Purview data policy roles map to specific actions in SQL data sources.
8885

89-
### Analyze downloaded policy state from SQL
90-
The following DMVs can be used to analyze which policies have been downloaded and are currently assigned to Azure AD accounts. The minimal permission required to run them is VIEW DATABASE SECURITY STATE - or assigned Action Group *SQL Security Auditor*.
91-
92-
```sql
93-
94-
-- Lists generally supported actions
95-
SELECT * FROM sys.dm_server_external_policy_actions
96-
97-
-- Lists the roles that are part of a policy published to this server
98-
SELECT * FROM sys.dm_server_external_policy_roles
99-
100-
-- Lists the links between the roles and actions, could be used to join the two
101-
SELECT * FROM sys.dm_server_external_policy_role_actions
102-
103-
-- Lists all Azure AD principals that were given connect permissions
104-
SELECT * FROM sys.dm_server_external_policy_principals
105-
106-
-- Lists Azure AD principals assigned to a given role on a given resource scope
107-
SELECT * FROM sys.dm_server_external_policy_role_members
108-
109-
-- Lists Azure AD principals, joined with roles, joined with their data actions
110-
SELECT * FROM sys.dm_server_external_policy_principal_assigned_actions
111-
```
112-
113-
114-
115-
## Additional information
116-
117-
### Policy action mapping
118-
119-
This section contains a reference of how actions in Microsoft Purview data policies map to specific actions in Azure Arc-enabled SQL Server.
120-
121-
| **Microsoft Purview policy action** | **Data source specific actions** |
86+
| **Microsoft Purview policy role definition** | **Data source specific actions** |
12287
|-------------------------------------|--------------------------------------|
12388
|||
12489
| *Read* |Microsoft.Sql/sqlservers/Connect |
@@ -132,4 +97,5 @@ This section contains a reference of how actions in Microsoft Purview data polic
13297
Check blog, demo and related how-to guides
13398
* [Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
13499
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
135-
* [Enable Microsoft Purview data owner policies on an Azure SQL DB](./how-to-policies-data-owner-azure-sql-db.md)
100+
* [Enable Microsoft Purview data owner policies on an Azure SQL Database](./how-to-policies-data-owner-azure-sql-db.md)
101+
* Doc: [Troubleshoot Microsoft Purview policies for SQL data sources](./troubleshoot-policy-sql.md)

articles/purview/how-to-policies-data-owner-azure-sql-db.md

Lines changed: 8 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 10/31/2022
9+
ms.date: 03/17/2023
1010
ms.custom: references_regions, event-tier1-build-2022
1111
---
1212
# Provision access by data owner for Azure SQL Database (preview)
@@ -35,6 +35,7 @@ After you've registered your resources, you'll need to enable Data Use Managemen
3535
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this screenshot. This will enable the access policies to be used with the given Azure SQL server and all its contained databases.
3636
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-azure-sql-db.png)
3737

38+
[!INCLUDE [Access policies Azure SQL Database pre-requisites](./includes/access-policies-configuration-azure-sql-db.md)]
3839

3940
## Create and publish a data owner policy
4041

@@ -57,48 +58,14 @@ Follow this link for the steps to [unpublish a data owner policy in Microsoft Pu
5758
Follow this link for the steps to [update or delete a data owner policy in Microsoft Purview](how-to-policies-data-owner-authoring-generic.md#update-or-delete-a-policy).
5859

5960
## Test the policy
61+
After creating the policy, any of the Azure AD users in the Subject should now be able to connect to the data sources in the scope of the policy. To test, use SSMS or any SQL client and try to query. Attempt access to a SQL table you have provided read access to.
6062

61-
The Azure AD Accounts referenced in the access policies should now be able to connect to any database in the server to which the policies are published.
63+
If you require additional troubleshooting, see the [Next steps](#next-steps) section in this guide.
6264

63-
### Force policy download
64-
It is possible to force an immediate download of the latest published policies to the current SQL database by running the following command. The minimal permission required to run it is membership in ##MS_ServerStateManager##-server role.
65+
## Role definition detail
66+
This section contains a reference of how relevant Microsoft Purview data policy roles map to specific actions in SQL data sources.
6567

66-
```sql
67-
-- Force immediate download of latest published policies
68-
exec sp_external_policy_refresh reload
69-
```
70-
71-
### Analyze downloaded policy state from SQL
72-
The following DMVs can be used to analyze which policies have been downloaded and are currently assigned to Azure AD accounts. The minimal permission required to run them is VIEW DATABASE SECURITY STATE - or assigned Action Group *SQL Security Auditor*.
73-
74-
```sql
75-
76-
-- Lists generally supported actions
77-
SELECT * FROM sys.dm_server_external_policy_actions
78-
79-
-- Lists the roles that are part of a policy published to this server
80-
SELECT * FROM sys.dm_server_external_policy_roles
81-
82-
-- Lists the links between the roles and actions, could be used to join the two
83-
SELECT * FROM sys.dm_server_external_policy_role_actions
84-
85-
-- Lists all Azure AD principals that were given connect permissions
86-
SELECT * FROM sys.dm_server_external_policy_principals
87-
88-
-- Lists Azure AD principals assigned to a given role on a given resource scope
89-
SELECT * FROM sys.dm_server_external_policy_role_members
90-
91-
-- Lists Azure AD principals, joined with roles, joined with their data actions
92-
SELECT * FROM sys.dm_server_external_policy_principal_assigned_actions
93-
```
94-
95-
## Additional information
96-
97-
### Policy action mapping
98-
99-
This section contains a reference of how actions in Microsoft Purview data policies map to specific actions in Azure SQL DB.
100-
101-
| **Microsoft Purview policy action** | **Data source specific actions** |
68+
| **Microsoft Purview policy role definition** | **Data source specific actions** |
10269
|-------------------------------------|--------------------------------------|
10370
|||
10471
| *Read* |Microsoft.Sql/sqlservers/Connect |
@@ -112,3 +79,4 @@ Check blog, demo and related how-to guides
11279
* [Concepts for Microsoft Purview data owner policies](./concept-policies-data-owner.md)
11380
* [Enable Microsoft Purview data owner policies on all data sources in a subscription or a resource group](./how-to-policies-data-owner-resource-group.md)
11481
* [Enable Microsoft Purview data owner policies on an Azure Arc-enabled SQL Server](./how-to-policies-data-owner-arc-sql-server.md)
82+
* Doc: [Troubleshoot Microsoft Purview policies for SQL data sources](./troubleshoot-policy-sql.md)

articles/purview/how-to-policies-devops-authoring-generic.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@ To delete a DevOps policy, ensure first that you have the Microsoft Purview Poli
8282
## Test the DevOps policy
8383
After creating the policy, any of the Azure AD users in the Subject should now be able to connect to the data sources in the scope of the policy. To test, use SSMS or any SQL client and try to query some DMVs/DMFs. We list here a few examples. For more, you can consult the mapping of popular DMVs/DMFs in the [Microsoft Purview DevOps policies concept guide](./concept-policies-devops.md#mapping-of-popular-dmvs-and-dmfs)
8484

85+
If you require additional troubleshooting, see the [Next steps](#next-steps) section in this guide.
86+
8587
### Testing SQL Performance Monitor access
8688
If you provided the Subject(s) of the policy SQL Performance Monitor role, you can issue the following commands
8789
```sql
@@ -113,9 +115,9 @@ SELECT * FROM [databaseName].schemaName.tableName
113115

114116

115117
## Role definition detail
116-
This section contains a reference of how actions in Microsoft Purview data policies map to specific actions in Azure SQL MI.
118+
This section contains a reference of how relevant Microsoft Purview data policy roles map to specific actions in SQL data sources.
117119

118-
| **DevOps role definition** | **Data source specific actions** |
120+
| **Microsoft Purview policy role definition** | **Data source specific actions** |
119121
|-------------------------------------|--------------------------------------|
120122
| | |
121123
| *SQL Performance Monitor* |Microsoft.Sql/sqlservers/Connect |

articles/purview/how-to-policies-devops-azure-sql-db.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 03/10/2023
9+
ms.date: 03/17/2023
1010
ms.custom:
1111
---
1212
# Provision access to system metadata in Azure SQL Database (preview)
@@ -34,6 +34,8 @@ After you've registered your resources, you'll need to enable Data Use Managemen
3434
Once your data source has the **Data Use Management** toggle *Enabled*, it will look like this screenshot. This will enable the access policies to be used with the given data source
3535
![Screenshot shows how to register a data source for policy.](./media/how-to-policies-data-owner-sql/register-data-source-for-policy-azure-sql-db.png)
3636

37+
[!INCLUDE [Access policies Azure SQL Database pre-requisites](./includes/access-policies-configuration-azure-sql-db.md)]
38+
3739
## Create a new DevOps policy
3840
Follow this link for the steps to [create a new DevOps policy in Microsoft Purview](how-to-policies-devops-authoring-generic.md#create-a-new-devops-policy).
3941

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
author: inward-eye
3+
ms.author: vlrodrig
4+
ms.service: purview
5+
ms.subservice: purview-data-policies
6+
ms.topic: include
7+
ms.date: 03/17/2022
8+
---
9+
10+
Return to the Azure portal for Azure SQL Database to verify it is now governed by Microsoft Purview
11+
1. Sign in to the Azure portal through [this link](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Sql%2Fservers)
12+
13+
1. Select the Azure SQL Server that you want to configure.
14+
15+
1. Go to **Azure Active Directory** on the left pane.
16+
17+
1. Scroll down to **Microsoft Purview access policies**.
18+
19+
1. Select the button to **Check for Microsoft Purview Governance**. Wait while the request is processed. It may take a few minutes.
20+
![Screenshot that shows Azure SQL is governed by Microsoft Purview.](../media/how-to-policies-data-owner-sql/check-governed-status-azure-sql-db.png)
21+
22+
1. Confirm that the Microsoft Purview Governance Status shows `Governed`. Note that **it may take a few minutes** after you enable *Data use management* in Microsoft Purview for the correct status to be reflected.

articles/purview/includes/access-policies-prerequisites-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 12/01/2022
7+
ms.date: 03/16/2023
88
ms.custom: references_regions
99
---
1010

@@ -49,6 +49,6 @@ If the output is *Registering*, wait at least 10 minutes, and then retry the com
4949
- East Asia
5050
- Japan East
5151
- Japan West
52-
- Only **new** Storage accounts with zone-redundant storage (ZRS) are supported. That is, Storage accounts created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*.
52+
- Only **new** Storage accounts with zone-redundant storage (ZRS) are supported. That is, Storage accounts created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*. Note, ZRS Storage accounts will start enforcing policies from Microsoft Purview within 2 hours.
5353

5454
If needed, you can also create a new Storage account by [following this guide](../../storage/common/storage-account-create.md).
220 KB
Loading

articles/purview/register-scan-adls-gen2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: athenadsouza
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 02/16/2023
9+
ms.date: 03/17/2023
1010
ms.custom: template-how-to, ignite-fall-2021, references_regions
1111
---
1212
# Connect to Azure Data Lake Storage in Microsoft Purview
@@ -358,7 +358,7 @@ Once your data source has the **Data Use Management** option set to **Enabled**
358358

359359
### Create a policy
360360
To create an access policy for Azure Data Lake Storage Gen2, follow this guide:
361-
* [Data owner policy on a single storage account](./how-to-policies-data-owner-storage.md#create-and-publish-a-data-owner-policy)
361+
* [Provision read/modify access on a single storage account](./how-to-policies-data-owner-storage.md#create-and-publish-a-data-owner-policy)
362362

363363
To create policies that cover all data sources inside a resource group or Azure subscription you can refer to [this section](register-scan-azure-multiple-sources.md#access-policy).
364364

articles/purview/register-scan-azure-arc-enabled-sql-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -209,8 +209,8 @@ Before you can create policies, you must register the Azure Arc-enabled SQL Serv
209209

210210
To create an access policy for Azure Arc-enabled SQL Server, follow these guides:
211211

212-
* [DevOps policy on a single Azure Arc-enabled SQL Server instance - GA](./how-to-policies-devops-arc-sql-server.md#create-a-new-devops-policy)
213-
* [Data owner policy on a single Azure Arc-enabled SQL Server instance - Public Preview](./how-to-policies-data-owner-arc-sql-server.md#create-and-publish-a-data-owner-policy)
212+
* [Provision access to system health, performance and audit information in SQL Server 2022](./how-to-policies-devops-arc-sql-server.md#create-a-new-devops-policy)
213+
* [Provision read/modify access on a single SQL Server 2022](./how-to-policies-data-owner-arc-sql-server.md#create-and-publish-a-data-owner-policy)
214214

215215
To create policies that cover all data sources inside a resource group or Azure subscription, see [Discover and govern multiple Azure sources in Microsoft Purview](register-scan-azure-multiple-sources.md#access-policy).
216216

articles/purview/register-scan-azure-blob-storage-source.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -354,7 +354,7 @@ Once your data source has the **Data Use Management** option set to **Enabled**
354354
![Screenshot shows how to register a data source for policy with the option Data use management set to enable](./media/how-to-policies-data-owner-storage/register-data-source-for-policy-storage.png)
355355

356356
### Create a policy
357-
To create an access policy for Azure Blob Storage, follow this guide: [Data owner policy on a single storage account](./how-to-policies-data-owner-storage.md#create-and-publish-a-data-owner-policy).
357+
To create an access policy for Azure Blob Storage, follow this guide: [Provision read/modify access on a single storage account](./how-to-policies-data-owner-storage.md#create-and-publish-a-data-owner-policy).
358358

359359
To create policies that cover all data sources inside a resource group or Azure subscription you can refer to [this section](register-scan-azure-multiple-sources.md#access-policy).
360360

0 commit comments

Comments
 (0)