Skip to content

Commit e0bddf8

Browse files
committed
Edits to Storage Tutorial
1 parent 4394e46 commit e0bddf8

10 files changed

+60
-53
lines changed

articles/purview/includes/access-policies-configuration-generic.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,23 @@ ms.custom:
99
---
1010

1111
### Register Azure Purview as a resource provider in other subscriptions
12-
Execute this step only if the data sources and the Azure Purview account are in different subscriptions. Register Azure Purview as a resource provider in each subscription where data sources reside by following this guide: [Azure resource providers and types](../../azure-resource-manager/management/resource-providers-and-types.md)
12+
Execute this step only if the data sources and the Azure Purview account are in different subscriptions. Register Azure Purview as a resource provider in each subscription where data sources reside by following this guide: [Register resource provider](../../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider).
13+
14+
The Azure Purview resource provider is:
15+
```
16+
Microsoft.Purview
17+
```
1318

1419
### Configure permissions for policy management actions
1520
This section discusses the permissions needed to:
16-
- Make a data resource available for *Data use governance*. This step is needed before a policy can be created in Azure Purview for that resource.
17-
- Author and publish policies in Azure Purview
21+
- Make a data resource available for *data use governance*. This step is needed before a policy can be created in Azure Purview for that resource.
22+
- Author and publish policies in Azure Purview.
1823

1924
>[!IMPORTANT]
2025
> Currently, Azure Purview roles related to policy operations must be configured at **root collection level** and not child collection level.
2126
2227
#### Permissions to make a data resource available for *Data use governance*
23-
To enable the *Data use Governance* (DUG) toggle for a data source, resource group, or subscription, the same user needs to have both certain IAM privileges on the resource and certain Azure Purview privileges.
28+
To enable the *data use governance* (DUG) toggle for a data source, resource group, or subscription, the same user needs to have both certain IAM privileges on the resource and certain Azure Purview privileges.
2429

2530
1) User needs to have **either one of the following** IAM role combinations on the resource:
2631
- IAM *Owner*
@@ -31,7 +36,7 @@ To enable the *Data use Governance* (DUG) toggle for a data source, resource gro
3136
2) In addition, the same user needs to have Azure Purview Data source administrator role at the **root collection level**. See the guide on [managing Azure Purview role assignments](../catalog-permissions.md#assign-permissions-to-your-users).
3237

3338
#### Permissions for policy authoring and publishing
34-
The following permissions are needed in Azure Purview at the **root collection level**
39+
The following permissions are needed in Azure Purview at the **root collection level**:
3540
- *Policy authors* role can create or edit policies.
3641
- *Data source administrator* role can publish a policy.
3742

@@ -43,10 +48,11 @@ Check the section on managing Azure Purview role assignments in this [guide](../
4348
> - An issue reported where role IAM Owner, which is required to enable Data use governance, is not directly assigned to the data resource but instead inherited from a management group or a subscription. Fix is being deployed to production regions. Updated: March 29, 2022.
4449
4550
#### Delegation of access control responsibility to Azure Purview
46-
**Note:**
47-
1. Once a resource has been enabled for *Data use Governance*, **any** Azure Purview root-collection *policy author* will be able to create access policies against it, and **any** Azure Purview root-collection *Data source admin* will be able to publish those policies at **any point afterwards**.
48-
1. **Any** Azure Purview root *Collection admin* can assign **new** root-collection *Data Source Admin* and *Policy author* roles.
4951

50-
**Suggested best practices for permissions:**
52+
>[!WARNING]
53+
>* Once a resource has been enabled for *Data use Governance*, **any** Azure Purview root-collection *policy author* will be able to create access policies against it, and **any** Azure Purview root-collection *Data source admin* will be able to publish those policies at **any point afterwards**.
54+
> * **Any** Azure Purview root *Collection admin* can assign **new** root-collection *Data Source Admin* and *Policy author* roles.
55+
56+
With this warning in mind, here are some **suggested best practices for permissions:**
5157
- Minimize the number of people that hold Azure Purview root *Collection admin*, root *Data Source Admin* or root *Policy author* roles.
5258
- To ensure check and balances, assign the Azure Purview *Policy author* and *Data source admin* roles to different people in the organization. With this, before a data policy takes effect, a second person (the *Data source admin*) must review it and explicitly approve it by publishing it.

articles/purview/includes/access-policies-prerequisites-generic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@ ms.custom:
99
---
1010
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
1111
- Create a new, or use an existing Azure Purview account. You can [follow our quick-start guide to create one](../create-catalog-portal.md).
12-
- Create a new, or use an existing resource group, and place new data sources under it. [Follow this guide to create a new resource group](../../azure-resource-manager/management/manage-resource-groups-portal.md)
12+
- Create a new, or use an existing resource group, and place new data sources under it. [Follow this guide to create a new resource group](../../azure-resource-manager/management/manage-resource-groups-portal.md).

articles/purview/includes/access-policies-prerequisites-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom:
99
---
1010

1111
### Enable access policy enforcement for the Azure Storage account
12-
To enable Azure Purview to manage policies for one or more Azure Storage accounts, execute the following PowerShell commands in the subscription where you'll deploy your Azure Storage account. These PowerShell commands will enable Azure Purview to manage policies on all newly created Azure Storage accounts in that subscription.
12+
To enable Azure Purview to manage policies for one or more Azure Storage accounts, execute the following PowerShell commands in the subscription where you'll deploy your Azure Storage account. These PowerShell commands will enable Azure Purview to manage policies on all **newly created** Azure Storage accounts in that subscription.
1313

1414
If you’re executing these commands locally, be sure to run PowerShell as an administrator.
1515
Alternatively, you can use the [Azure Cloud Shell](../../cloud-shell/overview.md) in the Azure portal: [https://shell.azure.com](https://shell.azure.com).
@@ -24,12 +24,12 @@ Register-AzProviderFeature -FeatureName AllowPurviewPolicyEnforcement -ProviderN
2424
```
2525

2626
If the output of the last command shows *RegistrationState* as *Registered*, then your subscription is enabled for access policies.
27-
If the output is *Registering*, wait at least 10 minutes, and then retry the command. **Do not continue unless the RegistrationState shows as *Registered***
27+
If the output is *Registering*, wait at least 10 minutes, and then retry the command. **Do not continue unless the RegistrationState shows as *Registered***.
2828

2929
>[!IMPORTANT]
3030
> The access policy feature is only available on **new** Azure Storage accounts. Storage accounts must meet the following requirements to enforce access policies published from Azure Purview.
3131
> - Storage account versions >= 81.x.x.
32-
> - Created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*
32+
> - Created in the subscription **after** the feature *AllowPurviewPolicyEnforcement* is *Registered*.
3333
3434
### Create a new Azure Storage account
3535
After you’ve enabled the access policy above, create new Azure Storage account(s) in one of the regions listed below. You can [follow this guide to create one](../../storage/common/storage-account-create.md).
251 KB
Loading
122 KB
Loading
188 KB
Loading
235 KB
Loading
8.98 KB
Loading
40 KB
Loading

0 commit comments

Comments
 (0)