Skip to content

Commit f341a34

Browse files
committed
Acrolinx
1 parent e0bddf8 commit f341a34

File tree

3 files changed

+12
-12
lines changed

3 files changed

+12
-12
lines changed

articles/purview/how-to-data-owner-policies-resource-group.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,15 @@ To register your resource, follow the **Prerequisites** and **Register** section
3737

3838
- [Register multiple sources in Azure Purview](register-scan-azure-multiple-sources.md#prerequisites)
3939

40-
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
40+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
4141

4242
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
4343

4444
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
4545

4646
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
4747

48-
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
48+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
4949

5050
## Create and publish a data owner policy
5151
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance* *modify* access to resource group *finance-rg*:
@@ -56,10 +56,10 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
5656
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).
5757
5858
## Additional information
59-
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers e.g., *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (i.e., at container or sub-container level).
59+
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers, for example, *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (that is, at container or subcontainer level).
6060

6161
### Limits
62-
The limit for Azure Purview policies that can be enforced by Storage accounts is 100MB per subscription, which roughly equates to 5000 policies.
62+
The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
6363

6464
## Next steps
6565
Check blog, demo and related tutorials:

articles/purview/how-to-data-owner-policies-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To register your resources, follow the **Prerequisites** and **Register** sectio
3737

3838
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
3939

40-
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
40+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
4141

4242
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
4343

@@ -58,14 +58,14 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
5858
5959

6060
## Additional information
61-
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there is no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
61+
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there's no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
6262
- [*abfs* for ADLS Gen2](../hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2.md#access-files-from-the-cluster)
6363
- [*az storage blob download* for Blob Storage](../storage/blobs/storage-quickstart-blobs-cli.md#download-a-blob)
64-
- Creating a policy at Storage account level will enable the Subjects to access system containers e.g., *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (i.e., at container or sub-container level).
64+
- Creating a policy at Storage account level will enable the Subjects to access system containers, for example *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (that is, at container or subcontainer level).
6565

6666

6767
### Limits
68-
- The limit for Azure Purview policies that can be enforced by Storage accounts is 100MB per subscription, which roughly equates to 5000 policies.
68+
- The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
6969

7070
### Known issues
7171

articles/purview/tutorial-data-owner-policies-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 04/08/2022
1313

1414
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1515

16-
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. This tutorial describes how a data owner can leverage Azure Purview to enable access to datasets in Azure Storage though Azure Purview.
16+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. This tutorial describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage through Azure Purview.
1717

1818
In this tutorial, you learn how to:
1919
> [!div class="checklist"]
@@ -34,7 +34,7 @@ In this tutorial, you learn how to:
3434

3535
### Register the data sources in Azure Purview for data use governance
3636

37-
Your Azure Storage account needs to be registered in Azure Purview to later define access policies, and during registration we will enable data use governance. **Data use governance** is an available feature in Azure Purview that allows users to manage access to a resource from within Azure Purview. This allows you to centralize data discovery and access management, however it is a feature that directly impacts your data security.
37+
Your Azure Storage account needs to be registered in Azure Purview to later define access policies, and during registration we'll enable data use governance. **Data use governance** is an available feature in Azure Purview that allows users to manage access to a resource from within Azure Purview. This allows you to centralize data discovery and access management, however it's a feature that directly impacts your data security.
3838

3939
> [!WARNING]
4040
> Before enabling data use governance for any of your resources, read through our [**data use governance article**](how-to-enable-data-use-governance.md).
@@ -67,7 +67,7 @@ To register your resource and enable data use governance, follow these steps:
6767

6868
:::image type="content" source="media/tutorial-data-owner-policies-storage/register-blob-permission.png" alt-text="Screenshot that shows the exceptions to allow trusted Microsoft services to access the storage account.":::
6969

70-
1. Once you have set up authentication for your storage account , go to the [Azure Purview Studio](https://web.purview.azure.com/).
70+
1. Once you have set up authentication for your storage account, go to the [Azure Purview Studio](https://web.purview.azure.com/).
7171
1. Select **Data Map** on the left menu.
7272

7373
:::image type="content" source="media/tutorial-data-owner-policies-storage/select-data-map.png" alt-text="Screenshot that shows the far left menu in the Azure Purview Studio open with Data Map highlighted.":::
@@ -137,7 +137,7 @@ To register your resource and enable data use governance, follow these steps:
137137

138138
1. Select the **Subjects** button and enter the subject identity as a principal, group, or MSI. Then select the **OK** button. This will take you back to the policy editor
139139

140-
:::image type="content" source="./media/access-policies-common/select-subject.png" alt-text="Screenshot showing the Subject menu, with a subject select from the search and the OK button highlighted at the bottom..":::
140+
:::image type="content" source="./media/access-policies-common/select-subject.png" alt-text="Screenshot showing the Subject menu, with a subject select from the search and the OK button highlighted at the bottom.":::
141141

142142
1. Repeat the steps #5 to #11 to enter any more policy statements.
143143

0 commit comments

Comments
 (0)