You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-data-owner-policies-resource-group.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,15 +37,15 @@ To register your resource, follow the **Prerequisites** and **Register** section
37
37
38
38
-[Register multiple sources in Azure Purview](register-scan-azure-multiple-sources.md#prerequisites)
39
39
40
-
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
40
+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41
41
42
42
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
43
43
44
44
-[How to enable data use governance](./how-to-enable-data-use-governance.md)
45
45
46
46
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
47
47
48
-
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
48
+
:::image type="content" source="./media/how-to-data-owner-policies-resource-group/register-resource-group-for-policy.png" alt-text="Screenshot that shows how to register a resource group or subscription for policy by toggling the enable tab in the resource editor.":::
49
49
50
50
## Create and publish a data owner policy
51
51
Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owner-policy-authoring-generic.md) to create and publish a policy similar to the example shown in the image: a policy that provides security group *sg-Finance**modify* access to resource group *finance-rg*:
@@ -56,10 +56,10 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
56
56
> - Publish is a background operation. It can take up to **2 hours** for the changes to be reflected in Storage account(s).
57
57
58
58
## Additional information
59
-
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers e.g., *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (i.e., at container or sub-container level).
59
+
- Creating a policy at subscription or resource group level will enable the Subjects to access Azure Storage system containers, for example, *$logs*. If this is undesired, first scan the data source and then create finer-grained policies for each (that is, at container or subcontainer level).
60
60
61
61
### Limits
62
-
The limit for Azure Purview policies that can be enforced by Storage accounts is 100MB per subscription, which roughly equates to 5000 policies.
62
+
The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
Copy file name to clipboardExpand all lines: articles/purview/how-to-data-owner-policies-storage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ To register your resources, follow the **Prerequisites** and **Register** sectio
37
37
38
38
-[Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
39
39
40
-
After you have registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
40
+
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41
41
42
42
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
43
43
@@ -58,14 +58,14 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
58
58
59
59
60
60
## Additional information
61
-
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there is no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
61
+
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there's no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
62
62
-[*abfs* for ADLS Gen2](../hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2.md#access-files-from-the-cluster)
63
63
-[*az storage blob download* for Blob Storage](../storage/blobs/storage-quickstart-blobs-cli.md#download-a-blob)
64
-
- Creating a policy at Storage account level will enable the Subjects to access system containers e.g., *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (i.e., at container or sub-container level).
64
+
- Creating a policy at Storage account level will enable the Subjects to access system containers, for example *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (that is, at container or subcontainer level).
65
65
66
66
67
67
### Limits
68
-
- The limit for Azure Purview policies that can be enforced by Storage accounts is 100MB per subscription, which roughly equates to 5000 policies.
68
+
- The limit for Azure Purview policies that can be enforced by Storage accounts is 100 MB per subscription, which roughly equates to 5000 policies.
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. This tutorial describes how a data owner can leverage Azure Purview to enable access to datasets in Azure Storage though Azure Purview.
16
+
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection. This tutorial describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage through Azure Purview.
17
17
18
18
In this tutorial, you learn how to:
19
19
> [!div class="checklist"]
@@ -34,7 +34,7 @@ In this tutorial, you learn how to:
34
34
35
35
### Register the data sources in Azure Purview for data use governance
36
36
37
-
Your Azure Storage account needs to be registered in Azure Purview to later define access policies, and during registration we will enable data use governance. **Data use governance** is an available feature in Azure Purview that allows users to manage access to a resource from within Azure Purview. This allows you to centralize data discovery and access management, however it is a feature that directly impacts your data security.
37
+
Your Azure Storage account needs to be registered in Azure Purview to later define access policies, and during registration we'll enable data use governance. **Data use governance** is an available feature in Azure Purview that allows users to manage access to a resource from within Azure Purview. This allows you to centralize data discovery and access management, however it's a feature that directly impacts your data security.
38
38
39
39
> [!WARNING]
40
40
> Before enabling data use governance for any of your resources, read through our [**data use governance article**](how-to-enable-data-use-governance.md).
@@ -67,7 +67,7 @@ To register your resource and enable data use governance, follow these steps:
67
67
68
68
:::image type="content" source="media/tutorial-data-owner-policies-storage/register-blob-permission.png" alt-text="Screenshot that shows the exceptions to allow trusted Microsoft services to access the storage account.":::
69
69
70
-
1. Once you have set up authentication for your storage account, go to the [Azure Purview Studio](https://web.purview.azure.com/).
70
+
1. Once you have set up authentication for your storage account, go to the [Azure Purview Studio](https://web.purview.azure.com/).
71
71
1. Select **Data Map** on the left menu.
72
72
73
73
:::image type="content" source="media/tutorial-data-owner-policies-storage/select-data-map.png" alt-text="Screenshot that shows the far left menu in the Azure Purview Studio open with Data Map highlighted.":::
@@ -137,7 +137,7 @@ To register your resource and enable data use governance, follow these steps:
137
137
138
138
1. Select the **Subjects** button and enter the subject identity as a principal, group, or MSI. Then select the **OK** button. This will take you back to the policy editor
139
139
140
-
:::image type="content" source="./media/access-policies-common/select-subject.png" alt-text="Screenshot showing the Subject menu, with a subject select from the search and the OK button highlighted at the bottom..":::
140
+
:::image type="content" source="./media/access-policies-common/select-subject.png" alt-text="Screenshot showing the Subject menu, with a subject select from the search and the OK button highlighted at the bottom.":::
141
141
142
142
1. Repeat the steps #5 to #11 to enter any more policy statements.
0 commit comments