Skip to content

Commit ff6e376

Browse files
authored
Update how-to-data-owner-policies-storage.md
1 parent e2bb820 commit ff6e376

File tree

1 file changed

+9
-12
lines changed

1 file changed

+9
-12
lines changed

articles/purview/how-to-data-owner-policies-storage.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,17 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: how-to
9-
ms.date: 04/08/2022
9+
ms.date: 04/15/2022
1010
ms.custom:
1111
---
1212

1313
# Access provisioning by data owner to Azure Storage datasets (preview)
1414

1515
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1616

17-
[Policies](concept-data-owner-policies.md) in Azure Purview allow you to enable access to data sources that have been registered to a collection.
17+
[Policies](concept-data-owner-policies.md) allow you to enable access to data sources that have been registered for *Data use governance* in Azure Purview.
1818

19-
This article describes how a data owner can use Azure Purview to enable access to datasets in Azure Storage. Currently, these Azure Storage sources are supported:
19+
This article describes how a data owner can delegate in Azure Purview management of access to Azure Storage datasets. Currently, these two Azure Storage sources are supported:
2020
- Blob storage
2121
- Azure Data Lake Storage (ADLS) Gen2
2222

@@ -29,21 +29,19 @@ This article describes how a data owner can use Azure Purview to enable access t
2929
[!INCLUDE [Access policies generic configuration](./includes/access-policies-configuration-generic.md)]
3030

3131
### Register the data sources in Azure Purview for Data use governance
32-
The Azure Storage resources need to be registered with Azure Purview to later define access policies.
32+
The Azure Storage resources need to be registered first with Azure Purview to later define access policies.
3333

3434
To register your resources, follow the **Prerequisites** and **Register** sections of these guides:
3535

3636
- [Register and scan Azure Storage Blob - Azure Purview](register-scan-azure-blob-storage-source.md#prerequisites)
3737

3838
- [Register and scan Azure Data Lake Storage (ADLS) Gen2 - Azure Purview](register-scan-adls-gen2.md#prerequisites)
3939

40-
After you've registered your resources, you'll need to enable data use governance. Data use governance affects the security of your data, as it allows your users to manage access to resources from within Azure Purview.
41-
42-
To ensure you securely enable data use governance, and follow best practices, follow this guide to enable data use governance for your resource group or subscription:
40+
After you've registered your resources, you'll need to enable *Data use governance*. Data use governance can affect the security of your data, as it allows certain Azure Purview roles to manage access to data sources that have been registered. Secure practices related to *Data use governance* are described in this guide:
4341

4442
- [How to enable data use governance](./how-to-enable-data-use-governance.md)
4543

46-
In the end, your resource will have the **Data use governance** toggle to **Enabled**, as shown in the picture:
44+
The expected outcome is that your data source will have the **Data use governance** toggle **Enabled**, as shown in the picture:
4745

4846
:::image type="content" source="./media/how-to-data-owner-policies-storage/register-data-source-for-policy-storage.png" alt-text="Screenshot that shows how to register a data source for policy by toggling the enable tab in the resource editor.":::
4947

@@ -58,7 +56,7 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
5856
5957

6058
## Additional information
61-
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container, and there's no access at that level, the request will fail. The following documents show examples of how to do perform a direct access. See also blogs in the *Next steps* section of this tutorial.
59+
- Policy statements set below container level on a Storage account are supported. If no access has been provided at Storage account level or container level, then the App that requests the data must execute a direct access by providing a fully qualified name to the data object. If the App attempts to crawl down the hierarchy starting from the Storage account or Container (like Storage Explorer does), and there's no access at that level, the request will fail. The following documents show examples of how to perform a direct access. See also the blogs in the *Next steps* section of this how-to-guide.
6260
- [*abfs* for ADLS Gen2](../hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2.md#access-files-from-the-cluster)
6361
- [*az storage blob download* for Blob Storage](../storage/blobs/storage-quickstart-blobs-cli.md#download-a-blob)
6462
- Creating a policy at Storage account level will enable the Subjects to access system containers, for example *$logs*. If this is undesired, first scan the data source(s) and then create finer-grained policies for each (that is, at container or subcontainer level).
@@ -69,9 +67,8 @@ Execute the steps in the [data-owner policy authoring tutorial](how-to-data-owne
6967

7068
### Known issues
7169

72-
> [!Warning]
73-
> **Known issues** related to Policy creation
74-
> - Do not create policy statements based on Azure Purview resource sets. Even if displayed in Azure Purview policy authoring UI, they are not yet enforced. Learn more about [resource sets](concept-resource-sets.md).
70+
**Known issues** related to Policy creation
71+
- Do not create policy statements based on Azure Purview resource sets. Even if displayed in Azure Purview policy authoring UI, they are not yet enforced. Learn more about [resource sets](concept-resource-sets.md).
7572

7673
### Policy action mapping
7774

0 commit comments

Comments
 (0)