Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Note
This article explains how to set access policies on business concepts including governance domains, data products, critical data elements, and glossary terms, and how to manage access requests. If you need to request access for yourself, see Request access to data products.
Access to a data product in Microsoft Purview Unified Catalog grants users permissions to the data product and permissions to the data assets within the data product. This article explains how you can manage access to your data products and set up a system to provide access to users who request it.
This article explains:
Permissions
- To view and manage policies at the governance ___domain level, you need governance ___domain owner permissions.
- To view and manage policies at the data product level, you need data product owner permissions.
- To view and manage policies in critical data elements or glossary terms, you need data steward permissions.
- Unified Catalog readers can view and request access to data products.
- Managers and privacy approvers of access requests also need to have a minimum of a catalog reader to be able to use the Unified Catalog and approve requests as part of the tiered approval.
Considerations
In this experience, request approvers must provide access to the individual data assets manually as part of the approval process, or specify an access provider to do so.
The product doesn't enforce policies such as attestations (including the no copy attestation). The data consumer attests that they'll follow these policies while requesting access.
Set up data product access policies
To build access policies, you usually need data product owner or data steward permissions.
Tip
Your data product needs to be in an unpublished state to manage access policies.
In the Microsoft Purview portal, open Unified Catalog.
Under Catalog management, select Data products, then select a data product.
On the data product's details page, select Manage policies. Here you can view and edit the default values assigned to the default set of data product access policies. The selected values affect what the data consumers see on their access request form and actions they need to take.
Under Permitted access, add your usage purposes, which are the authorized purposes for accessing and using the data product. Three purposes are provided by default. You can add more purposes and their descriptions, which the consumer can select in the request access form.
At Approval requirements, determine if manager approval or a privacy and compliance review is required.
Note
If you select these options, the access request form shows that a manager approver or a privacy and compliance review is required. The consumer’s manager in Microsoft Entra ID is notified for the first tier of approval. The privacy reviewer named by the consumer in the request form is notified for their approval. The request is first reviewed by manager, followed by the privacy reviewer, and then by the access request approvers for approval and granting of access. The optional access provider tier is last, if selected. The request status is final only when all configured levels of approval are complete.
Under the Approval requirements dropdown, in Access request approvers, select the users that need to approve the access request. The first approver to take action approves the request and proceeds to grant access to the data assets manually, records the status of access provisioned at each asset, and specifies data access instructions or comments to the data consumer. By default, data product owners are populated and you can add more approvers. You can also add Microsoft Entra ID groups or security groups as approvers. Approvers can see detailed status in the request view.
An optional tier called Access provider can be set explicitly to grant access to the data assets manually, record the status of access provisioned at each asset, and specify data access instructions or comments to the data consumer. This practice ensures the data consumer is aware of the next steps they can take to access and use the data.
Note
You can select a role group to grant approver status to all the users in a group at once. However, users who belong to nested groups within the role group aren't supported at this time.
Under Attestations, determine if copies of the data are permitted. The attestations are reflected on the access request form for the consumer to attest to.
If terms of use are present on a data product, those terms are also reflected on the access request form for the consumer to attest to.
Add any more attestations by selecting Add attestation and adding a display name and the file ___location. These attestations are reflected on the request access form for the consumer to attest to.
If there are policies inherited from the governance ___domain, critical data element, or glossary term, you can see them in the Inherited policies tab. See the following section in this document for details: Policies on governance domains and glossary terms (inherited policies).
Select Preview request form to see what users see when they request access.
Select Save changes to save the access policy for the governance ___domain.
Policies on governance domains, glossary terms, and critical data elements (inherited policies)
You can set policies on governance domains, glossary terms, and critical data elements. Data products in the governance ___domain, or data products that have glossary terms or critical data elements applied, inherit and aggregate these policies.
You can see the inherited policies in the data product manage policies view, in a separate tab called Inherited policies. You can see the aggregated view by selecting the Preview button. Your data consumers see this aggregated view when they request access.
For example, if you set a manager approval policy on a glossary term applied to the data product, the data product also requires manager approval. Any attestation set on a business concept (governance ___domain, data product, glossary term, or critical data element) is aggregated on the data product, and the data consumer attests to all required attestations when requesting access.
To build access policies on governance domains, glossary terms, or critical data elements, you need governance ___domain owner or data steward permissions.
- In the Microsoft Purview portal, open Unified Catalog.
- Select the Catalog management dropdown and select Governance domains.
- Select a governance ___domain.
- On the governance ___domain page, select Manage policies.
- Alternately on a glossary term or critical data element page, select Manage policies.
- From the Policy configuration window, you're able to create and manage relevant access policies.
Configure inherited policies
In the Manage policies window, you can view and manage the default set of access policies on each business concept. The selected values affect what the data consumers see on their access request form and actions they need to take.
Determine if manager approval is required. The data consumer’s manager, configured in Microsoft Entra ID, is notified as first tier of approval. If the request is approved, the request proceeds to the next tier.
Determine if copies of the data are permitted. This selection is reflected on the access request form for the consumer to attest to.
Add any more attestations you want by selecting Add attestation and adding a display name and the file ___location. These attestations are reflected on the request access form for the consumer to attest to.
View and manage access requests
To view access requests in Unified Catalog, follow these steps. When you select an access request, the Access Request flyout pane opens. It contains details about the request and its status. You see only requests for which you're an approver.
Select Catalog management, then select Requests.
In the status column of the governance ___domain table, sort by any domains that have open access requests.
Select the governance ___domain that you want to manage access requests for.
On the access requests tab, you see a list of the most recent access requests.
Select the access request you want to respond to.
View the details submitted by the consumer.
Select Approve or Deny.
If you're the last approver in the sequence of approvers (a data product access request approver or an explicit access provider), record the status of access provisioned at each asset and specify data access instructions or comments to the data consumer. This practice ensures the data consumer is aware of the next steps they can take to access and use the data.
The data consumer is notified once you respond to the request.
The requestor is notified via email and can also view the status on the Microsoft Purview Unified Catalog Discovery drop-down, Data products page, in the My data access tab.
Request statuses
- Pending: The request is sent to an approver for review.
- Declined: The request is denied by the approver.
- Approved: The request is approved, but provisioning work isn't yet completed to grant access to the requestor.
- Completed: The data asset is provisioned to grant access for the requestor. This request is now fully complete.
Respond to access requests through email notification
In the email you receive as a request to approve an access request, select the Approval request link.
You're brought to the request detail view in Requests page in Catalog management .
View the details submitted by the consumer.
Select Approve or Deny.
If you're the last approver in the sequence of approvers, a data product access request approver, or an explicit access provider, record the status of access provisioned at each asset and specify data access instructions or comments to the data consumer. This step ensures the data consumer is aware of the next steps they can take to access and use the data.
If you're the last approver in the sequence of approvers, and there are multiple data assets in the data product, you can record the status and save intermittently and mark the request as complete only when you're done with all the data assets.
The data consumer is notified once the request is responded to and in its final state.
The requestor is notified via email and can also view the status on the Microsoft Purview Unified Catalog Data product search page, in the My data access tab.
Sequential or tiered approvals and request statuses
As noted in the section to manage policies on data product, depending on the approver selections you make, a sequential or tiered approval is in effect. The following sequence is maintained for data product access request approvals.
If you select manager approval, the consumer’s manager in Microsoft Entra is notified for the first tier of approval.
Only after the manager approves the request, the privacy reviewer if selected is notified for their approval or can take action.
Once approved by the privacy reviewer, the access request approver is notified for approval and provisioning of access to the data assets in the data product. This tier approves and completes the request if there's no access provider specified, else they only approve.
If there's a last tier of access provider specified, then that tier provisions access to the data assets and records the status and instructions for data consumer. They complete the request. Complete is the final status.
The workflow proceeds until the last approval and completion occurs or the first denial occurs.
The data consumer is only notified after all approvers take their respective actions.
At any point the data consumer can see the status of the request in the Microsoft Purview Unified Catalog Discovery drop-down, Data products page, in the My data access tab.
A request status can go from pending to declined or pending to approved and then to completed.
Delete access requests
To revoke a user's access to a data product and the data assets within the data product, the request approver needs to complete both of the steps listed below.
Note
The only request approver who can remove access to a data product and delete an access request is the owner of that same data product. This data owner must also hold the Data Product Owner role.
Return to the individual data asset (such as in Azure Data Lake, Microsoft Fabric, or SQL) and manually remove the provisioning for the user.
Delete the request in Unified Catalog by following these steps:
- In Unified Catalog, select Catalog management, then select Requests.
- Select a governance ___domain, then select the name of the request you want to delete.
- On the Access Request flyout pane, select Delete.
If you remove the provisioning on the asset but don't delete the access request in Unified Catalog, the data product shows that the user's access is removed, but the user still has access to the underlying data assets.