You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-get-started-rbac.md
+13-9Lines changed: 13 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.date: 11/28/2024
12
12
13
13
# Quickstart: Connect without keys
14
14
15
-
Configure Azure AI Search to use Microsoft Entra ID authentication and roles. Connect from your local system, running Jupyter notebooks, or using a REST client.
15
+
Configure Azure AI Search to use Microsoft Entra ID authentication and role-based access control (RBAC). Connect from your local system using your personal identity, using Jupyter notebooks or a REST client to interact with your search service.
16
16
17
-
If you stepped through other quickstarts that connect using API keys, this quickstart shows you how to switch to identity-based authentication so that you can avoid hard-coded API keys in your example code.
17
+
If you stepped through other quickstarts that connect using API keys, this quickstart shows you how to switch to identity-based authentication so that you can avoid hard-coded keys in your example code.
18
18
19
19
## Prerequisites
20
20
@@ -34,25 +34,25 @@ This step is necessary if you have more than one subscription or tenant.
34
34
35
35
1. Notice the subscription name and ID in **Overview** > **Essentials**.
36
36
37
-
1. Select the subscription name to view the parent management group (tenant ID).
37
+
1. Select the subscription name to confirm the parent management group (tenant ID).
38
38
39
39
:::image type="content" source="media/search-get-started-rbac/select-subscription-name.png" lightbox="media/search-get-started-rbac/select-subscription-name.png" alt-text="Screenshot of the portal page providing the subscription name":::
40
40
41
41
1. Identify the active Azure subscription and tenant on your local device:
42
42
43
43
`az account show`
44
44
45
-
1.Set your Azure subscription to the subscription and tenant, and sign in to Azure.
45
+
1.If the active subscription is different from the one used by Azure AI Search, change the subscription ID. Next, sign in to Azure using the same tenant ID as Azure AI Search.
46
46
47
47
`az account set --subscription <your-subscription-id>`
48
48
49
49
`az login --tenant <your-tenant-id>`
50
50
51
-
1.Check your tenant ID:
51
+
1.Verify your tenant ID.
52
52
53
53
`az account show --query tenantId --output tsv`
54
54
55
-
## Step 2: Configure Azure AI Search for Microsoft Entra ID authentication
55
+
## Step 2: Configure Azure AI Search for RBAC
56
56
57
57
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to your Azure AI Search service.
58
58
@@ -72,14 +72,18 @@ This step is necessary if you have more than one subscription or tenant.
72
72
73
73
1. Select **+ Add** > **Add role assignment**.
74
74
75
-
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity. These three roles provide the full set of permissions for creating, loading, and querying objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
75
+
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity.
76
+
77
+
Repeat for each role.
78
+
79
+
You need all three roles for creating, loading, and querying objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
76
80
77
81
> [!TIP]
78
-
> Later, if you get authentication failure errors, recheck the settings in this section. There could be policies set at the subcription or resource group level that enforce specific security settings.
82
+
> Later, if you get authentication failure errors, recheck the settings in this section. There could be policies at the subscription or resource group level that override any API settings you specify.
79
83
80
84
## Step 3: Connect from your local system
81
85
82
-
If you didn't sign in to Azurewith an `az login` command, do so now.
86
+
If you haven't yet signed in to Azure, do so now with an `az login` command.
0 commit comments