Skip to content

Commit 0dfa8f5

Browse files
committed
Added screenshots and links
1 parent d2feb41 commit 0dfa8f5

File tree

4 files changed

+11
-9
lines changed

4 files changed

+11
-9
lines changed

articles/search/keyless-connections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use keyless connections with Azure AI Search
2+
title: Use keyless connections in search apps
33
description: Use keyless connections with an Azure Identity library for Microsoft Entra ID authentication and authorization with Azure AI Search.
44
ms.topic: how-to
55
ms.date: 10/30/2024
@@ -9,7 +9,7 @@ ms.custom: devx-track-dotnet, devx-track-extended-java, devx-track-js, devx-trac
99
#customer intent: As a developer, I want to use keyless connections so that I don't leak secrets.
1010
---
1111

12-
# Use Azure AI Search without keys
12+
# Connect your app to Azure AI Search using identities
1313

1414
In your application code, you can set up a keyless connection to Azure AI Search that uses Microsoft Entra ID and roles for authentication and authorization. Application requests to most Azure services must be authenticated with keys or keyless connections. Developers must be diligent to never expose the keys in an unsecure location. Anyone who gains access to the key is able to authenticate to the service. Keyless authentication offers improved management and security benefits over the account key because there's no key (or connection string) to store.
1515

126 KB
Loading
32.9 KB
Loading

articles/search/search-get-started-rbac.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart RBAC
2+
title: Quickstart keyless connection
33
titleSuffix: Azure AI Search
44
description: In this quickstart, learn how to switch from API keys to Microsoft Entra identities and role-based access control (RBAC).
55
author: HeidiSteen
@@ -12,9 +12,9 @@ ms.date: 11/26/2024
1212

1313
# Quickstart: Connect without keys
1414

15-
Configure Azure AI Search to use Microsoft Entra ID authentication and roles, including steps for connecting from your local system, running Jupyter notebooks, or using a REST client.
15+
Configure Azure AI Search to use Microsoft Entra ID authentication and roles. Connect from your local system, running Jupyter notebooks, or using a REST client.
1616

17-
If you step through other quickstarts that connect using API keys, these steps show you how to switch to identity-based authentication and avoid hard-coded API keys in your example code.
17+
If you stepped through other quickstarts that connect using API keys, this quickstart shows you how to switch to identity-based authentication so that you can avoid hard-coded API keys in your example code.
1818

1919
## Prerequisites
2020

@@ -36,6 +36,8 @@ This step is necessary if you have more than one subscription or tenant.
3636

3737
1. Select the subscription name to view the parent management group (tenant ID).
3838

39+
:::image type="content" source="media/search-security-rbac/select-subscription-name.png" lightbox="media/search-security-rbac/select-subscription-name.png" alt-text="Screenshot of the portal page providing the subscription name":::
40+
3941
1. Identify the active Azure subscription and tenant on your local device:
4042

4143
`az account show`
@@ -68,7 +70,7 @@ This step is necessary if you have more than one subscription or tenant.
6870

6971
1. Select **+ Add** > **Add role assignment**.
7072

71-
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity. These three roles provide the full set of permissions for creating, loading, and querying objects on Azure AI Search.
73+
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity. These three roles provide the full set of permissions for creating, loading, and querying objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
7274

7375
## Step 3: Connect from your local system
7476

@@ -133,9 +135,9 @@ Several quickstarts and tutorials use a REST client, such as Visual Studio Code
133135

134136
Configure a managed identity for outbound connections:
135137

136-
- Assign a system-assigned or user-assigned managed identity to your search service.
137-
- Use role assignments to authorize access to other Azure resources.
138+
- [Configure a system-assigned or user-assigned managed identity](search-howto-managed-identities-data-sources.md) for your search service.
139+
- [Use role assignments](keyless-connections.md) to authorize access to other Azure resources.
138140

139141
Network access configuration:
140142

141-
- Set up inbound rules to accept or reject requests to Azure AI Search based on IP address.
143+
- [Set inbound rules](service-configure-firewall.md) to accept or reject requests to Azure AI Search based on IP address.

0 commit comments

Comments
 (0)