Skip to content

Commit 1054f2d

Browse files
committed
role permission correction
1 parent d43b405 commit 1054f2d

File tree

5 files changed

+4
-6
lines changed

5 files changed

+4
-6
lines changed

articles/search/keyless-connections.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -223,8 +223,7 @@ Local development using roles includes these steps:
223223
As a local developer, your Azure identity needs full control over data plane operations. These are the suggested roles:
224224

225225
- Search Service Contributor, create and manage objects
226-
- Search Index Data Contributor, load an index
227-
- Search Index Data Reader, query an index
226+
- Search Index Data Contributor, load and query an index
228227

229228
Find your personal identity with one of the following tools. Use that identity as the `<identity-id>` value.
230229

articles/search/search-get-started-rag.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ Azure OpenAI is receiving the (query) "Can you recommend a few hotels" from your
6363

6464
1. On Azure AI Search, make sure you have permissions to create, load, and query a search index:
6565

66-
- **Search Index Data Reader**
6766
- **Search Index Data Contributor**
6867
- **Search Service Contributor**
6968

articles/search/search-security-enable-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The default failure mode for unauthorized requests is `http401WithBearerChalleng
5151
| Role-based access control | Requires membership in a role assignment to complete the task. It also requires an authorization header on the request. |
5252
| Both | Requests are valid using either an API key or role-based access control, but if you provide both in the same request, the API key is used. |
5353

54-
1. As an administrator, if you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to your user account to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need all three roles if you want equivalent access.
54+
1. As an administrator, if you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to your user account to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need the first two roles if you want equivalent access.
5555

5656
Sometimes it can take five to ten minutes for role assignments to take effect. Until that happens, the following message appears in the Azure portal pages used for data plane operations.
5757

articles/search/search-security-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Combine these roles to get sufficient permissions for your use case.
8787
|View resource properties/metrics/endpoint ||||||
8888
|List all objects on the resource ||||||
8989
|Access quotas and service statistics ||||||
90-
|Read/query an index ||||||
90+
|Read/query an index ||||||
9191
|Upload data for indexing ||||||
9292
|Create or edit indexes/aliases ||||||
9393
|Create, edit and run indexers/data sources/skillsets ||||||

articles/search/service-configure-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ The trusted services are used for vectorization workloads: generating vectors fr
160160
1. On the **Roles** page:
161161

162162
+ Select **Search Index Data Contributor** to load a search index with vectors generated by an embedding model. Choose this role if you intend to use integrated vectorization during indexing.
163-
+ Or, select **Search Index Data Reader** to provide queries with a vector generated by an embedding model. The embedding used in a query isn't written to an index, so no write permissions are required.
163+
+ Or, select **Search Index Data Reader** to provide queries containing a vector generated by an embedding model at query time. The embedding used in a query isn't written to an index, so no write permissions are required.
164164

165165
1. Select **Next**.
166166
1. On the **Members** page, select **Managed identity** and **Select members**.

0 commit comments

Comments
 (0)