You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-query-access-control-rbac-enforcement.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,19 +53,20 @@ The security filter efficiently matches the userIds, groupIds, and rbacScope fro
53
53
54
54
## Limitations
55
55
56
-
- If ACL evaluation fails (for example, Graph API is unavailable), the service returns **5xx** and does **not** return a partially filtered result set.
56
+
- If ACL evaluation fails (for example, the Graph API is unavailable), the service returns **5xx** and does **not** return a partially filtered result set.
57
+
57
58
- Document visibility requires both:
58
-
- the calling application’s RBAC role (Authorization header), and
59
-
- the user identity carried by **x-ms-query-source-authorization**.
59
+
- the calling application’s RBAC role (Authorization header)
60
+
- the user identity carried by **x-ms-query-source-authorization**
60
61
61
62
## Query example
62
63
63
-
Here's an example of a query request from [sample code](https://github.com/Azure-Samples/azure-search-rest-samples/tree/main/Quickstart-ACL). The query token is passed in the request header.
64
+
Here's an example of a query request from [sample code](https://github.com/Azure-Samples/azure-search-rest-samples/tree/main/Quickstart-ACL). The query token is passed in the request header. THe query token is the personal access token of a user or a group identity.
64
65
65
66
```http
66
67
POST {{endpoint}}/indexes/stateparks/docs/search?api-version=2025-05-01-preview
67
-
Authorization: Bearer {{search-token}}
68
-
x-ms-query-source-authorization: {{search-token}}
68
+
Authorization: Bearer {{query-token}}
69
+
x-ms-query-source-authorization: {{query-token}}
69
70
Content-Type: application/json
70
71
71
72
{
@@ -77,6 +78,10 @@ Content-Type: application/json
77
78
78
79
## Related content
79
80
80
-
-[Tutorial: Index ADLS Gen2 permission metadata](tutorial-adls-gen2-indexer-acls.md) provides a detailed walkthrough of how to set up an index with ACLs using Azure Search indexers.
81
+
-[Tutorial: Index ADLS Gen2 permission metadata](tutorial-adls-gen2-indexer-acls.md)
82
+
83
+
-[Indexing ACLs and RBAC using the push API in Azure AI Search](search-index-access-control-lists-and-rbac-push-api.md)
84
+
85
+
-[Use an ADLS Gen2 indexer to ingest permission metadata and filter search results based on user access rights](search-indexer-access-control-lists-and-role-based-access.md)
81
86
82
-
-[Indexing ACLs and RBAC using Push API in Azure AI Search](search-index-access-control-lists-and-rbac-push-api.md) provides a walkthrough of how to set up an index with ACLs using the push indexing approach with the REST APIs.
87
+
-[Use a Blob indexer to ingest RBAC scopes metadata](search-blob-indexer-role-based-access)
Copy file name to clipboardExpand all lines: articles/search/tutorial-adls-gen2-indexer-acls.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ For demo purposes, the permission field has `retrievable` enabled so that you ca
131
131
132
132
## Create a data source
133
133
134
-
Modify [data source configuration](search-indexer-access-control-lists-and-role-based-access.md#configure-the-data-source) to specify indexer permission ingestion and the types of permission metadata that you want to index.
134
+
Modify [data source configuration](search-indexer-access-control-lists-and-role-based-access.md#create-the-data-source) to specify indexer permission ingestion and the types of permission metadata that you want to index.
0 commit comments