You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[**Network security perimeter**](search-security-network-security-perimiter.md)| Service | Join a search service to a [network security perimeter](/azure/private-link/network-security-perimeter-concepts) to control network access to your search service. | The Azure portal and the [Network Security Perimeter APIs 2024-06-01-preview](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true). |
60
+
|[**Network security perimeter**](search-security-network-security-perimeter.md)| Service | Join a search service to a [network security perimeter](/azure/private-link/network-security-perimeter-concepts) to control network access to your search service. | The Azure portal and the [Network Security Perimeter APIs 2024-06-01-preview](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true). |
61
61
|[**Search service under a user-assigned managed identity**](search-howto-managed-identities-data-sources.md)| Service | Configures a search service to use a previously created user-assigned managed identity. |[Services - Update](/rest/api/searchmanagement/services/update?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true#identity), 2021-04-01-preview, or the latest preview version. We recommend using the latest preview version. |
Copy file name to clipboardExpand all lines: articles/search/search-howto-managed-identities-data-sources.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,17 +11,17 @@ ms.custom:
11
11
- ignite-2023
12
12
- build-2024
13
13
ms.topic: how-to
14
-
ms.date: 09/11/2024
14
+
ms.date: 11/22/2024
15
15
---
16
16
17
17
# Configure a search service to connect using a managed identity in Azure AI Search
18
18
19
19
> [!IMPORTANT]
20
-
> User-assigned managed identity assignment is in public preview under [Supplemental Terms of Use](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). The [Management preview REST API](/rest/api/searchmanagement/services/update?view=rest-searchmanagement-2024-03-01-preview&preserve-view=true#identity) provides user-assigned managed identity assignment for Azure AI Search. Support for a system-assigned managed identity is generally available.
20
+
> User-assigned managed identity assignment is in public preview under [Supplemental Terms of Use](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). The [Management preview REST API](/rest/api/searchmanagement/services/update?view=rest-searchmanagement-2024-03-01-preview&preserve-view=true#identity) provides user-assigned managed identity assignment for Azure AI Search. Support for a *system-assigned* managed identity is generally available.
21
21
22
22
You can use Microsoft Entra ID and role assignments for outbound connections from Azure AI Search to resources providing data, applied AI, or vectorization during indexing or queries.
23
23
24
-
To use roles on an outbound connection, first configure your search service to use either a [system-assigned or user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/overview) as the security principle for your search service in a Microsoft Entra tenant. Once you have a managed identity, you can assign roles for authorized access. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
24
+
To use roles on an outbound connection, first configure your search service to use either a [system-assigned or user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/overview) as the security principal for your search service in a Microsoft Entra tenant. Once you have a managed identity, you can assign roles for authorized access. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
25
25
26
26
## Prerequisites
27
27
@@ -201,7 +201,6 @@ You can use a preview Management REST API instead of the portal to assign a user
201
201
202
202
+ "userAssignedIdentities" includes the details of the user assigned managed identity. This identity [must already exist](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities) before you can specify it in the Update Service request.
203
203
204
-
205
204
---
206
205
207
206
## Assign a role
@@ -295,7 +294,11 @@ A debug session runs in the portal and takes a connection string when you start
A custom skill targets the endpoint of an Azure function or app hosting custom code. The endpoint is specified in the [custom skill definition](cognitive-search-custom-skill-web-api.md). The presence of the "authResourceId" tells the search service to connect using a managed identity, passing the application ID of the target function or app in the property.
297
+
A [custom skill](cognitive-search-custom-skill-web-api.md) targets the endpoint of an Azure function or app hosting custom code.
298
+
299
+
+`uri` is the endpoint of the function or app.
300
+
301
+
+`authResourceId` tells the search service to connect using a managed identity, passing the application ID of the target function or app in the property.
299
302
300
303
```json
301
304
{
@@ -312,7 +315,9 @@ A custom skill targets the endpoint of an Azure function or app hosting custom c
312
315
313
316
[**Azure OpenAI embedding skill**](cognitive-search-skill-azure-openai-embedding.md) and [**Azure OpenAI vectorizer:**](vector-search-how-to-configure-vectorizer.md)
314
317
315
-
An Azure OpenAI embedding skill and vectorizer in AI Search target the endpoint of an Azure OpenAI service hosting an embedding model. The endpoint is specified in the [Azure OpenAI embedding skill definition](cognitive-search-skill-azure-openai-embedding.md) and/or in the [Azure OpenAI vectorizer definition](vector-search-how-to-configure-vectorizer.md). The system-managed identity is used if configured and if the "apikey" and "authIdentity" are empty. The "authIdentity" property is used for user-assigned managed identity only.
318
+
An Azure OpenAI embedding skill and vectorizer in AI Search target the endpoint of an Azure OpenAI service hosting an embedding model. The endpoint is specified in the [Azure OpenAI embedding skill definition](cognitive-search-skill-azure-openai-embedding.md) and/or in the [Azure OpenAI vectorizer definition](vector-search-how-to-configure-vectorizer.md).
319
+
320
+
The system-managed identity is used automatically if `"apikey"` and `"authIdentity"` are empty, as demonstrated in the following example. The `"authIdentity"` property is used for user-assigned managed identity only.
316
321
317
322
**System-managed identity example:**
318
323
@@ -337,6 +342,8 @@ A custom skill targets the endpoint of an Azure function or app hosting custom c
337
342
}
338
343
```
339
344
345
+
Here's a [vectorizer example](vector-search-how-to-configure-vectorizer.md) configured for a system-assigned managed identity. A vectorizer is specified in a search index.
346
+
340
347
```json
341
348
"vectorizers": [
342
349
{
@@ -353,6 +360,8 @@ A custom skill targets the endpoint of an Azure function or app hosting custom c
353
360
354
361
**User-assigned managed identity example:**
355
362
363
+
A user-assigned managed identity is used if `"apiKey"` is empty and a valid `"authIdentity"` is provided.
@@ -378,6 +387,8 @@ A custom skill targets the endpoint of an Azure function or app hosting custom c
378
387
}
379
388
```
380
389
390
+
Here's a [vectorizer example](vector-search-how-to-configure-vectorizer.md) configured for a user-assigned managed identity. A vectorizer is specified in a search index.
391
+
381
392
```json
382
393
"vectorizers": [
383
394
{
@@ -398,11 +409,11 @@ A custom skill targets the endpoint of an Azure function or app hosting custom c
398
409
399
410
## Check for firewall access
400
411
401
-
If your Azure resource is behind a firewall, make sure there's an inbound rule that admits requests from your search service.
412
+
If your Azure resource is behind a firewall, make sure there's an inbound rule that admits requests from your search service and from the Azure portal.
402
413
403
414
+ For same-region connections to Azure Blob Storage or Azure Data Lake Storage Gen2, use a system managed identity and the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md). Optionally, you can configure a [resource instance rule](/azure/storage/common/storage-network-security#grant-access-from-azure-resource-instances) to admit requests.
404
415
405
-
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md) that admits requests from Search. See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for details.
416
+
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md) that admits requests from Azure AI Search. See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for details.
Copy file name to clipboardExpand all lines: articles/search/search-security-network-security-perimeter.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ You can add a search service to a network security perimeter in the Azure portal
45
45
46
46
Azure Network Security Perimeter allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and Azure SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules.
47
47
48
-
You can add Azure AI Search to a network security perimiter so that all indexing and query requests occur within the security boundary.
48
+
You can add Azure AI Search to a network security perimeter so that all indexing and query requests occur within the security boundary.
49
49
50
50
1. In the Azure portal, create or find the network security perimeter service for your subscription.
51
51
@@ -269,7 +269,7 @@ In order to test your connection through network security perimeter, you need ac
269
269
270
270
## View and manage network security perimeter configuration
271
271
272
-
You can use the [Network Security Perimiter Configuration REST APIs](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) to review and reconcile perimeter configurations.
272
+
You can use the [Network Security Perimeter Configuration REST APIs](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) to review and reconcile perimeter configurations.
273
273
274
274
Be sure to use preview API version `2024-06-01-preview`. [Learn how to call the Management REST APIs](search-manage-rest.md).
|[**Network security perimeter**](search-security-network-security-perimiter.md)| Security | Join a search service to a [network security perimeter](/azure/private-link/network-security-perimeter-concepts) to control network access to your search service. The Azure portal and the Management REST APIs in the [2024-06-01-preview](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) can be used to view and reconcile network security perimeter configurations. |
27
+
|[**Network security perimeter**](search-security-network-security-perimeter.md)| Security | Join a search service to a [network security perimeter](/azure/private-link/network-security-perimeter-concepts) to control network access to your search service. The Azure portal and the Management REST APIs in the [2024-06-01-preview](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) can be used to view and reconcile network security perimeter configurations. |
28
28
|[**Shared private link support for Azure AI service connections**](search-indexer-howto-access-private.md)| Security | Connections to Azure AI for built-in skills processing can now be private using a shared private link on the connection. |
29
29
|[**Rescoring options for compressed vectors**](/azure/search/vector-search-how-to-quantization?tabs=2024-11-01-preview%2Cquery-2024-07-01#add-compressions-to-a-search-index)| Relevance | You can set options to rescore with original vectors instead of compressed vectors. Applies to HNSW and exhaustive KNN vector algorithms, using binary and scalar compression. Available in the [Create or Update Index (2024-11-01-preview)](/rest/api/searchservice/indexes/create-or-update?view=rest-searchservice-2024-09-01-preview&preserve-view=true), the Azure portal, and in the Azure SDK beta packages that provide this feature. |
30
30
|[**Store fewer vector instances**](vector-search-how-to-storage-options.md)| vector search | In vector compression scenarios, you can omit storage of full precision vectors if you don't need them for rescoring. Available in the [Create or Update Index (2024-11-01-preview)](/rest/api/searchservice/indexes/create-or-update?view=rest-searchservice-2024-09-01-preview&preserve-view=true), the Azure portal, and in the Azure SDK beta packages that provide this feature. |
0 commit comments