Skip to content

Commit 46068bf

Browse files
Update and rename search-query-acls-rbac-enforcement.md to search-query-access-control-rbac-enforcement.md
1 parent 5d1d226 commit 46068bf

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

articles/search/search-query-acls-rbac-enforcement.md renamed to articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,28 +22,26 @@ Query-time access control ensures that users only retrieve search results they'r
2222

2323
This section lists the order of operations for ACL enforcement at query time.
2424

25-
### 1. User Permissions Input
25+
### 1. User permissions input
2626
The end-user application sends user permission as part of the search query request. The following table lists the source of the user permissions Azure AI Search uses for ACL enforcement:
2727

28-
| Permission Type | Source |
28+
| Permission type | Source |
2929
| - | - |
3030
| userIds | `oid` from `x-ms-query-source-authorization` token |
3131
| groupIds | Group membership fetched using the [Microsoft Graph](/graph/api/resources/groups-overview) API |
3232
| rbacScope | Permissions the user from `x-ms-query-source-authorization` has on a storage container |
3333

34-
### 2. Security Filter Construction
34+
### 2. Security filter construction
3535
Azure AI Search dynamically constructs security filters based on the user permissions provided. These security filters are automatically appended to any filters that might come in with the query if the index has the permission filter option enabled.
3636

37-
### 3. Results Filtering
37+
### 3. Results filtering
3838
The security filter efficiently matches the userIds, groupIds, and rbacScope from the user against each list of ACLs in every document in the search index to limit the results returned to ones the user has access to. It's important to note that each filter is applied independently and a document is considered authorized if any filter succeeds. For example, if a user has access to a document through userIds but not through groupIds, the document is still considered valid and returned to the user.
3939

40-
---
41-
4240
## Limitations
4341
- If ACL evaluation fails (for example, Graph API is unavailable), the service returns **5xx** and does **not** return a partially filtered result set.
44-
- Document visibility requires both:
45-
1) the calling application’s RBAC role (Authorization header), and
46-
2) the user identity carried by **x-ms-query-source-authorization**.
42+
- Document visibility requires both:
43+
- the calling application’s RBAC role (Authorization header), and
44+
- the user identity carried by **x-ms-query-source-authorization**.
4745

4846
## Next steps
4947
* [How to Index Permission Information](tutorial-adls-gen2-indexer-acls.md) provides a detailed walkthrough of how to set up an index with ACLs using Azure Search indexers.

0 commit comments

Comments
 (0)