Skip to content

Commit 4f066ac

Browse files
committed
corrections to keyless auth
1 parent 18e820e commit 4f066ac

File tree

1 file changed

+17
-7
lines changed

1 file changed

+17
-7
lines changed

articles/search/search-get-started-rbac.md

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: heidist
77
ms.service: azure-ai-search
88

99
ms.topic: quickstart
10-
ms.date: 11/26/2024
10+
ms.date: 11/28/2024
1111
---
1212

1313
# Quickstart: Connect without keys
@@ -24,13 +24,13 @@ If you stepped through other quickstarts that connect using API keys, this quick
2424

2525
- A command line tool, such as the [Azure CLI](/cli/azure/install-azure-cli).
2626

27-
## Step 1: Set up your Azure subscription and tenant
27+
## Step 1: Get your Azure subscription and tenant IDs
2828

2929
This step is necessary if you have more than one subscription or tenant.
3030

3131
1. Get the Azure subscription and tenant for your search service:
3232

33-
1. Sign into the Azure portal and navigate to your search service.
33+
1. Sign into the [Azure portal](https://portal.azure.com) and navigate to your search service.
3434

3535
1. Notice the subscription name and ID in **Overview** > **Essentials**.
3636

@@ -42,7 +42,7 @@ This step is necessary if you have more than one subscription or tenant.
4242

4343
`az account show`
4444

45-
1. Set your Azure subscription to the subscription and tenant:
45+
1. Set your Azure subscription to the subscription and tenant, and sign in to Azure.
4646

4747
`az account set --subscription <your-subscription-id>`
4848

@@ -54,13 +54,15 @@ This step is necessary if you have more than one subscription or tenant.
5454

5555
## Step 2: Configure Azure AI Search for Microsoft Entra ID authentication
5656

57-
1. Sign in to the Azure portal and navigate to your Azure AI Search service.
57+
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to your Azure AI Search service.
5858

5959
1. Enable role-based access control (RBAC):
6060

6161
1. Go to **Settings** > **Keys**.
6262

63-
1. Choose **Role-based control** or **Both** if you need time to transition clients to role-based access control1.
63+
1. Choose **Role-based control** or **Both** if you need time to transition clients to role-based access control.
64+
65+
If you choose **Role-based control**, make sure that you assign yourself all roles named in the next instruction or you won't be able to complete tasks in the portal or through a local client.
6466

6567
1. Assign roles in the Azure portal:
6668

@@ -72,8 +74,13 @@ This step is necessary if you have more than one subscription or tenant.
7274

7375
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity. These three roles provide the full set of permissions for creating, loading, and querying objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
7476

77+
> [!TIP]
78+
> Later, if you get authentication failure errors, recheck the settings in this section. There could be policies set at the subcription or resource group level that enforce specific security settings.
79+
7580
## Step 3: Connect from your local system
7681

82+
If you didn't sign in to Azure with an `az login` command, do so now.
83+
7784
### Using Python and Jupyter notebooks
7885

7986
1. Install the Azure Identity and Azure Search libraries:
@@ -105,7 +112,7 @@ Several quickstarts and tutorials use a REST client, such as Visual Studio Code
105112

106113
1. Get a personal identity token:
107114

108-
`az account get-access-token --resource https://<your-search-service-name>.search.windows.net`
115+
`az account get-access-token --scope https://search.azure.com/.default`
109116

110117
1. Extract the token from the output:
111118

@@ -131,6 +138,9 @@ Several quickstarts and tutorials use a REST client, such as Visual Studio Code
131138
}
132139
```
133140

141+
> [!TIP]
142+
> If the exercise fails at step one, try connecting through a VPN and then retry the step.
143+
134144
## Additional configuration
135145

136146
Configure a managed identity for outbound connections:

0 commit comments

Comments
 (0)