Skip to content

Commit 542415d

Browse files
Merge pull request #4840 from HeidiSteen/heidist-build-3
updated prereq for ACL query time
2 parents 2f590df + 8faca31 commit 542415d

File tree

1 file changed

+10
-5
lines changed

1 file changed

+10
-5
lines changed

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,24 @@ titleSuffix: Azure AI Search
44
description: Learn how query-time ACL and RBAC enforcement ensures secure document retrieval in Azure AI Search for indexes containing permission filters from Azure Data Lake Storage (ADLS) Gen2 data sources.
55
ms.service: azure-ai-search
66
ms.topic: conceptual
7-
ms.date: 04/23/2025
7+
ms.date: 05/15/2025
88
author: mattgotteiner
99
ms.author: magottei
1010
---
1111

1212
# Query-Time ACL and RBAC enforcement in Azure AI Search
1313

14-
Query-time access control ensures that users only retrieve search results they're authorized to access, based on their identity, group memberships, roles, or attributes. This functionality is essential for secure enterprise search and compliance-driven workflows.
14+
Query-time access control ensures that users only retrieve search results they're authorized to access, based on their identity, group memberships, roles, or attributes. This functionality is essential for secure enterprise search and compliance-driven workflows.
1515

16-
## Requirements
17-
- Azure Data Lake Storage (ADLS) Gen2 data source configured ACLs and/or RBAC roles at container level, or permissions manually pushed into the index.
18-
- Configure document ACL and RBAC role functionality as required using Azure AI Search [built-in indexers](search-indexer-access-control-lists-and-role-based-access.md) or when indexing the documents [using the API directly](search-index-access-control-lists-and-rbac-push-api.md).
16+
## Requirements
1917

18+
- Permission metadata must be in `filterable` string fields.
19+
20+
- Permission metadata must consist of either POSIX-style permissions that identify the level of access and the group or user ID, or the resource ID of the container in ADLS Gen2 if you're using RBAC scope.
21+
22+
- For ADLS Gen2 data sources, you must have configured Access Control Lists (ACLs) and/or Azure role-based access control (RBAC) roles at the container level. You can use a [built-in indexer](search-indexer-access-control-lists-and-role-based-access.md) or [Push APIs](search-index-access-control-lists-and-rbac-push-api.md) to index permission metadata in your index.
23+
24+
- Use the 2025-05-01-preview REST API or a prerelease package of an Azure SDK to query the index.
2025

2126
## How query-time enforcement works
2227

0 commit comments

Comments
 (0)