You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/text-to-speech-avatar/what-is-text-to-speech-avatar.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,11 +69,11 @@ Sample code for text to speech avatar is available on [GitHub](https://github.co
69
69
70
70
- Throughout an avatar real-time session or batch content creation, the text-to-speech, speech-to-text, Azure OpenAI, or other Azure services are charged separately.
71
71
- Refer to [text to speech avatar pricing note](../text-to-speech.md#text-to-speech-avatar) to learn how billing works for the text-to-speech avatar feature.
72
-
- For the detailed pricing, see [Speech service pricing](https://azure.microsoft.com/pricing/details/cognitive-services/speech-services/). Note that avatar pricing will only be visible for service regions where the feature is available, including Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, and West US 2.
72
+
- For the detailed pricing, see [Speech service pricing](https://azure.microsoft.com/pricing/details/cognitive-services/speech-services/). Note that avatar pricing will only be visible for service regions where the feature is available, including Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, East US 2, and West US 2.
73
73
74
74
## Available locations
75
75
76
-
The text to speech avatar feature is only available in the following service regions: Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, and West US 2.
76
+
The text to speech avatar feature is only available in the following service regions: Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, East US 2, and West US 2.
Local development without keyless includes these steps:
215
+
Local development using roles includes these steps:
218
216
219
-
- Assign your personal identity with RBAC roles on the specific resource.
220
-
- Use a tool to authenticate with Azure.
217
+
- Assign your personal identity to RBAC roles on the specific resource.
218
+
- Use a tool like the Azure CLI or Azure PowerShell to authenticate with Azure.
221
219
- Establish environment variables for your resource.
222
220
223
221
### Roles for local development
224
222
225
-
As a local developer, your Azure identity needs full control of your service. This control is provided with RBAC roles. To manage your resource during development, these are the suggested roles:
223
+
As a local developer, your Azure identity needs full control over data plane operations. These are the suggested roles:
226
224
227
-
- Search Service Contributor
228
-
- Search Index Data Contributor
229
-
- Search Index Data Reader
225
+
- Search Service Contributor, create and manage objects
226
+
- Search Index Data Contributor, load an index
227
+
- Search Index Data Reader, query an index
230
228
231
229
Find your personal identity with one of the following tools. Use that identity as the `<identity-id>` value.
232
230
@@ -253,7 +251,7 @@ Find your personal identity with one of the following tools. Use that identity a
Copy file name to clipboardExpand all lines: articles/search/search-security-api-keys.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: azure-ai-search
10
10
ms.custom:
11
11
- ignite-2023
12
12
ms.topic: how-to
13
-
ms.date: 06/28/2024
13
+
ms.date: 10/30/2024
14
14
---
15
15
16
16
# Connect to Azure AI Search using keys
@@ -245,7 +245,7 @@ It's not possible to use [customer-managed key encryption](search-security-manag
245
245
246
246
+ Always check code, samples, and training material before publishing to make sure you didn't leave valid API keys behind.
247
247
248
-
+ For production workloads, switch to [Microsoft Entra ID and role-based access](search-security-rbac.md). Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
248
+
+ For production workloads, switch to [Microsoft Entra ID and role-based access](keyless-connections.md). Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
Copy file name to clipboardExpand all lines: articles/search/search-security-enable-roles.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,20 +8,18 @@ author: HeidiSteen
8
8
ms.author: heidist
9
9
ms.service: azure-ai-search
10
10
ms.topic: how-to
11
-
ms.date: 06/18/2024
11
+
ms.date: 10/30/2024
12
12
13
13
---
14
14
15
15
# Enable or disable role-based access control in Azure AI Search
16
16
17
-
Before you can assign roles for authorized access to Azure AI Search, enable role-based access control on your search service.
17
+
Azure AI Search uses [key-based authentication](search-security-api-keys.md) by default, but it fully supports Microsoft Entra ID authentication and authorization for all control plane and data plane operations through Azure role-based access control (RBAC).
18
18
19
-
Role-based access for data plane operations is optional, but recommended as the more secure option. The alternative is [key-based authentication](search-security-api-keys.md), which is the default.
20
-
21
-
Roles for service administration (control plane) are built in and can't be enabled or disabled.
19
+
Before you can assign roles for authorized data plane access to Azure AI Search, you must enable role-based access control on your search service. Roles for service administration (control plane) are built in and can't be enabled or disabled.
22
20
23
21
> [!NOTE]
24
-
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search REST API](/rest/api/searchservice/) or equivalent Azure SDK client libraries.
22
+
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search Service REST APIs](/rest/api/searchservice/) or equivalent Azure SDK client libraries. *Control plane* refers to Azure resource management, such as creating or configuring a search service.
25
23
26
24
## Prerequisites
27
25
@@ -223,13 +221,11 @@ To re-enable key authentication, set "disableLocalAuth" to false. The search ser
223
221
224
222
---
225
223
226
-
## Limitations
227
-
228
-
+ Role-based access control can increase the latency of some requests. Each unique combination of service resource (index, indexer, etc.) and service principal triggers an authorization check. These authorization checks can add up to 200 milliseconds of latency per request.
224
+
## Effects of role-based access control
229
225
230
-
+ In rare cases where requests originate from a high number of different service principals, all targeting different service resources (indexes, indexers, etc.), it's possible for the authorization checks to result in throttling. Throttling would only happen if hundreds of unique combinations of search service resource and service principal were used within a second.
226
+
+ Role-based access control can increase the latency of some requests. Each unique combination of service resource (index, indexer, skillsets and so forth) and service principal triggers an authorization check. These authorization checks can add up to 200 milliseconds of latency per request.
231
227
232
-
---
228
+
+ In rare cases where requests originate from a high number of different service principals, all targeting different service resources (indexes, indexers, and so forth), it's possible for the authorization checks to result in throttling. Throttling would only happen if hundreds of unique combinations of search service resource and service principal were used within a second.
0 commit comments