Skip to content

Commit 54f4824

Browse files
authored
Merge pull request #1237 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 11/4
2 parents 456256b + 2d08255 commit 54f4824

File tree

8 files changed

+115
-89
lines changed

8 files changed

+115
-89
lines changed

articles/ai-services/speech-service/regions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The following regions are supported for Speech service features such as speech t
5454
| Qatar | Qatar Central | `qatarcentral`<sup>3,8</sup> |
5555
| US | Central US | `centralus` |
5656
| US | East US | `eastus` <sup>1,2,4,5,7,9,11,12</sup> |
57-
| US | East US 2 | `eastus2` <sup>1,2,4,5,12</sup> |
57+
| US | East US 2 | `eastus2` <sup>1,2,4,5,10,12</sup> |
5858
| US | North Central US | `northcentralus` <sup>4,6,12</sup> |
5959
| US | South Central US | `southcentralus` <sup>1,2,4,5,6,7,10,12</sup> |
6060
| US | West Central US | `westcentralus` <sup>3,5</sup> |

articles/ai-services/speech-service/text-to-speech-avatar/what-is-text-to-speech-avatar.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,11 +69,11 @@ Sample code for text to speech avatar is available on [GitHub](https://github.co
6969

7070
- Throughout an avatar real-time session or batch content creation, the text-to-speech, speech-to-text, Azure OpenAI, or other Azure services are charged separately.
7171
- Refer to [text to speech avatar pricing note](../text-to-speech.md#text-to-speech-avatar) to learn how billing works for the text-to-speech avatar feature.
72-
- For the detailed pricing, see [Speech service pricing](https://azure.microsoft.com/pricing/details/cognitive-services/speech-services/). Note that avatar pricing will only be visible for service regions where the feature is available, including Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, and West US 2.
72+
- For the detailed pricing, see [Speech service pricing](https://azure.microsoft.com/pricing/details/cognitive-services/speech-services/). Note that avatar pricing will only be visible for service regions where the feature is available, including Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, East US 2, and West US 2.
7373

7474
## Available locations
7575

76-
The text to speech avatar feature is only available in the following service regions: Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, and West US 2.
76+
The text to speech avatar feature is only available in the following service regions: Southeast Asia, North Europe, West Europe, Sweden Central, South Central US, East US 2, and West US 2.
7777

7878
### Responsible AI
7979

articles/search/keyless-connections.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Use keyless connections with Azure AI Search
3-
description: Use keyless connections with an Azure Identity library for authentication and authorization with Azure AI Search.
3+
description: Use keyless connections with an Azure Identity library for Microsoft Entra ID authentication and authorization with Azure AI Search.
44
ms.topic: how-to
5-
ms.date: 06/05/2024
5+
ms.date: 10/30/2024
66
author: HeidiSteen
77
ms.author: heidist
8-
ms.reviewer: scaddie
98
ms.custom: devx-track-dotnet, devx-track-extended-java, devx-track-js, devx-track-python, Keyless-dotnet, Keyless-java, Keyless-js, Keyless-python, build-2024-intelligent-apps
109
#customer intent: As a developer, I want to use keyless connections so that I don't leak secrets.
1110
---
@@ -34,7 +33,7 @@ Before continuing with this article, you need an Azure AI Search resource to wor
3433

3534
### Install Azure Identity client library
3635

37-
Before working locally without keyless, update your AI Search enabled code with the Azure Identity client library.
36+
To use a keyless approach, update your AI Search enabled code with the Azure Identity client library.
3837

3938
#### [.NET](#tab/csharp)
4039

@@ -211,22 +210,21 @@ search_index_client = SearchIndexClient(
211210

212211
---
213212

214-
215213
## Local development
216214

217-
Local development without keyless includes these steps:
215+
Local development using roles includes these steps:
218216

219-
- Assign your personal identity with RBAC roles on the specific resource.
220-
- Use a tool to authenticate with Azure.
217+
- Assign your personal identity to RBAC roles on the specific resource.
218+
- Use a tool like the Azure CLI or Azure PowerShell to authenticate with Azure.
221219
- Establish environment variables for your resource.
222220

223221
### Roles for local development
224222

225-
As a local developer, your Azure identity needs full control of your service. This control is provided with RBAC roles. To manage your resource during development, these are the suggested roles:
223+
As a local developer, your Azure identity needs full control over data plane operations. These are the suggested roles:
226224

227-
- Search Service Contributor
228-
- Search Index Data Contributor
229-
- Search Index Data Reader
225+
- Search Service Contributor, create and manage objects
226+
- Search Index Data Contributor, load an index
227+
- Search Index Data Reader, query an index
230228

231229
Find your personal identity with one of the following tools. Use that identity as the `<identity-id>` value.
232230

@@ -253,7 +251,7 @@ Find your personal identity with one of the following tools. Use that identity a
253251
--assignee "<identity-id>" \
254252
--scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>"
255253
```
256-
254+
257255
#### [Azure PowerShell](#tab/azure-powershell)
258256
259257
1. Sign in with PowerShell.
@@ -277,13 +275,12 @@ Find your personal identity with one of the following tools. Use that identity a
277275
#### [Azure portal](#tab/portal)
278276
279277
1. Use the steps found here: [find the user object ID](/partner-center/find-ids-and-domain-names#find-the-user-object-id) in the Azure portal.
280-
281-
2. Use the steps found at [open the Add role assignment page](search-security-rbac.md) in the Azure portal.
282-
278+
279+
1. Use the steps found at [open the Add role assignment page](search-security-rbac.md) in the Azure portal.
280+
283281
---
284-
285-
Where applicable, replace `<identity-id>`, `<subscription-id>`, and `<resource-group-name>` with your actual values.
286282
283+
Where applicable, replace `<identity-id>`, `<subscription-id>`, and `<resource-group-name>` with your actual values.
287284
288285
### Authentication for local development
289286
136 KB
Loading

articles/search/search-security-api-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-ai-search
1010
ms.custom:
1111
- ignite-2023
1212
ms.topic: how-to
13-
ms.date: 06/28/2024
13+
ms.date: 10/30/2024
1414
---
1515

1616
# Connect to Azure AI Search using keys
@@ -245,7 +245,7 @@ It's not possible to use [customer-managed key encryption](search-security-manag
245245

246246
+ Always check code, samples, and training material before publishing to make sure you didn't leave valid API keys behind.
247247

248-
+ For production workloads, switch to [Microsoft Entra ID and role-based access](search-security-rbac.md). Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
248+
+ For production workloads, switch to [Microsoft Entra ID and role-based access](keyless-connections.md). Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
249249

250250
## See also
251251

articles/search/search-security-enable-roles.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,20 +8,18 @@ author: HeidiSteen
88
ms.author: heidist
99
ms.service: azure-ai-search
1010
ms.topic: how-to
11-
ms.date: 06/18/2024
11+
ms.date: 10/30/2024
1212

1313
---
1414

1515
# Enable or disable role-based access control in Azure AI Search
1616

17-
Before you can assign roles for authorized access to Azure AI Search, enable role-based access control on your search service.
17+
Azure AI Search uses [key-based authentication](search-security-api-keys.md) by default, but it fully supports Microsoft Entra ID authentication and authorization for all control plane and data plane operations through Azure role-based access control (RBAC).
1818

19-
Role-based access for data plane operations is optional, but recommended as the more secure option. The alternative is [key-based authentication](search-security-api-keys.md), which is the default.
20-
21-
Roles for service administration (control plane) are built in and can't be enabled or disabled.
19+
Before you can assign roles for authorized data plane access to Azure AI Search, you must enable role-based access control on your search service. Roles for service administration (control plane) are built in and can't be enabled or disabled.
2220

2321
> [!NOTE]
24-
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search REST API](/rest/api/searchservice/) or equivalent Azure SDK client libraries.
22+
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search Service REST APIs](/rest/api/searchservice/) or equivalent Azure SDK client libraries. *Control plane* refers to Azure resource management, such as creating or configuring a search service.
2523
2624
## Prerequisites
2725

@@ -223,13 +221,11 @@ To re-enable key authentication, set "disableLocalAuth" to false. The search ser
223221
224222
---
225223
226-
## Limitations
227-
228-
+ Role-based access control can increase the latency of some requests. Each unique combination of service resource (index, indexer, etc.) and service principal triggers an authorization check. These authorization checks can add up to 200 milliseconds of latency per request.
224+
## Effects of role-based access control
229225
230-
+ In rare cases where requests originate from a high number of different service principals, all targeting different service resources (indexes, indexers, etc.), it's possible for the authorization checks to result in throttling. Throttling would only happen if hundreds of unique combinations of search service resource and service principal were used within a second.
226+
+ Role-based access control can increase the latency of some requests. Each unique combination of service resource (index, indexer, skillsets and so forth) and service principal triggers an authorization check. These authorization checks can add up to 200 milliseconds of latency per request.
231227
232-
---
228+
+ In rare cases where requests originate from a high number of different service principals, all targeting different service resources (indexes, indexers, and so forth), it's possible for the authorization checks to result in throttling. Throttling would only happen if hundreds of unique combinations of search service resource and service principal were used within a second.
233229
234230
## Next steps
235231

articles/search/search-security-get-encryption-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-ai-search
1010
ms.custom:
1111
- ignite-2023
1212
ms.topic: conceptual
13-
ms.date: 02/16/2024
13+
ms.date: 10/30/2024
1414
---
1515

1616
# Find encrypted objects and information

0 commit comments

Comments
 (0)