Skip to content

Commit 60c71df

Browse files
committed
Revised TOC
1 parent cccd07e commit 60c71df

File tree

2 files changed

+13
-14
lines changed

2 files changed

+13
-14
lines changed

articles/search/search-document-level-access-overview.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,28 +20,25 @@ Azure AI Search supports document-level access control, enabling organizations t
2020
| Approach | Description |
2121
|----------|-------------|
2222
| Security filters | String comparison. Your application passes in a user or group identity as a string, which populates a filter on a query, excluding any documents that don't match on the string. <br><br>Security filters are a technique for achieving document-level access control. This approach isn't bound to an API so you can use any version or package. |
23-
| ACLs (preview) | Microsoft Entra ID security principal behind the query token is compared to the permission metadata of documents returned in search results, excluding any documents that don't match on permissions. |
24-
25-
> [!NOTE]
26-
> Built-in access control list (ACL) support for principals is in preview, available in REST APIs and prerelease Azure SDK packages that provide the feature.
23+
| ACLs (preview) | Microsoft Entra ID security principal behind the query token is compared to the permission metadata of documents returned in search results, excluding any documents that don't match on permissions. <br><br>Built-in access control list (ACL) support for principals is in preview, available in REST APIs and prerelease Azure SDK packages that provide the feature. |
2724

2825
## Pattern for security trimming using filters
2926

30-
For scenarios where native ACL integration isn't viable, we recommend security filters for trimming results based on exclusion criteria that includes identity tokens. The pattern includes the following components:
27+
For scenarios where native ACL integration isn't viable, we recommend security filters for trimming results based on exclusion criteria. The pattern includes the following components:
3128

3229
- Create a string field in the index to store strings of user or group identities.
3330
- Load the index with source documents that include a field containing the identities.
3431
- Include a filter expression in your query logic for matching on the string.
3532
- At query time, get the identity of the caller.
3633
- Pass in the identity of the caller as the filter string.
3734

38-
You can use push or pull model APIs. Because this approach is API agnostic, you just need to ensure that the index and query have valid strings for the filtration step.
35+
You can use push or pull model APIs. Because this approach is API agnostic, you just need to ensure that the index and query have valid strings (identities) for the filtration step.
3936

4037
This approach is useful for systems with custom access models or non-Microsoft security frameworks. For more information this approach, see [Security filters for trimming results in Azure AI Search](search-security-trimming-for-azure-search.md).
4138

4239
## Pattern for native support for POSIX-like ACL permissions (preview)
4340

44-
Native support is based on Microsoft Entra ID user and group access IDs affiliated with documents that you want to index. We recommend group access IDs for ease of management. The pattern includes the following components:
41+
Native support is based on Microsoft Entra ID user and group access IDs affiliated with documents that you want to index and query. We recommend group access IDs for ease of management. The pattern includes the following components:
4542

4643
- Start with documents or files that have ACL assignments.
4744
- [Enable permission filters](/rest/api/searchservice/indexes/create-or-update?view=rest-searchservice-2025-05-01-preview&preserve-view=true#searchindexpermissionfilteroption) in the index.

articles/search/toc.yml

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -532,18 +532,20 @@ items:
532532
href: search-indexer-howto-access-private.md
533533
- name: Connect to a SQL managed instance private endpoint
534534
href: search-indexer-how-to-access-private-sql.md
535-
- name: Document-level permissions
535+
- name: Document-level access
536536
items:
537537
- name: Document-level security overview
538538
href: search-document-level-access-overview.md
539539
- name: Use security filters
540540
href: search-security-trimming-for-azure-search.md
541-
- name: Push document-level permissions to an index
542-
href: search-index-access-control-lists-and-rbac-push-api.md
543-
- name: Pull ADLS Gen2 permissions into an index
544-
href: search-indexer-access-control-lists-and-role-based-access.md
545-
- name: Query with permission filters
546-
href: search-query-access-control-rbac-enforcement.md
541+
- name: Use ACLs
542+
items:
543+
- name: Push document-level permissions to an index
544+
href: search-index-access-control-lists-and-rbac-push-api.md
545+
- name: Pull ADLS Gen2 permissions into an index
546+
href: search-indexer-access-control-lists-and-role-based-access.md
547+
- name: Query with permission filters
548+
href: search-query-access-control-rbac-enforcement.md
547549
- name: Advanced options
548550
items:
549551
- name: Create a private endpoint

0 commit comments

Comments
 (0)