Skip to content

Commit 812361c

Browse files
committed
typo, moved rbac statement
1 parent 3318c02 commit 812361c

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/search/search-document-level-access-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@ To help you dive deeper into document-level access control in Azure AI Search, h
5555

5656
| Functionality | Reference | Sample |
5757
|---|---|
58-
| **Index permissions using Push APIs** | [Index permissions using REST API](search-index-access-control-lists-and-rbac-push-api.md) | [https://github.com/Azure-Samples/azure-search-rest-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-rest-samples-pr/tree/main/Quickstart-ACL) or [https://github.com/Azure-Samples/azure-search-python-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-python-samples-pr/blob/main/Quickstart-ACL) or |
59-
| **Index ADLS Gen2 permissions metadata using built-in indexers** | [Index permissions using ADLS Gen2 indexer](search-indexer-access-control-lists-and-role-based-access.md) | [https://github.com/Azure-Samples/azure-search-python-samples/Quickstart-Document-Permissions](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions) |
58+
| **Index permissions using Push APIs** | [Index permissions using REST API](search-index-access-control-lists-and-rbac-push-api.md) | [azure-search-rest-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-rest-samples-pr/tree/main/Quickstart-ACL) or [azure-search-python-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-python-samples-pr/blob/main/Quickstart-ACL) |
59+
| **Index ADLS Gen2 permissions metadata using built-in indexers** | [Index permissions using ADLS Gen2 indexer](search-indexer-access-control-lists-and-role-based-access.md) | [azure-search-python-samples/Quickstart-Document-Permissions](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions) |
6060
| **Query using Microsoft Entra token-based permissions** | [Query using Microsoft Entra token-based permissions](https://aka.ms/azs-query-preserving-permissions) | See previous samples. |
6161
| **Security trimming via filters** | [Security trimming via filters](search-security-trimming-for-azure-search.md) | Not available. |
6262

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ The end-user application sends user permission as part of the search query reque
3838
| groupIds | Group membership fetched using the [Microsoft Graph](/graph/api/resources/groups-overview) API |
3939
| rbacScope | Permissions the user from `x-ms-query-source-authorization` has on a storage container |
4040

41-
For Azure RBAC, permissions are list of resource ID strings, and there must an Azure role assignment (Storage Blob Data Reader) on the data the source that grants access to the security principal token in the authorization header. The filter excludes documents if there's no role assignment for the principal behind the access token on the request.
42-
43-
### 2. Security filter construction
41+
### 2. Security filter construction
4442
Azure AI Search dynamically constructs security filters based on the user permissions provided. These security filters are automatically appended to any filters that might come in with the query if the index has the permission filter option enabled.
4543

44+
For Azure RBAC, permissions are list of resource ID strings, and there must an Azure role assignment (Storage Blob Data Reader) on the data the source that grants access to the security principal token in the authorization header. The filter excludes documents if there's no role assignment for the principal behind the access token on the request.
45+
4646
### 3. Results filtering
4747
The security filter efficiently matches the userIds, groupIds, and rbacScope from the user against each list of ACLs in every document in the search index to limit the results returned to ones the user has access to. It's important to note that each filter is applied independently and a document is considered authorized if any filter succeeds. For example, if a user has access to a document through userIds but not through groupIds, the document is still considered valid and returned to the user.
4848

0 commit comments

Comments
 (0)