Skip to content

Commit 8bf921e

Browse files
committed
added screenshot for role assignment
1 parent c29036e commit 8bf921e

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed
136 KB
Loading

articles/search/search-security-rbac.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: subject-rbac-steps, devx-track-azurepowershell
1414

1515
# Connect to Azure AI Search using roles
1616

17-
Azure provides a global authentication and [role-based access control](/azure/role-based-access-control/role-assignments-portal) through Microsoft Entra ID for all services running on the platform. In this article, learn which roles provide access to search content and administration.
17+
Azure provides a global authentication and [role-based access control](/azure/role-based-access-control/role-assignments-portal) through Microsoft Entra ID for all services running on the platform. In this article, learn which roles provide access to search content and administration on Azure AI Search.
1818

1919
In Azure AI Search, you can assign Azure roles for:
2020

@@ -47,7 +47,9 @@ The following steps work for all role assignments.
4747

4848
1. Select **Access Control (IAM)** in the left navigation pane.
4949

50-
1. Select **+ Add** > **Add role assignment**.
50+
1. Select **+ Add** > **Add role assignment** to start the **Add role assignment** wizard.
51+
52+
:::image type="content" source="media/search-security-rbac/portal-access-control.png" alt-text="Screenshot of the access control page in the Azure portal.":::
5153

5254
1. Select a role. You can assign multiple security principals, whether users or managed identities to a role in one pass through the wizard, but you have to repeat these steps for each role you define.
5355

0 commit comments

Comments
 (0)