Skip to content

Commit b8ac23d

Browse files
committed
see also links
1 parent 3c23db8 commit b8ac23d

5 files changed

+17
-8
lines changed

articles/search/search-blob-indexer-role-based-access.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -168,9 +168,10 @@ JSON schema example:
168168

169169
To effectively manage blob deletion, ensure that you have enabled [deletion tracking](search-howto-index-changed-deleted-blobs.md) before your indexer runs for the first time. This feature allows the system to detect deleted blobs from your source and have them deleted from the index.
170170

171-
## Related content
171+
## See also
172172

173+
+ [Connect to Azure AI Search using roles](search-security-rbac.md)
174+
- [Query-Time ACL and RBAC enforcement](search-query-access-control-rbac-enforcement.md)
175+
- [azure-search-python-samples/Quickstart-Document-Permissions-Push-API](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions-Push-API)
173176
+ [Search over Azure Blob Storage content](search-blob-storage-integration.md)
174177
+ [Configure a blob indexer](search-howto-indexing-azure-blob-storage.md)
175-
+ [Change and delete detection using indexers for Azure Storage](search-howto-index-changed-deleted-blobs.md)
176-
+ [Connect to Azure AI Search using roles](search-security-rbac.md)

articles/search/search-index-access-control-lists-and-rbac-push-api.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,8 @@ This example illustrates how the document access rules are resolved based on the
122122
| 6 | ["user1", "user2"] | ["group1"] | Empty | User1, user2, or any member of group1 | |
123123
| 7 | ["user1", "user2"] | [] | Empty | User1, user2, or any user with RBAC permissions to container1 | |
124124

125-
## Next steps
125+
## See also
126126

127+
- [Connect to Azure AI Search using roles](search-security-rbac.md)
127128
- [Query-Time ACL and RBAC enforcement](search-query-access-control-rbac-enforcement.md)
128129
- [azure-search-python-samples/Quickstart-Document-Permissions-Push-API](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions-Push-API)

articles/search/search-indexer-access-control-lists-and-role-based-access.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -298,3 +298,8 @@ Choose one of the following mechanisms, depending on how many items changed:
298298

299299
To effectively manage blob deletion, ensure that you have enabled [deletion tracking](search-howto-index-changed-deleted-blobs.md) before your indexer runs for the first time. This feature allows the system to detect deleted blobs from your source and have them deleted from the index.
300300

301+
## See also
302+
303+
+ [Connect to Azure AI Search using roles](search-security-rbac.md)
304+
+ [Query-Time ACL and RBAC enforcement](search-query-access-control-rbac-enforcement.md)
305+
+ [azure-search-python-samples/Quickstart-Document-Permissions-Push-API](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions-Push-API)

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Content-Type: application/json
7676
}
7777
```
7878

79-
## Related content
79+
## See also
8080

8181
- [Tutorial: Index ADLS Gen2 permission metadata](tutorial-adls-gen2-indexer-acls.md)
8282

articles/search/search-security-overview.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.update-cycle: 180-days
1111
ms.custom:
1212
- ignite-2023
1313
ms.topic: conceptual
14-
ms.date: 02/28/2025
14+
ms.date: 07/26/2025
1515
---
1616

1717
# Security in Azure AI Search
@@ -155,9 +155,11 @@ For multitenancy solutions requiring security boundaries at the index level, it'
155155

156156
### Restricting access to documents
157157

158-
User permissions at the document level, also known as *row-level security*, isn't natively supported in Azure AI Search. If you import data from an external system that provides row-level security, such as Azure Cosmos DB, those permissions won't transfer with the data as its being indexed by Azure AI Search.
158+
User permissions at the document level, also known as *row-level security*, is available as a preview feature and depends on the data source. If content originates from [Azure Data Lake Storage (ADLS) Gen2](search-indexer-access-control-lists-and-role-based-access.md) or [Azure blobs](search-blob-indexer-role-based-access.md), user permission metadata that originates in Azure Storage is preserved in indexer-generated indexes and enforced at query time so that only authorized content is included in search results.
159159

160-
If you require permissioned access over content in search results, there's a technique for applying filters that include or exclude documents based on user identity. This workaround adds a string field in the data source that represents a group or user identity, which you can make filterable in your index. For more information about this pattern, see [Security trimming based on identity filters](search-security-trimming-for-azure-search.md).
160+
For other data sources, you can [push a document payload that includes user or group permission metadata](search-index-access-control-lists-and-rbac-push-api.md), and those permissions are retained in indexed content and also enforced at query time. This capability is also in preview.
161+
162+
If you can't use preview features and you require permissioned access over content in search results, there's a technique for applying filters that include or exclude documents based on user identity. This workaround adds a string field in the data source that represents a group or user identity, which you can make filterable in your index. For more information about this pattern, see [Security trimming based on identity filters](search-security-trimming-for-azure-search.md). For more information about document access, see [Document-level access control](search-document-level-access-overview.md).
161163

162164
## Data residency
163165

0 commit comments

Comments
 (0)