Skip to content

Commit d097cde

Browse files
Merge pull request #1932 from HeidiSteen/heidist-dec
[azure search] role permission correction, search index data contributor has read permissions on index
2 parents 61df76a + 287ea7b commit d097cde

File tree

6 files changed

+6
-8
lines changed

6 files changed

+6
-8
lines changed

articles/search/keyless-connections.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -223,8 +223,7 @@ Local development using roles includes these steps:
223223
As a local developer, your Azure identity needs full control over data plane operations. These are the suggested roles:
224224

225225
- Search Service Contributor, create and manage objects
226-
- Search Index Data Contributor, load an index
227-
- Search Index Data Reader, query an index
226+
- Search Index Data Contributor, load and query an index
228227

229228
Find your personal identity with one of the following tools. Use that identity as the `<identity-id>` value.
230229

articles/search/search-get-started-rag.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ Azure OpenAI is receiving the (query) "Can you recommend a few hotels" from your
6363

6464
1. On Azure AI Search, make sure you have permissions to create, load, and query a search index:
6565

66-
- **Search Index Data Reader**
6766
- **Search Index Data Contributor**
6867
- **Search Service Contributor**
6968

articles/search/search-get-started-rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,11 @@ You need this step if you have more than one subscription or tenant.
7272

7373
1. Select **+ Add** > **Add role assignment**.
7474

75-
1. Choose a role (Search Service Contributor, Search Index Data Contributor, Search Index Data Reader) and assign it to your Microsoft Entra user or group identity.
75+
1. Choose a role (**Search Service Contributor**, **Search Index Data Contributor**, **Search Index Data Reader**) and assign it to your Microsoft Entra user or group identity.
7676

7777
Repeat for each role.
7878

79-
You need all three roles for creating, loading, and querying objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
79+
You need **Search Service Contributor** plus **Search Index Data Contributor** to create, load, and query objects on Azure AI Search. For more information, see [Connect using roles](search-security-rbac.md).
8080

8181
> [!TIP]
8282
> Later, if you get authentication failure errors, recheck the settings in this section. There could be policies at the subscription or resource group level that override any API settings you specify.

articles/search/search-security-enable-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The default failure mode for unauthorized requests is `http401WithBearerChalleng
5151
| Role-based access control | Requires membership in a role assignment to complete the task. It also requires an authorization header on the request. |
5252
| Both | Requests are valid using either an API key or role-based access control, but if you provide both in the same request, the API key is used. |
5353

54-
1. As an administrator, if you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to your user account to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need all three roles if you want equivalent access.
54+
1. As an administrator, if you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to your user account to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need the first two roles if you want equivalent access.
5555

5656
Sometimes it can take five to ten minutes for role assignments to take effect. Until that happens, the following message appears in the Azure portal pages used for data plane operations.
5757

articles/search/search-security-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Combine these roles to get sufficient permissions for your use case.
8787
|View resource properties/metrics/endpoint ||||||
8888
|List all objects on the resource ||||||
8989
|Access quotas and service statistics ||||||
90-
|Read/query an index ||||||
90+
|Read/query an index ||||||
9191
|Upload data for indexing ||||||
9292
|Create or edit indexes/aliases ||||||
9393
|Create, edit and run indexers/data sources/skillsets ||||||

articles/search/service-configure-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ The trusted services are used for vectorization workloads: generating vectors fr
160160
1. On the **Roles** page:
161161

162162
+ Select **Search Index Data Contributor** to load a search index with vectors generated by an embedding model. Choose this role if you intend to use integrated vectorization during indexing.
163-
+ Or, select **Search Index Data Reader** to provide queries with a vector generated by an embedding model. The embedding used in a query isn't written to an index, so no write permissions are required.
163+
+ Or, select **Search Index Data Reader** to provide queries containing a vector generated by an embedding model at query time. The embedding used in a query isn't written to an index, so no write permissions are required.
164164

165165
1. Select **Next**.
166166
1. On the **Members** page, select **Managed identity** and **Select members**.

0 commit comments

Comments
 (0)