Skip to content

Commit e934b34

Browse files
Merge pull request #6125 from HeidiSteen/heidist-freshness
Susheel's updates to ACL docs
2 parents b36db53 + e363de8 commit e934b34

File tree

2 files changed

+4
-9
lines changed

2 files changed

+4
-9
lines changed

articles/search/search-blob-indexer-role-based-access.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Azure Storage allows for role-based access on containers in blob storage, where
1717

1818
RBAC scope is set at the container level and flows to all blobs (documents) through permission inheritance. RBAC scope is captured during indexing as permission metadata, You can use the push APIs to upload and index content and permission metadata manually see [Indexing Permissions using the push REST API](search-index-access-control-lists-and-rbac-push-api.md), or you can use an indexer to automate data ingestion. This article focuses on the indexer approach.
1919

20-
At query time, user or group identities are included in the request header via the `x-ms-query-source-authorization` parameter. The identity must match the permission metadata on documents if the user is to see the search results.
20+
At query time, the identity of the caller is included in the request header via the `x-ms-query-source-authorization` parameter. The identity must match the permission metadata on documents if the user is to see the search results.
2121

2222
The indexer approach is built on this foundation:
2323

@@ -29,14 +29,10 @@ The indexer approach is built on this foundation:
2929

3030
## Prerequisites
3131

32-
+ [Microsoft Entra ID authentication and authorization](/entra/identity/authentication/overview-authentication). Services, apps, and users must be in the same tenant. Role assignments are used for each authenticated connection.
32+
+ [Microsoft Entra ID authentication and authorization](/entra/identity/authentication/overview-authentication). Services and apps must be in the same tenant. Users can be in different tenants as long as all of the tenants are Microsoft Entra ID. Role assignments are used for each authenticated connection.
3333

3434
+ Azure AI Search, any region, but you must have a billable tier (basic and higher) see [Service limits](search-limits-quotas-capacity.md) for managed identity support. The search service must be [configured for role-based access](search-security-enable-roles.md) and it must [have a managed identity (either system or user)](search-howto-managed-identities-data-sources.md).
3535

36-
## Limitations
37-
38-
+ Permission inheritance isn't available if the blob indexer is using a [one-to-many parsing mode](/rest/api/searchservice/indexers/create?view=rest-searchservice-2025-05-01-preview&preserve-view=true#blobindexerparsingmode), such as: `delimitedText`, `jsonArray`, `jsonLines`, and `markdown` with sub-mode `oneToMany`. You must use the default parsing mode that creates one search document for each blob in the container.
39-
4036
## Configure Blob storage
4137

4238
Verify your blob container uses role-based access.

articles/search/search-indexer-access-control-lists-and-role-based-access.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This article supplements [**Index data from ADLS Gen2**](search-howto-index-azu
3333

3434
## Prerequisites
3535

36-
+ Microsoft Entra ID authentication and authorization. Services and apps must be in the same tenant. Role assignments are used for each authenticated connection.
36+
+ [Microsoft Entra ID authentication and authorization](/entra/identity/authentication/overview-authentication). Services and apps must be in the same tenant. Users can be in different tenants as long as all of the tenants are Microsoft Entra ID. Role assignments are used for each authenticated connection.
3737

3838
+ Azure AI Search, any region, but you must have a billable tier (basic and higher) for managed identity support. The search service must be [configured for role-based access](search-security-enable-roles.md) and it must [have a managed identity (either system or user)](search-howto-managed-identities-data-sources.md).
3939

@@ -45,14 +45,13 @@ This article supplements [**Index data from ADLS Gen2**](search-howto-index-azu
4545

4646
+ The `owning users`, `owning groups` and `Other` [ACL identities categories](/azure/storage/blobs/data-lake-storage-access-control#users-and-identities) are not supported during public preview. Use `named users` and `named groups` assignments instead.
4747

48-
+ The following indexer features don't support permission preservation capabilities but are otherwise operational for ADLS Gen2 content-only indexing:
48+
+ The following indexer features don't support permission inheritance in indexed documents originating from ADLS Gen2. If you're using any of these features in a skillset or indexer, document-level permissions won't be present in the indexed content:
4949

5050
+ [Custom Web API skill](cognitive-search-custom-skill-web-api.md)
5151
+ [GenAI Prompt skill](cognitive-search-skill-genai-prompt.md)
5252
+ [Knowledge store](knowledge-store-concept-intro.md)
5353
+ [Indexer enrichment cache](search-howto-incremental-index.md)
5454
+ [Debug sessions](cognitive-search-debug-session.md)
55-
+ One-to-many [parsing modes](/rest/api/searchservice/indexers/create?view=rest-searchservice-2025-05-01-preview&preserve-view=true#blobindexerparsingmode), such as: `delimitedText`, `jsonArray`, `jaonLines`, and `markdown` with sub-mode `oneToMany`
5655

5756
## Support for the permission model
5857

0 commit comments

Comments
 (0)