Skip to content

Commit ed7bf9a

Browse files
committed
revised to fit existing content
1 parent dd64162 commit ed7bf9a

File tree

2 files changed

+9
-11
lines changed

2 files changed

+9
-11
lines changed

articles/search/search-document-level-access-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -53,12 +53,12 @@ Document-level permissions in Azure AI Search provide a structured framework for
5353

5454
To help you dive deeper into document-level access control in Azure AI Search, here’s a table of key resources:
5555

56-
| Functionality | Reference |
56+
| Functionality | Reference | Sample |
5757
|---|---|
58-
| **Index permissions using REST API** | [Index permissions using REST API](search-index-access-control-lists-and-rbac-push-api.md) |
59-
| **Index ADLS Gen2 permissions metadata using built-in indexers** | [Index permissions using ADLS Gen2 indexer](search-indexer-access-control-lists-and-role-based-access.md) |
60-
| **Query using Microsoft Entra token-based permissions** | [Query using Microsoft Entra token-based permissions](https://aka.ms/azs-query-preserving-permissions) |
61-
| **Security trimming via filters** | [Security trimming via filters](search-security-trimming-for-azure-search.md) |
58+
| **Index permissions using REST API** | [Index permissions using REST API](search-index-access-control-lists-and-rbac-push-api.md) | [https://github.com/Azure-Samples/azure-search-rest-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-rest-samples-pr/tree/main/Quickstart-ACL) or [https://github.com/Azure-Samples/azure-search-python-samples/Quickstart-ACL](https://github.com/Azure-Samples/azure-search-python-samples-pr/blob/main/Quickstart-ACL) or |
59+
| **Index ADLS Gen2 permissions metadata using built-in indexers** | [Index permissions using ADLS Gen2 indexer](search-indexer-access-control-lists-and-role-based-access.md) | [https://github.com/Azure-Samples/azure-search-python-samples/Quickstart-Document-Permissions](https://github.com/Azure-Samples/azure-search-python-samples/blob/main/Quickstart-Document-Permissions) |
60+
| **Query using Microsoft Entra token-based permissions** | [Query using Microsoft Entra token-based permissions](https://aka.ms/azs-query-preserving-permissions) | See previous samples. |
61+
| **Security trimming via filters** | [Security trimming via filters](search-security-trimming-for-azure-search.md) | Not available. |
6262

6363
## Next steps
6464

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,6 @@ Azure Data Lake Storage (ADLS) Gen2 provides an access model that makes fine-gra
2929

3030
This section lists the order of operations for ACL enforcement at query time. Operations vary depending on whether you use Azure RBAC scope or Microsoft Entra ID group or user IDs.
3131

32-
### For Azure RBAC
33-
34-
For Azure RBAC, permissions are list of resource ID strings, and there must an Azure role assignment (Storage Blob Data Reader) on the data the source that grants access to the security principal token in the authorization header. The filter excludes documents if there's no role assignment for the principal behind the access token on the request.
35-
3632
### 1. User permissions input
3733
The end-user application sends user permission as part of the search query request. The following table lists the source of the user permissions Azure AI Search uses for ACL enforcement:
3834

@@ -42,10 +38,12 @@ The end-user application sends user permission as part of the search query reque
4238
| groupIds | Group membership fetched using the [Microsoft Graph](/graph/api/resources/groups-overview) API |
4339
| rbacScope | Permissions the user from `x-ms-query-source-authorization` has on a storage container |
4440

45-
#### 2. Security filter construction
41+
For Azure RBAC, permissions are list of resource ID strings, and there must an Azure role assignment (Storage Blob Data Reader) on the data the source that grants access to the security principal token in the authorization header. The filter excludes documents if there's no role assignment for the principal behind the access token on the request.
42+
43+
### 2. Security filter construction
4644
Azure AI Search dynamically constructs security filters based on the user permissions provided. These security filters are automatically appended to any filters that might come in with the query if the index has the permission filter option enabled.
4745

48-
#### 3. Results filtering
46+
### 3. Results filtering
4947
The security filter efficiently matches the userIds, groupIds, and rbacScope from the user against each list of ACLs in every document in the search index to limit the results returned to ones the user has access to. It's important to note that each filter is applied independently and a document is considered authorized if any filter succeeds. For example, if a user has access to a document through userIds but not through groupIds, the document is still considered valid and returned to the user.
5048

5149
## Limitations

0 commit comments

Comments
 (0)