Skip to content

Commit 2a7bd29

Browse files
committed
Fixed formatting problems
1 parent 26ea236 commit 2a7bd29

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/search/search-security-api-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,17 +43,17 @@ Best practices for using hard-coded keys in source files include:
4343

4444
+ During early development and proof-of-concept testing when security is looser, use sample or public data.
4545

46-
+ For mature solutions or production scenarios, switch to [Azure Active Directory and role-based access](search-security-rbac.md) to eliminate the need for having hard-coded keys. Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-key-access) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
46+
+ For mature solutions or production scenarios, switch to [Azure Active Directory and role-based access](search-security-rbac.md) to eliminate the need for having hard-coded keys. Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
4747

4848
### [**Portal**](#tab/portal-use)
4949

5050
In Cognitive Search, most tasks can be performed in Azure portal, including object creation, indexing through the Import data wizard, and queries through Search explorer.
5151

52-
No action is required. By default, the portal uses API keys to authenticate the request automatically. However, if you [disable API keys](search-security-rbac.md#disable-api-key-authentication) and set up role assignments, the portal uses role assignments instead.
52+
Authentication is built-in so no action is required. By default, the portal uses API keys to authenticate the request automatically. However, if you [disable API keys](search-security-rbac.md#disable-api-key-authentication) and set up role assignments, the portal uses role assignments instead.
5353

5454
### [**PowerShell**](#tab/azure-ps-use)
5555

56-
A script example showing API key usage can be found at [Quickstart: Create an Azure Cognitive Search index in PowerShell using REST APIs](search-get-started-powershell.md).
56+
A script example showing API key usage for various operations can be found at [Quickstart: Create an Azure Cognitive Search index in PowerShell using REST APIs](search-get-started-powershell.md).
5757

5858
### [**REST API**](#tab/rest-use)
5959

@@ -159,7 +159,7 @@ Restricting access and operations in client apps is essential to safeguarding th
159159

160160
### [**PowerShell**](#tab/azure-ps-query)
161161

162-
A script example showing API key usage can be found at [Create or delete query keys]](search-manage-powershell.md#create-or-delete-query-keys).
162+
A script example showing API key usage can be found at [Create or delete query keys](search-manage-powershell.md#create-or-delete-query-keys).
163163

164164
### [**Azure CLI**](#tab/azure-cli-query)
165165

@@ -197,7 +197,7 @@ You can still access the service through the portal or programmatically. Managem
197197

198198
After you create new keys via portal or management layer, access is restored to your content (indexes, indexers, data sources, synonym maps) once you provide those keys on requests.
199199

200-
## Secure API key access
200+
## Secure API keys
201201

202202
Use role assignments to restrict access to API keys.
203203

@@ -209,7 +209,7 @@ Note that it's not possible to use [customer-managed key encryption](search-secu
209209

210210
1. In the **Role** filter, select the roles that have permission to view or manage keys (Owner, Contributor, Search Service Contributor). The resulting security principals assigned to those roles have key permissions on your search service.
211211

212-
1. As a precaution, also check the **Classic administrators** tab for administrators and co-administrators.
212+
1. As a precaution, also check the **Classic administrators** tab to determine whether administrators and co-administrators have access.
213213

214214
## See also
215215

0 commit comments

Comments
 (0)