You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-security-api-keys.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,17 +43,17 @@ Best practices for using hard-coded keys in source files include:
43
43
44
44
+ During early development and proof-of-concept testing when security is looser, use sample or public data.
45
45
46
-
+ For mature solutions or production scenarios, switch to [Azure Active Directory and role-based access](search-security-rbac.md) to eliminate the need for having hard-coded keys. Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-key-access) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
46
+
+ For mature solutions or production scenarios, switch to [Azure Active Directory and role-based access](search-security-rbac.md) to eliminate the need for having hard-coded keys. Or, if you want to continue using API keys, be sure to always monitor [who has access to your API keys](#secure-api-keys) and [regenerate API keys](#regenerate-admin-keys) on a regular cadence.
47
47
48
48
### [**Portal**](#tab/portal-use)
49
49
50
50
In Cognitive Search, most tasks can be performed in Azure portal, including object creation, indexing through the Import data wizard, and queries through Search explorer.
51
51
52
-
No action is required. By default, the portal uses API keys to authenticate the request automatically. However, if you [disable API keys](search-security-rbac.md#disable-api-key-authentication) and set up role assignments, the portal uses role assignments instead.
52
+
Authentication is built-in so no action is required. By default, the portal uses API keys to authenticate the request automatically. However, if you [disable API keys](search-security-rbac.md#disable-api-key-authentication) and set up role assignments, the portal uses role assignments instead.
53
53
54
54
### [**PowerShell**](#tab/azure-ps-use)
55
55
56
-
A script example showing API key usage can be found at [Quickstart: Create an Azure Cognitive Search index in PowerShell using REST APIs](search-get-started-powershell.md).
56
+
A script example showing API key usage for various operations can be found at [Quickstart: Create an Azure Cognitive Search index in PowerShell using REST APIs](search-get-started-powershell.md).
57
57
58
58
### [**REST API**](#tab/rest-use)
59
59
@@ -159,7 +159,7 @@ Restricting access and operations in client apps is essential to safeguarding th
159
159
160
160
### [**PowerShell**](#tab/azure-ps-query)
161
161
162
-
A script example showing API key usage can be found at [Create or delete query keys]](search-manage-powershell.md#create-or-delete-query-keys).
162
+
A script example showing API key usage can be found at [Create or delete query keys](search-manage-powershell.md#create-or-delete-query-keys).
163
163
164
164
### [**Azure CLI**](#tab/azure-cli-query)
165
165
@@ -197,7 +197,7 @@ You can still access the service through the portal or programmatically. Managem
197
197
198
198
After you create new keys via portal or management layer, access is restored to your content (indexes, indexers, data sources, synonym maps) once you provide those keys on requests.
199
199
200
-
## Secure API key access
200
+
## Secure API keys
201
201
202
202
Use role assignments to restrict access to API keys.
203
203
@@ -209,7 +209,7 @@ Note that it's not possible to use [customer-managed key encryption](search-secu
209
209
210
210
1. In the **Role** filter, select the roles that have permission to view or manage keys (Owner, Contributor, Search Service Contributor). The resulting security principals assigned to those roles have key permissions on your search service.
211
211
212
-
1. As a precaution, also check the **Classic administrators** tab for administrators and co-administrators.
212
+
1. As a precaution, also check the **Classic administrators** tab to determine whether administrators and co-administrators have access.
0 commit comments