You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-howto-managed-identities-cosmos-db.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ ms.date: 02/11/2022
14
14
15
15
# Set up an indexer connection to a Cosmos DB database using a managed identity
16
16
17
-
This article describes how to set up an indexer connection to an Azure Cosmos DB database using a managed identity instead of providing credentials in the data source object connection string.
17
+
This article describes how to set up an Azure Cognitive Search indexer connection to an Azure Cosmos DB database using a managed identity instead of providing credentials in the data source object connection string.
18
18
19
-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19
+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Cosmos DB.
20
20
21
21
Before learning more about this feature, it is recommended that you have an understanding of what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
Copy file name to clipboardExpand all lines: articles/search/search-howto-managed-identities-sql.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ ms.date: 02/11/2022
14
14
15
15
# Set up an indexer connection to Azure SQL Database using a managed identity
16
16
17
-
This article describes how to set up an indexer connection to Azure SQL Database using a managed identity instead of providing credentials in the data source object connection string.
17
+
This article describes how to set up an Azure Cognitive Search indexer connection to Azure SQL Database using a managed identity instead of providing credentials in the data source object connection string.
18
18
19
-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19
+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Azure SQL.
20
20
21
21
Before learning more about this feature, it is recommended that you have an understanding of what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
Copy file name to clipboardExpand all lines: articles/search/search-howto-managed-identities-storage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ ms.date: 03/10/2022
14
14
15
15
# Set up a connection to an Azure Storage account using a managed identity
16
16
17
-
This article describes how to set up an indexer connection to an Azure Storage account using a managed identity instead of providing credentials in the data source object connection string.
17
+
This article describes how to set up an Azure Cognitive Search indexer connection to an Azure Storage account using a managed identity instead of providing credentials in the data source object connection string.
18
18
19
-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19
+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Azure Storage.
20
20
21
21
This article assumes familiarity with indexer concepts and configuration. If you're new to indexers, start with these links:
Copy file name to clipboardExpand all lines: articles/search/search-indexer-howto-access-ip-restricted.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,9 @@ On behalf of an indexer, a search service will issue outbound calls to an extern
17
17
18
18
This article explains how to find the IP address of your search service and configure an inbound IP rule on an Azure Storage account. While specific to Azure Storage, this approach also works for other Azure resources that use IP firewall rules for data access, such as Cosmos DB and Azure SQL.
19
19
20
-
> [!NOTE]
21
-
> IP firewall rules for a storage account are only effective if the storage account and the search service are in different regions. If your setup does not permit this, we recommend utilizing the [trusted service exception option](search-indexer-howto-access-trusted-service-exception.md) as an alternative.
20
+
## Prerequisites
21
+
22
+
The storage account and the search service must be in different regions. If your setup doesn't permit this, try the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md) or [resource instance rule](../storage/common/storage-network-security.md#grant-access-from-azure-resource-instances-preview).
Copy file name to clipboardExpand all lines: articles/search/search-security-overview.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,8 @@ Cognitive Search has three basic network traffic patterns:
30
30
31
31
Inbound requests that target a search service endpoint consist of:
32
32
33
-
+ Creating and managing indexes, indexers, and other objects
34
-
+Sending requests for indexing, running indexer jobs, executing skills
33
+
+ Creating or managing indexes, indexers, data sources, skillsets, or synonym lists
34
+
+Running indexers and skillsets
35
35
+ Querying an index
36
36
37
37
For inbound access to data and operations on your search service, you can implement a progression of security measures, starting with [network security features](#service-access-and-authentication). You can create either inbound rules in an IP firewall, or private endpoints that fully shield your search service from the public internet.
@@ -42,9 +42,9 @@ Independent of network security, all inbound requests must be authenticated. Key
42
42
43
43
Outbound requests from a search service to other applications are typically made by indexers for text-based indexing and some aspects of AI enrichment. Outbound requests include both read and write operations. Outbound requests are made by the search service on its own behalf, and on the behalf of an indexer or skillset.
44
44
45
-
+Indexer connects to external data sources to read in data for indexing.
46
-
+Indexer writes to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47
-
+A custom skill connects to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
45
+
+Indexers [connect to external data sources](search-indexer-securing-resources.md) to read in data for indexing.
46
+
+Indexers write to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47
+
+Custom skills connect to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
48
48
+ Search connects to Azure Key Vault for a customer-managed key used to encrypt and decrypt sensitive data.
49
49
50
50
Outbound connections can be made using a resource's full access connection string that includes a key or a database login, or an Azure AD login ([a managed identity](search-howto-managed-identities-data-sources.md)) if you're using Azure Active Directory.
@@ -53,7 +53,10 @@ If your Azure resource is behind a firewall, you'll need to [create rules that a
53
53
54
54
### Internal traffic
55
55
56
-
Internal requests are secured and managed by Microsoft. Internal traffic consists of service-to-service calls for tasks like authentication and authorization through Azure Active Directory, diagnostic logging in Azure Monitor, private endpoint connections, and requests made to Cognitive Services for built-in skills.
56
+
Internal requests are secured and managed by Microsoft. Internal traffic consists of:
57
+
58
+
+ Service-to-service calls for tasks like authentication and authorization through Azure Active Directory, diagnostic logging in Azure Monitor, and private endpoint connections.
59
+
+ Requests made to Cognitive Services APIs for built-in skills.
0 commit comments