Skip to content

Commit 38d1dd0

Browse files
committed
RBAC note revision
1 parent 5c1d153 commit 38d1dd0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/search/search-security-rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,8 @@ New-AzRoleAssignment -SignInName <email> `
104104

105105
Role assignments are global across the search service. To [scope permissions to a single index](#rbac-single-index), use PowerShell or the Azure CLI to create a custom role.
106106

107-
> [!IMPORTANT]
108-
> If you configure role-based access for a service or index and you also provide an API key on the request, the search service uses the API key to authenticate.
107+
> [!NOTE]
108+
> If you make a request, such as a REST call, that includes an API key, and you're also part of a role assignment, the API key takes precedence. For instance, if you have a read-only role assignment but make a request with an admin API key, the permissions granted by the API key override the role assignment. This behavior only applies if both keys and roles are enabled for your search service.
109109
110110
#### [**Azure portal**](#tab/roles-portal)
111111

0 commit comments

Comments
 (0)