Skip to content

Commit 3c2db2c

Browse files
committed
Fixing doc bugs
1 parent c4053fb commit 3c2db2c

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/search/search-howto-managed-identities-data-sources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.date: 06/10/2024
1616

1717
# Configure a search service to connect using a managed identity in Azure AI Search
1818

19-
You can use Microsoft Entra ID and role assignments for outbound connections from Azure AI Search to resources providing data, applied AI, or vectorization during during indexing or queries. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
19+
You can use Microsoft Entra ID and role assignments for outbound connections from Azure AI Search to resources providing data, applied AI, or vectorization during indexing or queries.
2020

21-
To use roles on an outbound connection, first configure your search service to use either a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) as the security principle for your search service in a Microsoft Entra tenant. Once you have a managed identity, you can assign roles for authorized access.
21+
To use roles on an outbound connection, first configure your search service to use either a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) as the security principle for your search service in a Microsoft Entra tenant. Once you have a managed identity, you can assign roles for authorized access. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
2222

2323
## Prerequisites
2424

articles/search/search-howto-managed-identities-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ POST https://[service name].search.windows.net/datasources?api-version=2023-11-0
9191

9292
You must have a [user-assigned managed identity already configured](search-howto-managed-identities-data-sources.md) and associated with your search service, and the identity must have a role-assignment on Azure Storage.
9393

94-
Connections made through user-assigned managed identities use the same credentials as a system-assigned managed identity, plus an extra identity property that contains the collection of user-assigned managed identities. Only one user-assigned managed identity should be provided when creating the data source. Set `userAssignedIdentity` to the user-assigned managed identity..
94+
Connections made through user-assigned managed identities use the same credentials as a system-assigned managed identity, plus an extra identity property that contains the collection of user-assigned managed identities. Only one user-assigned managed identity should be provided when creating the data source. Set `userAssignedIdentity` to the user-assigned managed identity.
9595

9696
Provide a `ResourceId` that has no account key or password. The `ResourceId` must include the subscription ID of the storage account, the resource group of the storage account, and the storage account name.
9797

articles/search/search-security-enable-roles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,12 @@ ms.date: 06/10/2024
1616

1717
If you want to use Azure role-based access control for connections into Azure AI Search, this article explains how to enable it for your search service.
1818

19-
Role-based access for data plane operations is optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default. Before you can use role for data plane operations, you must enable role-based access on your search service.
19+
Role-based access for data plane operations is optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default.
2020

21-
Roles for service administration (control plane) are mandatory and can't be disabled.
21+
Roles for service administration (control plane) are built-in and can't be enabled or disabled.
2222

2323
> [!NOTE]
24-
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search REST API](/rest/api/searchservice/) or equivalent client libraries.
24+
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search REST API](/rest/api/searchservice/) or equivalent Azure SDK client libraries.
2525
2626
## Prerequisites
2727

@@ -31,7 +31,7 @@ Roles for service administration (control plane) are mandatory and can't be disa
3131

3232
## Enable role-based access for data plane operations
3333

34-
When you enable roles, the change is effective immediately, but wait a few seconds before assigning roles.
34+
When you enable roles for the data plane, the change is effective immediately, but wait a few seconds before assigning roles.
3535

3636
The default failure mode is `http401WithBearerChallenge`. Alternatively, you can set the failure mode to `http403`.
3737

0 commit comments

Comments
 (0)