Skip to content

Commit 4e13595

Browse files
committed
Addressed Matt's feedback
1 parent f4e831d commit 4e13595

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

articles/search/search-howto-managed-identities-storage.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,8 @@ Indexers use a data source object for connections to an external data source. Th
6060
6161
### System-assigned managed identity
6262

63+
You must have a [system-assigned managed identity already configured](search-howto-managed-identities-data-sources.md), and it must have a role-assignment on Azure Storage.
64+
6365
For connections made using a system-assigned managed identity, the only change to the [data source definition](/rest/api/searchservice/create-data-source) is the format of the `credentials` property.
6466

6567
Provide a `ResourceId` that has no account key or password. The `ResourceId` must include the subscription ID of the storage account, the resource group of the storage account, and the storage account name.
@@ -81,7 +83,9 @@ POST https://[service name].search.windows.net/datasources?api-version=2023-11-0
8183

8284
### User-assigned managed identity
8385

84-
Connections made through user-assigned managed identities use the same credentials as a system-assigned managed identity, plus an extra identity property that contains the collection of user-assigned managed identities. Only one user-assigned managed identity should be provided when creating the data source. Set it to type `userAssignedIdentities`.
86+
You must have a [user-assigned managed identity already configured](search-howto-managed-identities-data-sources.md) and associated with your search service, and the identity must have a role-assignment on Azure Storage.
87+
88+
Connections made through user-assigned managed identities use the same credentials as a system-assigned managed identity, plus an extra identity property that contains the collection of user-assigned managed identities. Only one user-assigned managed identity should be provided when creating the data source. Set `userAssignedIdentity` to the user-assigned managed identity..
8589

8690
Provide a `ResourceId` that has no account key or password. The `ResourceId` must include the subscription ID of the storage account, the resource group of the storage account, and the storage account name.
8791

articles/search/search-security-enable-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.date: 06/03/2024
1616

1717
Azure AI Search supports authentication and authorization through role assignments and Microsoft Entra ID, which is built into all Azure tenants.
1818

19-
Roles for service administration (control plane) are built in and can't be disabled. Roles for data plane operations are optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default. However, if you want to assign Search Service Contributor, Search Index Data Contributor, or Search Index Data Reader roles for data plane operations, you must enable role-based access on your service.
19+
Roles for service administration (control plane) are built in and can't be disabled. Roles for data plane operations are optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default. However, if you want to use role-based authentication for data plane operations, you must enable role-based access on your service.
2020

2121
In this article, learn how to configure your search service to recognize an **authorization** header on data plane requests that provide an OAuth2 access token.
2222

@@ -132,7 +132,7 @@ All calls to the Management REST API are authenticated through Microsoft Entra I
132132
133133
## Disable role-based access control
134134
135-
Because roles aren't required, it's possible to disable role-based access control for data plane operations and use key-based authentication instead. You might do this as part of a test workflow, for example to rule out permission issues.
135+
It's possible to disable role-based access control for data plane operations and use key-based authentication instead. You might do this as part of a test workflow, for example to rule out permission issues.
136136
137137
Reverse the steps you followed previously to enable role-based access.
138138

0 commit comments

Comments
 (0)