Skip to content

Commit 4f0a6b1

Browse files
authored
Merge pull request #192988 from HeidiSteen/heidist-fix
tweaked a description
2 parents 1b8e0fa + b1f0375 commit 4f0a6b1

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/search/search-howto-managed-identities-data-sources.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,17 @@ ms.date: 03/22/2022
1313

1414
# Connect a search service to other Azure resources using a managed identity
1515

16-
You can configure an Azure Cognitive Search connection to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment on the remote service. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection strings or code.
16+
You can configure an Azure Cognitive Search service to connect to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
1717

1818
## Prerequisites
1919

2020
+ A search service at the [Basic tier or above](search-sku-tier.md).
2121

22-
+ An Azure resource that accepts incoming requests from a managed identity having a valid role assignment.
22+
+ An Azure resource that accepts incoming requests from an Azure AD login that has a valid role assignment.
2323

2424
## Supported scenarios
2525

26-
Cognitive Search can use a system-assigned and user-assigned managed identity on outbound connections to Azure resources. A user-assigned managed identity is specified through an "identity" property.
26+
Cognitive Search can use a system-assigned or user-assigned managed identity on outbound connections to Azure resources. A system managed identity is indicated when a connection string is the unique resource ID of an Azure AD-aware service or application. A user managed identity is specified through an "identity" property.
2727

2828
| Scenario | System managed identity | User managed identity (preview) |
2929
|----------|-------------------------|---------------------------------|
@@ -172,15 +172,15 @@ If your Azure resource is behind a firewall, make sure there's an inbound rule t
172172
173173
+ For same-region connections to Azure Blob Storage or Azure Data Lake Storage Gen2, use the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md) to admit requests.
174174
175-
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md). See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
175+
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md) that admits requests from Search. See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
176176
177177
## Assign a role
178178
179179
A managed identity must be paired with an Azure role that determines permissions on the Azure resource.
180180
181181
+ Data reader permissions are needed for indexer data connections and for accessing a customer-managed key in Azure Key Vault.
182182
183-
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting session data, caching, and long-term content storage. These features include: enrichment cache and knowledge store.
183+
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting debug session data, enrichment caching, and long-term content storage in a knowledge store.
184184
185185
The following steps are for Azure Storage. If your resource is Cosmos DB or Azure SQL, the steps are similar.
186186

articles/search/search-security-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article describes the security features in Azure Cognitive Search that prot
1818

1919
## Data flow (network traffic patterns)
2020

21-
A search service is hosted on Azure and is typically accessed by client applications using public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry and outbound traffic is necessary background for protecting your development and production environments.
21+
A Cognitive Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
2222

2323
Cognitive Search has three basic network traffic patterns:
2424

@@ -30,7 +30,7 @@ Cognitive Search has three basic network traffic patterns:
3030

3131
Inbound requests that target a search service endpoint consist of:
3232

33-
+ Creating and managing objects
33+
+ Creating and managing indexes, indexers, and other objects
3434
+ Sending requests for indexing, running indexer jobs, executing skills
3535
+ Querying an index
3636

@@ -44,12 +44,12 @@ Outbound requests from a search service to other applications are typically made
4444

4545
+ Search, on behalf of an indexer, connects to external data sources to read in data for indexing.
4646
+ Search, on behalf of an indexer, writes to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47-
+ A custom skill runs external code that's hosted off-service. The request for external processing is sent during skillset execution.
47+
+ A custom skill connects to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
4848
+ Search connects to Azure Key Vault for a customer-managed key used to encrypt and decrypt sensitive data.
4949

50-
Outbound connections can be made using a resource's full access connection string that includes a shared access key or a database login, or a managed identity if you're using Azure Active Directory.
50+
Outbound connections can be made using a resource's full access connection string that includes a key or a database login, or a managed identity if you're using Azure Active Directory.
5151

52-
If your Azure resource is behind a firewall, you'll need to create rules that admit indexer or service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
52+
If your Azure resource is behind a firewall, you'll need to create rules that admit search service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
5353

5454
### Internal traffic
5555

0 commit comments

Comments
 (0)