You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-howto-managed-identities-data-sources.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,17 +13,17 @@ ms.date: 03/22/2022
13
13
14
14
# Connect a search service to other Azure resources using a managed identity
15
15
16
-
You can configure an Azure Cognitive Search connection to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment on the remote service. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection strings or code.
16
+
You can configure an Azure Cognitive Search service to connect to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
17
17
18
18
## Prerequisites
19
19
20
20
+ A search service at the [Basic tier or above](search-sku-tier.md).
21
21
22
-
+ An Azure resource that accepts incoming requests from a managed identity having a valid role assignment.
22
+
+ An Azure resource that accepts incoming requests from an Azure AD login that has a valid role assignment.
23
23
24
24
## Supported scenarios
25
25
26
-
Cognitive Search can use a system-assigned and user-assigned managed identity on outbound connections to Azure resources. A user-assigned managed identity is specified through an "identity" property.
26
+
Cognitive Search can use a system-assigned or user-assigned managed identity on outbound connections to Azure resources. A system managed identity is indicated when a connection string is the unique resource ID of an Azure AD-aware service or application. A user managed identity is specified through an "identity" property.
27
27
28
28
| Scenario | System managed identity | User managed identity (preview) |
@@ -172,15 +172,15 @@ If your Azure resource is behind a firewall, make sure there's an inbound rule t
172
172
173
173
+ For same-region connections to Azure Blob Storage or Azure Data Lake Storage Gen2, use the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md) to admit requests.
174
174
175
-
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md). See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
175
+
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md) that admits requests from Search. See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
176
176
177
177
## Assign a role
178
178
179
179
A managed identity must be paired with an Azure role that determines permissions on the Azure resource.
180
180
181
181
+ Data reader permissions are needed for indexer data connections and for accessing a customer-managed key in Azure Key Vault.
182
182
183
-
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting session data, caching, and long-term content storage. These features include: enrichment cache and knowledge store.
183
+
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting debug session data, enrichment caching, and long-term content storage in a knowledge store.
184
184
185
185
The following steps are for Azure Storage. If your resource is Cosmos DB or Azure SQL, the steps are similar.
Copy file name to clipboardExpand all lines: articles/search/search-security-overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ This article describes the security features in Azure Cognitive Search that prot
18
18
19
19
## Data flow (network traffic patterns)
20
20
21
-
A search service is hosted on Azure and is typically accessed by client applications using public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry and outbound traffic is necessary background for protecting your development and production environments.
21
+
A Cognitive Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
22
22
23
23
Cognitive Search has three basic network traffic patterns:
24
24
@@ -30,7 +30,7 @@ Cognitive Search has three basic network traffic patterns:
30
30
31
31
Inbound requests that target a search service endpoint consist of:
32
32
33
-
+ Creating and managing objects
33
+
+ Creating and managing indexes, indexers, and other objects
34
34
+ Sending requests for indexing, running indexer jobs, executing skills
35
35
+ Querying an index
36
36
@@ -44,12 +44,12 @@ Outbound requests from a search service to other applications are typically made
44
44
45
45
+ Search, on behalf of an indexer, connects to external data sources to read in data for indexing.
46
46
+ Search, on behalf of an indexer, writes to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47
-
+ A custom skill runs external code that's hosted off-service. The request for external processing is sent during skillset execution.
47
+
+ A custom skill connects to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
48
48
+ Search connects to Azure Key Vault for a customer-managed key used to encrypt and decrypt sensitive data.
49
49
50
-
Outbound connections can be made using a resource's full access connection string that includes a shared access key or a database login, or a managed identity if you're using Azure Active Directory.
50
+
Outbound connections can be made using a resource's full access connection string that includes a key or a database login, or a managed identity if you're using Azure Active Directory.
51
51
52
-
If your Azure resource is behind a firewall, you'll need to create rules that admit indexer or service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
52
+
If your Azure resource is behind a firewall, you'll need to create rules that admit search service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
0 commit comments