You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/service-configure-firewall.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,11 @@ As soon as you install Azure AI Search, you can set up network access to limit a
20
20
+ Inbound rules listing the IP addresses, ranges, or subnets from which requests are admitted
21
21
+ Exceptions to network rules, where requests are admitted with no checks, as long as the request originates from a trusted service
22
22
23
-
Network access and firewall rules aren't required, but it's a security best practice to include the network layer.
23
+
Network rules aren't required, but it's a security best practice to add them.
24
24
25
-
This article explains how to configure network access to a search service's public endpoint. To block *all* access through the public endpoint, use [private endpoints](service-create-private-endpoint.md) and an Azure virtual network.
25
+
Network rules are scoped to data plane operations. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
26
26
27
-
Network access rules are scoped to data plane operations. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
27
+
This article explains how to configure network access to a search service's public endpoint. To block *all* access to the public endpoint, use [private endpoints](service-create-private-endpoint.md) and an Azure virtual network.
28
28
29
29
This article assumes the Azure portal for network access configuration. You can also use the [Management REST API](/rest/api/searchmanagement/), [Azure PowerShell](/powershell/module/az.search), or the [Azure CLI](/cli/azure/search).
30
30
@@ -118,7 +118,7 @@ For managed identities on Azure OpenAI and Azure Machine Learning:
118
118
119
119
For managed identities on Azure AI services:
120
120
121
-
1.[Find your multiservice account](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.CognitiveServices%2Faccounts/).
121
+
1.[Find your multiservice account](https://ms.portal.azure.com/#view/Microsoft_Azure_ProjectOxford/CognitiveServicesHub/~/AIServices).
122
122
1. On the leftmost pane, under **Resource management**, select **Identity**.
0 commit comments