Skip to content

Commit 6b699c0

Browse files
committed
Fixing link to resource blade
1 parent dda5cd9 commit 6b699c0

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/search/service-configure-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ As soon as you install Azure AI Search, you can set up network access to limit a
2020
+ Inbound rules listing the IP addresses, ranges, or subnets from which requests are admitted
2121
+ Exceptions to network rules, where requests are admitted with no checks, as long as the request originates from a trusted service
2222

23-
Network access and firewall rules aren't required, but it's a security best practice to include the network layer.
23+
Network rules aren't required, but it's a security best practice to add them.
2424

25-
This article explains how to configure network access to a search service's public endpoint. To block *all* access through the public endpoint, use [private endpoints](service-create-private-endpoint.md) and an Azure virtual network.
25+
Network rules are scoped to data plane operations. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
2626

27-
Network access rules are scoped to data plane operations. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
27+
This article explains how to configure network access to a search service's public endpoint. To block *all* access to the public endpoint, use [private endpoints](service-create-private-endpoint.md) and an Azure virtual network.
2828

2929
This article assumes the Azure portal for network access configuration. You can also use the [Management REST API](/rest/api/searchmanagement/), [Azure PowerShell](/powershell/module/az.search), or the [Azure CLI](/cli/azure/search).
3030

@@ -118,7 +118,7 @@ For managed identities on Azure OpenAI and Azure Machine Learning:
118118

119119
For managed identities on Azure AI services:
120120

121-
1. [Find your multiservice account](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.CognitiveServices%2Faccounts/).
121+
1. [Find your multiservice account](https://ms.portal.azure.com/#view/Microsoft_Azure_ProjectOxford/CognitiveServicesHub/~/AIServices).
122122
1. On the leftmost pane, under **Resource management**, select **Identity**.
123123
1. Set **System-assigned** to **On**.
124124

0 commit comments

Comments
 (0)