Skip to content

Commit 6e174cb

Browse files
committed
more rephrasing
1 parent f792c3f commit 6e174cb

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/search/search-manage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,21 +53,21 @@ On a new search service, we recommend these configuration tasks.
5353

5454
### Enable role-based access
5555

56-
A search service is always created with [API keys](search-security-api-keys.md). An admin API key grants read-write access to all data plane operations. You can't delete admin API keys but you can [disable API keys](search-security-enable-roles.md#disable-api-key-authentication) if you want all users to access data plane operations through role assignments.
56+
A search service is always created with [API keys](search-security-api-keys.md) and uses key-based authentication by default. However, using Microsoft Entra ID and role assignments is a more secure option because it eliminates storing and passing keys in plain text.
5757

58-
1. [Enable roles](search-security-enable-roles.md) on your search service.
58+
1. [Enable roles](search-security-enable-roles.md) on your search service. We recommend the roles-only option.
5959

6060
1. For administration, [assign data plane roles](search-security-rbac.md) to replace the functionality lost when you disable API keys. Role assignments include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need all three.
6161

6262
Sometimes it can take five to ten minutes for role assignments to take effect. Until that happens, the following message appears in the portal pages used for data plane operations.
6363

6464
:::image type="content" source="media/search-security-rbac/you-do-not-have-access.png" alt-text="Screenshot of portal message indicating insufficient permissions.":::
6565

66-
1. [Add more role assignments](search-security-rbac.md) for developers and apps.
66+
1. Continue to [add more role assignments](search-security-rbac.md) for solution developers and apps.
6767

6868
### Configure a managed identity
6969

70-
If you plan to use indexers for automated indexing, applied AI, or integrated vectorization, you should [configure the search service to use a managed identity](search-howto-managed-identities-data-sources.md). You can then add role assignments on other Azure services that authorize your search service for access to data and operations.
70+
If you plan to use indexers for automated indexing, applied AI, or integrated vectorization, you should [configure the search service to use a managed identity](search-howto-managed-identities-data-sources.md). You can then add role assignments on other Azure services that authorize your search service to access data and operations.
7171

7272
For integrated vectorization, a search service identity needs:
7373

articles/search/search-security-enable-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Roles for service administration (control plane) are built in and can't be enabl
2525
2626
## Prerequisites
2727

28-
+ **Owner**, **User Access Administrator**, or a custom role with [Microsoft.Authorization/roleAssignments/write](/azure/templates/microsoft.authorization/roleassignments) permissions.
28+
+ Owner, User Access Administrator, or a custom role with [Microsoft.Authorization/roleAssignments/write](/azure/templates/microsoft.authorization/roleassignments) permissions.
2929

3030
+ A search service in any region, on any tier, including free.
3131

@@ -53,7 +53,7 @@ Once role-based access is enabled, the search service recognizes an **authorizat
5353
| Role-based access control | Requires membership in a role assignment to complete the task. It also requires an authorization header on the request. |
5454
| Both | Requests are valid using either an API key or role-based access control, but if you provide both in the same request, the API key is used. |
5555

56-
1. If you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need all three roles if you want equivalent access.
56+
1. As an administrator, if you choose a roles-only approach, [assign data plane roles](search-security-rbac.md) to your user account to restore full administrative access over data plane operations in the Azure portal. Roles include Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader. You need all three roles if you want equivalent access.
5757

5858
Sometimes it can take five to ten minutes for role assignments to take effect. Until that happens, the following message appears in the portal pages used for data plane operations.
5959

articles/search/service-configure-firewall.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ ms.date: 06/18/2024
1818
As soon as you install Azure AI Search, you can set up network access to limit access to an approved set of devices and cloud services. There are two mechanisms:
1919

2020
+ Inbound rules listing the IP addresses, ranges, or subnets from which requests are admitted
21-
+ Exceptions to network rules, where requests are admitted with no checks, as long as the request originates from a trusted service
21+
+ Exceptions to network rules, where requests are admitted with no checks, as long as the request originates from a [trusted service](#grant-access-to-trusted-azure-services)
2222

2323
Network rules aren't required, but it's a security best practice to add them.
2424

25-
Network rules are scoped to data plane operations. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
25+
Network rules are scoped to data plane operations against the search service's public endpoint. Data plane operations include creating or querying indexes, and all other actions described by the [Search REST APIs](/rest/api/searchservice/). Control plane operations target service administration. Those operations specify resource provider endpoints, which are subject to the [network protections supported by Azure Resource Manager](/security/benchmark/azure/baselines/azure-resource-manager-security-baseline).
2626

2727
This article explains how to configure network access to a search service's public endpoint. To block *all* data plane access to the public endpoint, use [private endpoints](service-create-private-endpoint.md) and an Azure virtual network.
2828

@@ -63,7 +63,7 @@ This article assumes the Azure portal for network access configuration. You can
6363
+ `Microsoft.CognitiveServices` for Azure OpenAI and Azure AI services
6464
+ `Microsoft.MachineLearningServices` for Azure Machine Learning
6565

66-
When you enable this exception, you take a dependency on Microsoft Entra ID authentication, managed identities, and role assignments if you choose the trusted service exception. Any Azure AI service or AML feature that has a valid role assignment can pass the firewall. See [Grant access to trusted services](#grant-access-to-trusted-azure-services) for more details.
66+
When you enable this exception, you take a dependency on Microsoft Entra ID authentication, managed identities, and role assignments. Any Azure AI service or AML feature that has a valid role assignment can pass the firewall. See [Grant access to trusted services](#grant-access-to-trusted-azure-services) for more details.
6767

6868
1. **Save** your changes.
6969

0 commit comments

Comments
 (0)