Skip to content

Commit b1f0375

Browse files
committed
more tweaks
1 parent ed1a86a commit b1f0375

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/search/search-howto-managed-identities-data-sources.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,17 @@ ms.date: 03/22/2022
1313

1414
# Connect a search service to other Azure resources using a managed identity
1515

16-
You can configure an Azure Cognitive Search connection to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment on the remote service. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection strings or code.
16+
You can configure an Azure Cognitive Search service to connect to other Azure resources using a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) and an Azure role assignment. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
1717

1818
## Prerequisites
1919

2020
+ A search service at the [Basic tier or above](search-sku-tier.md).
2121

22-
+ An Azure resource that accepts incoming requests from a managed identity having a valid role assignment.
22+
+ An Azure resource that accepts incoming requests from an Azure AD login that has a valid role assignment.
2323

2424
## Supported scenarios
2525

26-
Cognitive Search can use a system-assigned and user-assigned managed identity on outbound connections to Azure resources. A user-assigned managed identity is specified through an "identity" property.
26+
Cognitive Search can use a system-assigned or user-assigned managed identity on outbound connections to Azure resources. A system managed identity is indicated when a connection string is the unique resource ID of an Azure AD-aware service or application. A user managed identity is specified through an "identity" property.
2727

2828
| Scenario | System managed identity | User managed identity (preview) |
2929
|----------|-------------------------|---------------------------------|
@@ -172,15 +172,15 @@ If your Azure resource is behind a firewall, make sure there's an inbound rule t
172172
173173
+ For same-region connections to Azure Blob Storage or Azure Data Lake Storage Gen2, use the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md) to admit requests.
174174
175-
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md). See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
175+
+ For all other resources and connections, [configure an IP firewall rule](search-indexer-howto-access-ip-restricted.md) that admits requests from Search. See [Indexer access to content protected by Azure network security features](search-indexer-securing-resources.md) for more detail.
176176
177177
## Assign a role
178178
179179
A managed identity must be paired with an Azure role that determines permissions on the Azure resource.
180180
181181
+ Data reader permissions are needed for indexer data connections and for accessing a customer-managed key in Azure Key Vault.
182182
183-
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting session data, caching, and long-term content storage. These features include: enrichment cache and knowledge store.
183+
+ Contributor (write) permissions are needed for AI enrichment features that use Azure Storage for hosting debug session data, enrichment caching, and long-term content storage in a knowledge store.
184184
185185
The following steps are for Azure Storage. If your resource is Cosmos DB or Azure SQL, the steps are similar.
186186

0 commit comments

Comments
 (0)