Skip to content

Commit c4053fb

Browse files
committed
fixing doc bugs
1 parent 5212b93 commit c4053fb

4 files changed

+23
-8
lines changed

articles/search/search-howto-managed-identities-cosmos-db.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,22 @@ Indexer support for Azure Cosmos DB for Gremlin and MongoDB Collections is curre
3434
### [**Azure portal**](#tab/portal)
3535

3636
1. Sign in to Azure portal and find your Cosmos DB for NoSQL account.
37+
3738
1. Select **Access control (IAM)**.
39+
3840
1. Select **Add** and then select **Role assignment**.
39-
1. From the list of job function roles, assign the **Cosmos DB Account Reader**.
4041

41-
* Data Plane Role assignment: Follow [Data plane Role assignment](../cosmos-db/how-to-setup-rbac.md) to know more.
42+
1. From the list of job function roles, select **Cosmos DB Account Reader**.
43+
44+
1. Select **Next**.
45+
46+
1. Select **Managed identity** and then select **Members**.
47+
48+
1. Filter by system-assigned managed identities or user-assigned managed identities. You should see the managed identity that you previously created for your search service. If you don't have one, see [Configure search to use a managed identity](search-howto-managed-identities-data-sources.md). If you already set one up but it's not available, give it a few minutes.
49+
50+
1. Select the identity and save the role assignment.
51+
52+
For more information, see [Configure role-based access control with Microsoft Entra ID for your Azure Cosmos DB account](../cosmos-db/how-to-setup-rbac.md).
4253

4354
### [**PowerShell**](#tab/powershell)
4455

articles/search/search-howto-managed-identities-data-sources.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,9 @@ ms.date: 06/10/2024
1616

1717
# Configure a search service to connect using a managed identity in Azure AI Search
1818

19-
You can use Microsoft Entra ID and role assignments for outbound connections from Azure AI Search to resources providing data, applied AI, or vectorization during during indexing or queries.
19+
You can use Microsoft Entra ID and role assignments for outbound connections from Azure AI Search to resources providing data, applied AI, or vectorization during during indexing or queries. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
2020

21-
To use roles on an outbound connection, first configure your search service to use a managed identity. You can configure a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) as the security principle for your search service in a Microsoft Entra tenant.
22-
23-
Once you have a managed identity, the next step is to assign roles for authorized access. Managed identities and role assignments eliminate the need for passing secrets and credentials in a connection string or code.
21+
To use roles on an outbound connection, first configure your search service to use either a [system-assigned or user-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) as the security principle for your search service in a Microsoft Entra tenant. Once you have a managed identity, you can assign roles for authorized access.
2422

2523
## Prerequisites
2624

articles/search/search-howto-managed-identities-storage.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,11 @@ You can use a system-assigned managed identity or a user-assigned managed identi
3030
## Create a role assignment in Azure Storage
3131

3232
1. Sign in to Azure portal and find your storage account.
33+
3334
1. Select **Access control (IAM)**.
35+
3436
1. Select **Add** and then select **Role assignment**.
37+
3538
1. From the list of job function roles, select the roles needed for your search service:
3639

3740
| Task | Role assignment |
@@ -45,8 +48,11 @@ You can use a system-assigned managed identity or a user-assigned managed identi
4548
| Save debug session state | Add **Storage Blob Data Contributor** |
4649

4750
1. Select **Next**.
51+
4852
1. Select **Managed identity** and then select **Members**.
49-
1. Filter by system-assigned managed identities or user-assigned managed identities. If you don't have a managed identity, see [Configure search to use a managed identity](search-howto-managed-identities-data-sources.md). If you already set one up but it's not available, give it a few minutes.
53+
54+
1. Filter by system-assigned managed identities or user-assigned managed identities. You should see the managed identity that you previously created for your search service. If you don't have one, see [Configure search to use a managed identity](search-howto-managed-identities-data-sources.md). If you already set one up but it's not available, give it a few minutes.
55+
5056
1. Select the identity and save the role assignment.
5157

5258
## Specify a managed identity in a connection string

articles/search/search-security-enable-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.date: 06/10/2024
1616

1717
If you want to use Azure role-based access control for connections into Azure AI Search, this article explains how to enable it for your search service.
1818

19-
Role-based access for data plane operations is optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default. However, if you want to use role-based authentication for data plane operations, you must enable role-based access on your service.
19+
Role-based access for data plane operations is optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default. Before you can use role for data plane operations, you must enable role-based access on your search service.
2020

2121
Roles for service administration (control plane) are mandatory and can't be disabled.
2222

0 commit comments

Comments
 (0)