You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-security-rbac.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -356,7 +356,7 @@ If you're already a Contributor or Owner of your search service, you can present
356
356
357
357
## Grant access to a single index
358
358
359
-
Insomescenarios, youmaywanttolimitapplication's access to a single resource, such as an index.
359
+
Insomescenarios, youmightwanttolimitanapplication's access to a single resource, such as an index.
360
360
361
361
Theportaldoesn't currently support role assignments at this level of granularity, but it can be done with [PowerShell](../role-based-access-control/role-assignments-powershell.md) or the [Azure CLI](../role-based-access-control/role-assignments-cli.md).
362
362
@@ -500,7 +500,10 @@ The PowerShell example shows the JSON syntax for creating a custom role that's a
500
500
501
501
## Disable API key authentication
502
502
503
-
APIkeyscan't be deleted, but they can be disabled on your service if you'reusingtheSearchServiceContributor, SearchIndexDataContributor, andSearchIndexDataReaderrolesandMicrosoftEntraauthentication. DisablingAPIkeyscausesthesearchservicetorefusealldata-relatedrequeststhatpassanAPIkeyintheheader.
503
+
Keyaccess, orlocalauthentication, canbedisabledonyourserviceifyou're using the Search Service Contributor, Search Index Data Contributor, and Search Index Data Reader roles and Microsoft Entra authentication. Disabling API keys causes the search service to refuse all data-related requests that pass an API key in the header.
@@ -565,3 +568,10 @@ To enable a Conditional Access policy for Azure AI Search, follow the below step
565
568
566
569
> [!IMPORTANT]
567
570
>Ifyoursearchservicehasamanagedidentityassignedtoit, thespecificsearchservicewillshowupasacloudappthatcanbeincludedorexcludedaspartoftheConditionalAccesspolicy. ConditionalAccesspoliciescan't be enforced on a specific search service. Instead make sure you select the general **Azure AI Search** cloud app.
571
+
572
+
## Troubleshooting role-based access control issues
*Iftheauthorizationtokencamefroma [managedidentity](/entra/identity/managed-identities-azure-resources/overview) andtheappropriatepermissionswererecentlyassigned, it [mighttakeseveralhours](/entra/identity/managed-identities-azure-resources/managed-identity-best-practice-recommendations#limitation-of-using-managed-identities-for-authorization) forthesepermissionsassignmentstotakeeffect.
577
+
*Thedefaultconfigurationforasearchserviceis [key-basedauthenticationonly](#configure-role-based-access-for-data-plane). Ifyoudidn't change the default key setting to **Both** or **Role-based access control**, then all requests using role-based authentication are automatically denied regardless of the underlying permissions.
0 commit comments