Skip to content

Commit dda5cd9

Browse files
committed
obscuring PII
1 parent 542ff09 commit dda5cd9

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed
8.46 KB
Loading

articles/search/service-configure-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,16 +54,16 @@ This article assumes the Azure portal for network access configuration. You can
5454

5555
1. Add other client IP addresses for other devices and services that send requests to a search service.
5656

57-
The Azure portal supports IP addresses and IP address ranges in the CIDR format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255.
57+
IP addresses and ranges are in the CIDR format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255.
5858

5959
If your search client is a static web app on Azure, see [Inbound and outbound IP addresses in Azure App Service](/azure/app-service/overview-inbound-outbound-ips#find-outbound-ips). For Azure functions, see [IP addresses in Azure Functions](/azure/azure-functions/ip-addresses).
6060

61-
1. Under **Exceptions**, select **Allow Azure services on the trusted services list to access this search service**. These services must be configured to run under a managed identity (system or user-assigned, but usually system):
61+
1. Under **Exceptions**, select **Allow Azure services on the trusted services list to access this search service**. The trusted service list includes:
6262

6363
+ `Microsoft.CognitiveServices` for Azure OpenAI and Azure AI services
6464
+ `Microsoft.MachineLearningServices` for Azure Machine Learning
6565

66-
You take a dependency on Microsoft Entra ID authentication and role assignments if you choose the trusted service exception. See [Grant access to trusted services](#grant-access-to-trusted-azure-services) for details.
66+
You take a dependency on Microsoft Entra ID authentication, managed identities, and role assignments if you choose the trusted service exception. See [Grant access to trusted services](#grant-access-to-trusted-azure-services) for details.
6767

6868
1. **Save** your changes.
6969

@@ -102,7 +102,7 @@ For ping, the request times out, but the IP address is visible in the response.
102102

103103
## Grant access to trusted Azure services
104104

105-
Did you select the trusted services exception? If yes, your Azure resource must have a managed identity (either system or user-assigned), and you must use role-based access controls.
105+
Did you select the trusted services exception? If yes, your Azure resource must have a managed identity (either system or user-assigned, but usually system), and you must use role-based access controls.
106106

107107
Azure resources on the trusted service list include:
108108

0 commit comments

Comments
 (0)