You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-security-rbac.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -356,7 +356,7 @@ If you're already a Contributor or Owner of your search service, you can present
356
356
357
357
## Grant access to a single index
358
358
359
-
Insomescenarios, youmaywanttolimitapplication's access to a single resource, such as an index.
359
+
Insomescenarios, youmightwanttolimitanapplication's access to a single resource, such as an index.
360
360
361
361
Theportaldoesn't currently support role assignments at this level of granularity, but it can be done with [PowerShell](../role-based-access-control/role-assignments-powershell.md) or the [Azure CLI](../role-based-access-control/role-assignments-cli.md).
362
362
@@ -569,9 +569,9 @@ To enable a Conditional Access policy for Azure AI Search, follow the below step
569
569
> [!IMPORTANT]
570
570
>Ifyoursearchservicehasamanagedidentityassignedtoit, thespecificsearchservicewillshowupasacloudappthatcanbeincludedorexcludedaspartoftheConditionalAccesspolicy. ConditionalAccesspoliciescan't be enforced on a specific search service. Instead make sure you select the general **Azure AI Search** cloud app.
571
571
572
-
## Troubleshooting Azure RBAC issues
572
+
## Troubleshooting role-based access control issues
*Iftheauthorizationtokencamefroma [managedidentity](/entra/identity/managed-identities-azure-resources/overview) andtheappropriatepermissionswererecentlyassigned, it [maytakeseveralhours](https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/managed-identity-best-practice-recommendations#limitation-of-using-managed-identities-for-authorization) for these permissions assignments to actually be reflected.
*Iftheauthorizationtokencamefroma [managedidentity](/entra/identity/managed-identities-azure-resources/overview) andtheappropriatepermissionswererecentlyassigned, it [mighttakeseveralhours](/entra/identity/managed-identities-azure-resources/managed-identity-best-practice-recommendations#limitation-of-using-managed-identities-for-authorization) forthesepermissionsassignmentstotakeeffect.
577
+
*Thedefaultconfigurationforasearchserviceis [key-basedauthenticationonly](#configure-role-based-access-for-data-plane). Ifyoudidn't change the default key setting to **Both** or **Role-based access control**, then all requests using role-based authentication are automatically denied regardless of the underlying permissions.
0 commit comments