Skip to content

Commit ed1a86a

Browse files
committed
tweaked a description
1 parent b43e15a commit ed1a86a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/search/search-security-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article describes the security features in Azure Cognitive Search that prot
1818

1919
## Data flow (network traffic patterns)
2020

21-
A search service is hosted on Azure and is typically accessed by client applications using public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry and outbound traffic is necessary background for protecting your development and production environments.
21+
A Cognitive Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
2222

2323
Cognitive Search has three basic network traffic patterns:
2424

@@ -30,7 +30,7 @@ Cognitive Search has three basic network traffic patterns:
3030

3131
Inbound requests that target a search service endpoint consist of:
3232

33-
+ Creating and managing objects
33+
+ Creating and managing indexes, indexers, and other objects
3434
+ Sending requests for indexing, running indexer jobs, executing skills
3535
+ Querying an index
3636

@@ -44,12 +44,12 @@ Outbound requests from a search service to other applications are typically made
4444

4545
+ Search, on behalf of an indexer, connects to external data sources to read in data for indexing.
4646
+ Search, on behalf of an indexer, writes to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47-
+ A custom skill runs external code that's hosted off-service. The request for external processing is sent during skillset execution.
47+
+ A custom skill connects to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
4848
+ Search connects to Azure Key Vault for a customer-managed key used to encrypt and decrypt sensitive data.
4949

50-
Outbound connections can be made using a resource's full access connection string that includes a shared access key or a database login, or a managed identity if you're using Azure Active Directory.
50+
Outbound connections can be made using a resource's full access connection string that includes a key or a database login, or a managed identity if you're using Azure Active Directory.
5151

52-
If your Azure resource is behind a firewall, you'll need to create rules that admit indexer or service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
52+
If your Azure resource is behind a firewall, you'll need to create rules that admit search service requests. For resources protected by Azure Private Link, you can create a shared private link that an indexer uses to make its connection.
5353

5454
### Internal traffic
5555

0 commit comments

Comments
 (0)