Skip to content

Commit f3afb44

Browse files
committed
reverted more changes
1 parent 13ac21f commit f3afb44

5 files changed

+13
-16
lines changed

articles/search/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@
332332
items:
333333
- name: Create a vector index
334334
href: vector-search-how-to-create-index.md
335-
- name: Index binary data for vector search (preview)
335+
- name: Index binary data for vector search
336336
href: vector-search-how-to-index-binary-data.md
337337
- name: Query vectors
338338
href: vector-search-how-to-query.md
@@ -466,9 +466,9 @@
466466
href: search-security-get-encryption-keys.md
467467
- name: Document-level security
468468
items:
469-
- name: Security filter pattern
469+
- name: Security filters
470470
href: search-security-trimming-for-azure-search.md
471-
- name: Set up a security filter using Microsoft Entra ID
471+
- name: Security filters with Microsoft Entra ID
472472
href: search-security-trimming-for-azure-search-with-aad.md
473473
- name: Development
474474
items:

articles/search/search-howto-index-sharepoint-online.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Here are the limitations of this feature:
5858

5959
+ Renaming a SharePoint folder doesn't trigger incremental indexing. A renamed folder is treated as new content.
6060

61-
+ SharePoint supports a granular authorization model that determines per-user access at the document level. The indexer doesn't pull these permissions into the index, and Azure AI Search doesn't support document-level authorization. When a document is indexed from SharePoint into a search service, the content is available to anyone who has read access to the index. If you require document-level permissions, you should consider [security filters to trim results](search-security-trimming-for-azure-search-with-aad.md) and automate copying the permissions at a file level to a field in the index.
61+
+ SharePoint supports a granular authorization model that determines per-user access at the document level. The indexer doesn't pull these permissions into the index, and Azure AI Search doesn't support document-level authorization. When a document is indexed from SharePoint into a search service, the content is available to anyone who has read access to the index. If you require document-level permissions, you should consider [security filters to trim results](search-security-trimming-for-azure-search.md) and automate copying the permissions at a file level to a field in the index.
6262

6363
+ Indexing user-encrypted files, Information Rights Management (IRM) protected files, ZIP files with passwords or similar encrypted content isn't supported. For encrypted content to be processed, the user with proper permissions to the specific file must remove the encryption so the item can be indexed accordingly when the indexer runs the next scheduled iteration.
6464

articles/search/search-security-overview.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -156,12 +156,7 @@ For multitenancy solutions requiring security boundaries at the index level, it'
156156

157157
User permissions at the document level, also known as *row-level security*, isn't natively supported in Azure AI Search. If you import data from an external system that provides row-level security, such as Azure Cosmos DB, those permissions won't transfer with the data as its being indexed by Azure AI Search.
158158

159-
If you require permissioned access over content in search results, there's a technique for applying filters that include or exclude documents based on user identity. This workaround adds a string field in the data source that represents a group or user identity, which you can make filterable in your index. The following table describes two approaches for trimming search results of unauthorized content.
160-
161-
| Approach | Description |
162-
|----------|-------------|
163-
|[Security trimming based on identity filters](search-security-trimming-for-azure-search.md) | Documents the basic workflow for implementing user identity access control. It covers adding security identifiers to an index, and then explains filtering against that field to trim results of prohibited content. |
164-
|[Security trimming based on Microsoft Entra identities](search-security-trimming-for-azure-search-with-aad.md) | This article expands on the previous article, providing steps for retrieving identities from Microsoft Entra ID, one of the [free services](https://azure.microsoft.com/free/) in the Azure cloud platform. |
159+
If you require permissioned access over content in search results, there's a technique for applying filters that include or exclude documents based on user identity. This workaround adds a string field in the data source that represents a group or user identity, which you can make filterable in your index. For more information about this pattern, see [Security trimming based on identity filters](search-security-trimming-for-azure-search.md).
165160

166161
## Data residency
167162

articles/search/search-security-trimming-for-azure-search-with-aad.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.date: 02/15/2024
1212
ms.custom:
1313
- devx-track-csharp
1414
- ignite-2023
15+
ROBOTS: NOINDEX,NOFOLLOW
1516
---
1617
# Security filters for trimming Azure AI Search results using Microsoft Entra tenants and identities
1718

articles/search/search-security-trimming-for-azure-search.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ A better solution is using the `search.in` function for security filters, as des
3939

4040
## Prerequisites
4141

42-
* A string field containing a group or user identity. It must have the filterable attribute. It should be a collection. It shouldn't allow nulls.
42+
* A string field containing a group or user identity, such as a Microsoft Entra object identifier.
4343

4444
* Other fields in the same document should provide the content that's accessible to that group or user. In the following JSON documents, the "security_id" fields contain identities used in a security filter, and the name, salary, and marital status are included if the identity of the caller matches the "security_id" of the document.
4545

@@ -50,14 +50,14 @@ A better solution is using the `search.in` function for security filters, as des
5050
"name": "Abram",
5151
"salary": 75000,
5252
"married": true,
53-
"security_id": "10011"
53+
"security_id": "alphanumeric-object-id-for-employee-1"
5454
},
5555
"Employee-2": {
5656
"employee_id": "200-2000-20-2-20000-2",
5757
"name": "Adams",
5858
"salary": 75000,
5959
"married": true,
60-
"security_id": "20022"
60+
"security_id": "alphanumeric-object-id-for-employee-2"
6161
}
6262
}
6363
```
@@ -66,7 +66,9 @@ A better solution is using the `search.in` function for security filters, as des
6666

6767
In the search index, within the fields collection, you need one field that contains the group or user identity, similar to the fictitious "security_id" field in the previous example.
6868

69-
1. Add a security field as a `Collection(Edm.String)`. Make sure it has a `filterable` attribute set to `true`. In this example, the security field is `group_ids`. It's populated with the string `["group_id1, group_id2"]`.
69+
1. Add a security field as a `Collection(Edm.String)`.
70+
71+
1. Set the field's `filterable` attribute set to `true`.
7072

7173
1. Set the field's `retrievable` attribute to `false` so that it isn't returned as part of the search request.
7274

@@ -187,7 +189,6 @@ This article describes a pattern for filtering results based on user identity an
187189

188190
For more examples, demos, and videos:
189191

190-
* [Configure document security for a chat app in Python](/azure/developer/python/get-started-app-chat-document-security-trim)
191-
* [Set up a security filter using Microsoft Entra ID](search-security-trimming-for-azure-search-with-aad.md)
192+
* [Get started with chat document security in Python](/azure/developer/python/get-started-app-chat-document-security-trim)
192193
* [Set up optional sign in and document level access control (modifications to the AzureOpenAIDemo app)](https://github.com/Azure-Samples/azure-search-openai-demo/blob/main/docs/login_and_acl.md)
193194
* [Video: Secure your Intelligent Applications with Microsoft Entra](https://build.microsoft.com/en-US/sessions/b5636ca7-64c2-493c-9b30-4a35852acfbe?source=/speakers/cc9b56a0-4af0-4b60-a2f3-8312c5b35ca2)

0 commit comments

Comments
 (0)