Skip to content

Commit 230eb22

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-ai-docs-pr into stp_final_prompt
2 parents 09bdddf + a8bfdd0 commit 230eb22

File tree

103 files changed

+2194
-2168
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+2194
-2168
lines changed

articles/ai-foundry/.openpublishing.redirection.ai-studio.json

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -920,8 +920,13 @@
920920
},
921921
{
922922
"source_path_from_root": "/articles/ai-foundry/openai/how-to/manage-costs.md",
923-
"redirect_url": "/azure/ai-foundry/foundry-models/how-to/manage-costs",
924-
"redirect_document_id": true
923+
"redirect_url": "/azure/ai-foundry/concepts/manage-costs",
924+
"redirect_document_id": false
925+
},
926+
{
927+
"source_path_from_root": "/articles/ai-foundry/foundry-models/how-to/manage-costs.md",
928+
"redirect_url": "/azure/ai-foundry/concepts/manage-costs",
929+
"redirect_document_id": false
925930
},
926931
{
927932
"source_path_from_root": "/articles/ai-studio/how-to/simulator-interaction-data.md",
@@ -1307,6 +1312,31 @@
13071312
"source_path_from_root": "/articles/ai-foundry/how-to/view-ai-red-teaming-results.md",
13081313
"redirect_url": "/azure/ai-foundry/how-to/develop/run-scans-ai-red-teaming-agent#viewing-ai-red-teaming-results-in-azure-ai-foundry-project-preview",
13091314
"redirect_document_id": false
1315+
},
1316+
{
1317+
"source_path_from_root": "/articles/ai-foundry/responsible-ai/speech-service/speaker-recognition/characteristics-and-limitations-speaker-recognition.md",
1318+
"redirect_url": "/azure/ai-services/speech-service/overview",
1319+
"redirect_document_id": false
1320+
},
1321+
{
1322+
"source_path_from_root": "/articles/ai-foundry/responsible-ai/speech-service/speaker-recognition/data-privacy-speaker-recognition.md",
1323+
"redirect_url": "/azure/ai-services/speech-service/overview",
1324+
"redirect_document_id": false
1325+
},
1326+
{
1327+
"source_path_from_root": "/articles/ai-foundry/responsible-ai/speech-service/speaker-recognition/guidance-integration-responsible-use-speaker-recognition.md",
1328+
"redirect_url": "/azure/ai-services/speech-service/overview",
1329+
"redirect_document_id": false
1330+
},
1331+
{
1332+
"source_path_from_root": "/articles/ai-foundry/responsible-ai/speech-service/speaker-recognition/limited-access-speaker-recognition.md",
1333+
"redirect_url": "/azure/ai-services/speech-service/overview",
1334+
"redirect_document_id": false
1335+
},
1336+
{
1337+
"source_path_from_root": "/articles/ai-foundry/responsible-ai/speech-service/speaker-recognition/transparency-note-speaker-recognition.md",
1338+
"redirect_url": "/azure/ai-services/speech-service/overview",
1339+
"redirect_document_id": false
13101340
}
13111341
]
13121342
}

articles/ai-foundry/agents/how-to/triggers.md

Lines changed: 87 additions & 91 deletions
Large diffs are not rendered by default.

articles/ai-foundry/concepts/authentication-options-ai-foundry.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ai.usage: ai-assisted
1212
---
1313

1414
# Authentication and authorization options in Azure AI Foundry
15-
15+
<!--
1616
Azure AI Foundry supports multiple authentication approaches to balance security, operational simplicity, and speed. This article explains the control plane and data plane model, compares API key and Microsoft Entra ID (formerly Azure AD) authentication, maps identities to roles, and describes common least privilege scenarios. Use this article with:
1717
1818
- [Role-based access control for Azure AI Foundry](rbac-azure-ai-foundry.md)
@@ -22,7 +22,6 @@ Azure AI Foundry supports multiple authentication approaches to balance security
2222
2323
> [!IMPORTANT]
2424
> Use Microsoft Entra ID for production workloads to enable conditional access, managed identities, and least privilege RBAC. API keys are convenient for quick evaluation and legacy tooling but lack user level traceability.
25-
2625
## Control plane vs. data plane
2726
2827
Azure services separate management (_control plane_) from runtime operations (_data plane_).
@@ -40,7 +39,6 @@ _Source file: control-data-plane.mmd (stored alongside the image for maintenance
4039
4140
> [!NOTE]
4241
> This diagram is conceptual. Check current service documentation for the latest supported resources and operations.
43-
4442
## Authentication methods
4543
4644
### API keys
@@ -72,7 +70,6 @@ Microsoft Entra ID uses OAuth 2.0 bearer tokens. Principals get tokens for the r
7270
7371
> [!IMPORTANT]
7472
> Validate features marked [**TO VERIFY**] against current release notes if you rely on them for compliance-critical scenarios.
75-
7673
| Capability or feature | API Key | Microsoft Entra ID | Notes |
7774
|---------------------|---------|--------------------|-------|
7875
| Basic model inference (chat, embeddings) | Yes | Yes | Fully supported. |
@@ -111,7 +108,6 @@ See the authoritative list in [Azure built-in roles (AI + machine learning)](/az
111108
112109
> [!TIP]
113110
> Create a custom role when a built-in role grants more permissions than you need.
114-
115111
## Set up Microsoft Entra ID
116112
117113
High-level steps. See the detailed guide: [Configure key-less authentication](../foundry-models/how-to/configure-entra-id.md).
@@ -177,4 +173,5 @@ Some creation workflows can auto assign broad roles, such as granting the resour
177173
- [Authenticate requests to Azure AI services](/azure/ai-services/authentication)
178174
- [Configure key-less authentication with Microsoft Entra ID](../foundry-models/how-to/configure-entra-id.md)
179175
- [Azure built-in roles (AI + machine learning)](/azure/role-based-access-control/built-in-roles#ai-+-machine-learning)
180-
- [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)
176+
- [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)
177+
-->
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
---
2+
title: Disable Preview Features with Role-Based Access
3+
description: Learn how to disable preview features in Azure AI Foundry using role-based access control (RBAC). Create custom roles to manage feature access effectively.
4+
#customer intent: As an IT admin, I want to disable preview features in Azure AI Foundry through role-based access control so that my organization complies with enterprise policies.
5+
author: jonburchel
6+
ms.author: jburchel
7+
ms.reviewer: meerakurup
8+
ms.date: 09/25/2025
9+
ms.topic: concept-article
10+
ms.service: azure-ai-foundry
11+
ai.usage: ai-assisted
12+
---
13+
14+
# Disable preview features in Azure AI Foundry with role-based access control
15+
16+
In Azure AI Foundry projects, some features are in preview. Administrators can bock access to them by denying specific data actions to a custom role, and granting their users role memberships to enable/disable specific features as required. This article lists the data actions for each preview feature so you can disable them on an individual basis. However, since you can't modify built-in roles in Azure AI Foundry projects, you need to create a custom role. For steps to create a custom role, see [Create or update Azure custom roles using the Azure portal - Azure RBAC](/azure/role-based-access-control/custom-roles-portal).
17+
18+
## Agents service data actions
19+
20+
Use these data actions in a custom role definition:
21+
22+
- `Microsoft.CognitiveServices/accounts/AIServices/agents/write`
23+
- `Microsoft.CognitiveServices/accounts/AIServices/agents/read`
24+
- `Microsoft.CognitiveServices/accounts/AIServices/agents/delete`
25+
26+
## Content understanding (multimodal intelligence)
27+
28+
The associated data actions to allow or disallow in your custom role
29+
definition are the following:
30+
31+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/analyzers/read`
32+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/analyzers/write`
33+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/analyzers/delete`
34+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/classifiers/read`
35+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/classifiers/write`
36+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/classifiers/delete`
37+
- `Microsoft.CognitiveServices/accounts/MultiModalIntelligence/batchAnalysisJobs/\*`
38+
- Optional: include the /labelingProjects data actions if your team labels documents in Foundry.
39+
40+
## Fine-tuning
41+
42+
The associated data actions to allow or disallow in your custom role
43+
definition are the following:
44+
45+
- `Microsoft.CognitiveServices/accounts/OpenAI/assistants/\*` (include
46+
_read_, _write_, and _delete_ and all child resources)
47+
- `Microsoft.CognitiveServices/accounts/OpenAI/assistants/files/\*`
48+
- `Microsoft.CognitiveServices/accounts/OpenAI/assistants/threads/\*`
49+
- `Microsoft.CognitiveServices/accounts/OpenAI/assistants/threads/messages/\*`
50+
- `Microsoft.CognitiveServices/accounts/OpenAI/assistants/vector_stores/\*`
51+
52+
## Tracing
53+
54+
Allow or deny the following data actions in the custom role definition.
55+
56+
Foundry’s Tracing pane uses Azure Monitor. In the custom role wizard, set the provider to Microsoft.Insights, then add or remove only the read actions you need:
57+
58+
- `Microsoft.Insights/alertRules/read`
59+
- `Microsoft.Insights/diagnosticSettings/read`
60+
- `Microsoft.Insights/logDefinitions/read`
61+
- `Microsoft.Insights/metricdefinitions/read`
62+
- `Microsoft.Insights/metrics/read`
63+
64+
## Evaluation data actions
65+
66+
The associated data actions to allow or disallow in your custom role
67+
definition are the following:
68+
69+
- `Microsoft.CognitiveServices/accounts/AIServices/evaluations/write`
70+
- `Microsoft.CognitiveServices/accounts/AIServices/evaluations/read`
71+
- `Microsoft.CognitiveServices/accounts/AIServices/evaluations/delete`
72+
73+
## Content safety risks and alerts
74+
75+
The associated data actions to allow or disallow in your custom role
76+
definition are the following
77+
78+
- `Microsoft.CognitiveServices/accounts/ContentSafety/\*`
79+
- …/`Analyze Text`
80+
- …/`Analyze Image`
81+
- …/`Analyze Protected Material`
82+
- …/`Unified Analyze`
83+
84+
## Related content
85+
86+
[Role-based access control for Azure AI Foundry](rbac-azure-ai-foundry.md)

0 commit comments

Comments
 (0)