You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-foundry/how-to/configure-managed-network.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -747,18 +747,19 @@ __Private endpoints__:
747
747
* When the isolation mode for the managed virtual network is`Allow internet outbound`, private endpoint outbound rules are automatically created as required rules from the managed virtual network for the hub and associated resources __with public network access disabled__ (Key Vault, Storage Account, Container Registry, hub).
748
748
* When the isolation mode for the managed virtual network is`Allow only approved outbound`, private endpoint outbound rules are automatically created as required rules from the managed virtual network for the hub and associated resources __regardless of public network access mode for those resources__ (Key Vault, Storage Account, Container Registry, hub).
749
749
750
-
__Outbound__ service tag rules:
751
-
752
-
*`AzureActiveDirectory`
753
-
*`Azure Machine Learning`
754
-
*`BatchNodeManagement.region`
755
-
*`AzureResourceManager`
756
-
*`AzureFrontDoor.FirstParty`
757
-
*`MicrosoftContainerRegistry`
758
-
*`AzureMonitor`
759
-
760
-
__Inbound__ service tag rules:
761
-
*`AzureMachineLearning`
750
+
For Azure AI Foundry to run with private networking, there are a set of required service tags. There are no alternatives to replacing required service tags. The following table describes each required service tag and its purpose within Azure AI Foundry.
751
+
752
+
| Service tag rule | Inbound or Outbound | Purpose |
753
+
|-----------|-----|-----|
754
+
|`AzureMachineLearning`| Inbound | Create, update, and delete of Azure AI Foundry compute instance/cluster. |
755
+
|`AzureMachineLearning`| Outbound | Using Azure Machine Learning services. Python intellisense in notebooks uses port 18881. Creating, updating, and deleting an Azure Machine Learning compute instance uses port 5831. |
756
+
|`AzureActiveDirectory`| Outbound | Authentication using Microsoft Entra ID. |
757
+
|`BatchNodeManagement.region`| Outbound | Communication with Azure Batch back-end for Azure AI Foundry compute instances/clusters. |
758
+
|`AzureResourceManager`| Outbound | Creation of Azure resources with Azure AI Foundry, Azure CLI, and Azure AI Foundry SDK. |
759
+
|`AzureFrontDoor.FirstParty`| Outbound | Access docker images provided by Microsoft. |
760
+
|`MicrosoftContainerRegistry`| Outbound | Access docker images provided by Microsoft. Setup of the Azure AI Foundry router for Azure Kubernetes Service. |
761
+
|`AzureMonitor`| Outbound | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't secured Azure Monitor for the workspace. This outbound is also used to log information for support incidents. |
762
+
|`VirtualNetwork`| Outbound | Required when private endpoints are present in the virtual network or peered virtual networks. |
762
763
763
764
## List of scenario specific outbound rules
764
765
@@ -853,7 +854,7 @@ When you create a private endpoint for hub dependency resources, such as Azure S
853
854
A private endpoint is automatically created for a connection if the target resource is an Azure resource listed previously. A valid target IDis expected for the private endpoint. A valid target IDfor the connection can be the Azure Resource Manager ID of a parent resource. The target IDis also expected in the target of the connection orin`metadata.resourceid`. For more on connections, see [How to add a new connection in Azure AI Foundry portal](connections-add.md).
854
855
855
856
> [!IMPORTANT]
856
-
> As of March 31st2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
857
+
> As of April 30th2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
857
858
858
859
## Select an Azure Firewall version for allowed only approved outbound
0 commit comments