Skip to content

Commit 7b01f1b

Browse files
Merge pull request #3812 from meerakurup/patch-8
Update how-to-managed-network.md
2 parents 624a4b4 + 0ab7b98 commit 7b01f1b

File tree

1 file changed

+28
-10
lines changed

1 file changed

+28
-10
lines changed

articles/machine-learning/how-to-managed-network.md

Lines changed: 28 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1032,9 +1032,6 @@ To allow installation of __Python packages for training and deployment__, add ou
10321032

10331033
If you plan to use __Visual Studio Code__ with Azure Machine Learning, add outbound _FQDN_ rules to allow traffic to the following hosts:
10341034

1035-
> [!WARNING]
1036-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
1037-
10381035
> [!NOTE]
10391036
> This isn't a complete list of the hosts required for all Visual Studio Code resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario. For a complete list of host names, see [Network Connections in Visual Studio Code](https://code.visualstudio.com/docs/setup/network).
10401037

@@ -1091,9 +1088,6 @@ For more information, see [Configure private link](how-to-configure-private-link
10911088

10921089
## Private endpoints
10931090

1094-
> [!IMPORTANT]
1095-
> As of April 30th 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure Machine Learning workspace's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the workspace's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your workspace's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
1096-
10971091
Private endpoints are currently supported for the following Azure services:
10981092

10991093
* Azure Machine Learning
@@ -1119,8 +1113,34 @@ When you create a private endpoint, you provide the _resource type_ and _subreso
11191113

11201114
When you create a private endpoint for Azure Machine Learning dependency resources, such as Azure Storage, Azure Container Registry, and Azure Key Vault, the resource can be in a different Azure subscription. However, the resource must be in the same tenant as the Azure Machine Learning workspace.
11211115

1122-
> [!IMPORTANT]
1123-
> When configuring private endpoints for an Azure Machine Learning managed VNet, the private endpoints are only created when created when the first _compute is created_ or when managed VNet provisioning is forced. For more information on forcing the managed VNet provisioning, see [Configure for serverless Spark jobs](#manually-provision-a-managed-vnet).
1116+
When configuring private endpoints for the workspace, they are only created when the first _compute is created_ or when managed virtual network provisioning is forced. For more information on forcing the managed virtual network provisioning, see [Manually provision the network](#manually-provision-a-managed-vnet).
1117+
1118+
### Approval of private endpoints
1119+
1120+
To establish Private Endpoint connections in managed virtual networks using Azure Machine Learning, the workspace managed identity, whether system-assigned or user-assigned, must have permissions to approve the Private Endpoint connections on the target resources. Previously, this was done through automatic role assignments by the Azure Machine Learning service. However, there are security concerns about the automatic role assignment. To improve security, starting April 30th, 2025, we will discontinue this automatic permission grant logic. We recommend assigning the Azure AI Enterprise Network Connection Approver role or a custom role with the necessary Private Endpoint connection permissions on the target resource types and grant this role to the Azure Machine Learning workspace's managed identity to allow Azure Machine Learning services to approve Private Endpoint connections to the target Azure resources.
1121+
1122+
Here's the list of private endpoint target resource types covered by covered by the Azure AI Enterprise Network Connection Approver role:
1123+
* Azure Application Gateway
1124+
* Azure Monitor
1125+
* Azure AI Search
1126+
* Event Hubs
1127+
* Azure SQL Database
1128+
* Azure Storage
1129+
* Azure Machine Learning workspace
1130+
* Azure Machine Learning registry
1131+
* Azure AI Foundry
1132+
* Azure Key Vault
1133+
* Azure CosmosDB
1134+
* Azure Database for MySQL
1135+
* Azure Database for PostgreSQL
1136+
* Azure AI Services
1137+
* Azure Cache for Redis
1138+
* Container Registry
1139+
* API Management
1140+
1141+
For creating Private Endpoint outbound rules to target resource types not covered by the Azure AI Enterprise Network Connection Approver role, such as Azure Data Factory, Azure Databricks, and Azure Function Apps, a custom scoped-down role is recommended, defined only by the actions necessary to approve private endpoint connections on the target resource types.
1142+
1143+
For creating Private Endpoint outbound rules to default workspace resources, the required permissions are automatically covered by the role assignments granted during workspace creation, so no additional action is needed.
11241144

11251145
## Select an Azure Firewall version for allowed only approved outbound
11261146

@@ -1187,8 +1207,6 @@ The Azure Machine Learning managed virtual network feature is free. However, you
11871207
* FQDN outbound rules only support ports 80 and 443.
11881208
* If your compute instance is in a managed network and is configured for no public IP, use the `az ml compute connect-ssh` command to connect to it using SSH.
11891209
* When using Managed virtual network, you can't deploy compute resources inside your custom virtual network. Compute resources can only be created inside the managed virtual network.
1190-
* Managed network isolation can't establish a private connection from the managed virtual network to a user's on-premises resources.
1191-
For the list of supported private connections, see [Private Endpoints](/azure/machine-learning/how-to-managed-network?view=azureml-api-2&tabs=azure-cli&preserve-view=true#private-endpoints).
11921210
* If your managed network is configured to __allow only approved outbound__, you can't use an FQDN rule to access Azure Storage Accounts. You must use a private endpoint instead.
11931211
* Ensure to allowlist Microsoft-managed private endpoints created for the managed virtual network in your custom policy.
11941212

0 commit comments

Comments
 (0)