Skip to content

Commit 8b2c028

Browse files
authored
Update network-security-perimeter.md
more updates to nsp doc
1 parent 8c88cc6 commit 8b2c028

File tree

1 file changed

+15
-18
lines changed

1 file changed

+15
-18
lines changed

articles/ai-services/openai/how-to/network-security-perimeter.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -30,28 +30,31 @@ You can add an Azure OpenAI service to a network security perimeter in the Azure
3030

3131
* For an Azure OpenAI service within a network security perimeter, the resource must use a system or user-assigned managed identity and have a role assignment that permits read-access to data sources.
3232

33+
* Consider securing with NSP when configuring Azure Blob Storage for Azure OpenAI. Azure OpenAI now supports using Azure Blob Storage for Azure OpenAI Batch input and output files. Secure communications with Blob Storage and Azure OpenAI by placing both resources in the same perimeter. For more on the Azure OpenAI Batch and Blob Storage scenario, see [Configuring Azure Blob Storage for Azure OpenAI](batch-blob-storage).
34+
35+
3336
## Prerequisites
3437

3538
> [!CAUTION]
3639
> Make sure you fully understand the limitations and impact to your Azure Subscription listed in the previous section before registering the preview feature.
3740
38-
1. Contact your Microsoft rep to allowlist your Azure subscription with the following feature flags:
39-
40-
|Namespace |Feature name | Description |
41-
|---------|---------|
42-
|`Microsoft.CognitiveServices` | `OpenAI.NspPreview` | Allow your Azure subscription to add Azure OpenAI resource into NSP.|
43-
44-
To check if the feature flags are allowlisted, use command `az feature registration list`.
41+
Register the Network Security Perimeter feature from the the Azure portal Preview features. The feature names are the following:
42+
* OpenAI.NspPreview
43+
* AllowNSPInPublicPreview
44+
45+
Or use the following CLI comands to register the two Preview features
46+
* `az feature registration create --name OpenAI.NspPreview --namespace Microsoft.CognitiveServices`
47+
* `az feature registration create --name AllowNSPInPublicPreview --namespace Microsoft.Network`
4548

46-
2. Register the Network Security Perimeter feature from the Azure portal Preview features. The feature name is `AllowNSPInPublicPreview`. After registration, wait for 2 hours to take effect.
49+
Ensure the `Microsoft.CognitiveServices` and `Microsoft.Network` providers are registered. After registration, wait for 2 hours to take effect. To check if the feature flags are allowlisted, use command `az feature registration list`.
4750

4851
### Configure managed identity on your Azure OpenAI account
4952
To allow your Storage account to recognize your Azure OpenAI service via Microsoft Entra ID authentication, you need to enable the managed identity for your Azure OpenAI service. The easiest way is to toggle on system assigned managed identity on Azure portal. The required role for your Storage account is “Storage Blob Data Contributor.” Ensure the role is assigned to your Storage account from your Azure OpenAI account.
5053

5154
## Assign an Azure OpenAI account to a network security perimeter
5255
Azure Network Security Perimeter allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and Azure SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules.
5356

54-
You can add Azure OpenAI to a network security perimeter so that all indexing and query requests occur within the security boundary.
57+
You can add Azure OpenAI to a network security perimeter so that all requests occur within the security boundary.
5558

5659
1. In the Azure portal, find the network security perimeter service for your subscription.
5760
2. Select **Associated Resources** from the left-hand menu.
@@ -126,9 +129,7 @@ Here's an example of the `network-security-perimeterPublicInboundResourceRulesAl
126129

127130
| **Column Name** | **Meaning** | **Example Value** |
128131
|------------------------|-----------------------------------------------------------------------------|------------------------------------------------|
129-
| ResultDescription | Name of the network access operation | `POST /indexes/my-index/docs/Azure OpenAI` |
130132
| Profile | Which network security perimeter the Azure OpenAI service was associated with | `defaultProfile` |
131-
| ServiceResourceId | Resource ID of the Azure OpenAI service | `Azure OpenAI-service-resource-id` |
132133
| Matched Rule | JSON description of the rule that was matched by the log | `{ "accessRule": "IP firewall" }` |
133134
| SourceIPAddress | Source IP of the inbound network access, if applicable | `1.1.1.1` |
134135
| AccessRuleVersion | Version of the network-security-perimeter access rules used to enforce the network access rules | 0 |
@@ -141,8 +142,6 @@ Within the perimeter, all resources have mutual access at the network level. You
141142

142143
For resources outside of the network security perimeter, you must specify inbound and outbound access rules. Inbound rules specify which connections to allow in, and outbound rules specify which requests are allowed out.
143144

144-
The Azure OpenAI service accepts inbound requests from apps like Azure AI Foundry portal, Azure Machine Learning prompt flow, and any app that sends indexing or query requests. The Azure OpenAI service sends outbound requests during indexer-based indexing and skill set execution. This section explains how to set up inbound and outbound access rules for Azure AI Azure OpenAI scenarios.
145-
146145
> [!NOTE]
147146
> Any service associated with a network security perimeter implicitly allows inbound and outbound access to any other service associated with the same network security perimeter when that access is authenticated using managed identities and role assignments. Access rules only need to be created when allowing access outside of the network security perimeter, or for authenticated access using API keys.
148147
@@ -188,9 +187,7 @@ To add an inbound access rule in the Azure portal:
188187

189188
### Add an outbound access rule
190189

191-
The Azure OpenAI service makes outbound calls during indexer-based indexing and skill set execution. If your indexer data sources, Azure AI services, or custom skill logic is outside of the network security perimeter, you should create an outbound access rule that allows your Azure OpenAI service to make the connection.
192-
193-
Recall that in public preview, Azure AI Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If your indexers use other data sources, you need an outbound access rule to support that connection.
190+
Recall that in public preview, Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If you want to use other data sources, you need an outbound access rule to support that connection.
194191

195192
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as `mystorageaccount.blob.core.windows.net`.
196193

@@ -240,11 +237,11 @@ To test your connection through network security perimeter, you need access to a
240237

241238
3. Using the IP address, you can create an __inbound access rule__ for that IP address to allow access. You can skip this step if you're using private link.
242239

243-
4. Finally, try navigating to the Azure OpenAI service in the Azure portal. If you can view the indexes successfully, then the network security perimeter is configured correctly.
240+
4. Finally, try navigating to the Azure OpenAI service in the Azure portal. Open Azure OpenAI service in Azure AI Foundry. Deploy a model and chat with the model in the Chat Playground. If you receive a response, then the network security perimeter is configured correctly.
244241

245242
## View and manage network security perimeter configuration
246243

247-
You can use the [Network Security Perimeter Configuration REST APIs](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) to review and reconcile perimeter configurations. **Be sure to use preview API version** `2024-10-01`.
244+
You can use the Network Security Perimeter Configuration REST APIs to review and reconcile perimeter configurations. **Be sure to use preview API version** `2024-10-01`.
248245

249246
## See also
250247

0 commit comments

Comments
 (0)