You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/openai/how-to/network-security-perimeter.md
+15-18Lines changed: 15 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,28 +30,31 @@ You can add an Azure OpenAI service to a network security perimeter in the Azure
30
30
31
31
* For an Azure OpenAI service within a network security perimeter, the resource must use a system or user-assigned managed identity and have a role assignment that permits read-access to data sources.
32
32
33
+
* Consider securing with NSP when configuring Azure Blob Storage for Azure OpenAI. Azure OpenAI now supports using Azure Blob Storage for Azure OpenAI Batch input and output files. Secure communications with Blob Storage and Azure OpenAI by placing both resources in the same perimeter. For more on the Azure OpenAI Batch and Blob Storage scenario, see [Configuring Azure Blob Storage for Azure OpenAI](batch-blob-storage).
34
+
35
+
33
36
## Prerequisites
34
37
35
38
> [!CAUTION]
36
39
> Make sure you fully understand the limitations and impact to your Azure Subscription listed in the previous section before registering the preview feature.
37
40
38
-
1. Contact your Microsoft rep to allowlist your Azure subscription with the following feature flags:
39
-
40
-
|Namespace |Feature name | Description |
41
-
|---------|---------|
42
-
|`Microsoft.CognitiveServices`|`OpenAI.NspPreview`| Allow your Azure subscription to add Azure OpenAI resource into NSP.|
43
-
44
-
To check if the feature flags are allowlisted, use command `az feature registration list`.
41
+
Register the Network Security Perimeter feature from the the Azure portal Preview features. The feature names are the following:
42
+
* OpenAI.NspPreview
43
+
* AllowNSPInPublicPreview
44
+
45
+
Or use the following CLI comands to register the two Preview features
2. Register the Network Security Perimeter feature from the Azure portal Preview features. The feature name is `AllowNSPInPublicPreview`. After registration, wait for 2 hours to take effect.
49
+
Ensure the `Microsoft.CognitiveServices` and `Microsoft.Network` providers are registered. After registration, wait for 2 hours to take effect. To check if the feature flags are allowlisted, use command `az feature registration list`.
47
50
48
51
### Configure managed identity on your Azure OpenAI account
49
52
To allow your Storage account to recognize your Azure OpenAI service via Microsoft Entra ID authentication, you need to enable the managed identity for your Azure OpenAI service. The easiest way is to toggle on system assigned managed identity on Azure portal. The required role for your Storage account is “Storage Blob Data Contributor.” Ensure the role is assigned to your Storage account from your Azure OpenAI account.
50
53
51
54
## Assign an Azure OpenAI account to a network security perimeter
52
55
Azure Network Security Perimeter allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and Azure SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules.
53
56
54
-
You can add Azure OpenAI to a network security perimeter so that all indexing and query requests occur within the security boundary.
57
+
You can add Azure OpenAI to a network security perimeter so that all requests occur within the security boundary.
55
58
56
59
1. In the Azure portal, find the network security perimeter service for your subscription.
57
60
2. Select **Associated Resources** from the left-hand menu.
@@ -126,9 +129,7 @@ Here's an example of the `network-security-perimeterPublicInboundResourceRulesAl
| ResultDescription | Name of the network access operation |`POST /indexes/my-index/docs/Azure OpenAI`|
130
132
| Profile | Which network security perimeter the Azure OpenAI service was associated with |`defaultProfile`|
131
-
| ServiceResourceId | Resource ID of the Azure OpenAI service |`Azure OpenAI-service-resource-id`|
132
133
| Matched Rule | JSON description of the rule that was matched by the log |`{ "accessRule": "IP firewall" }`|
133
134
| SourceIPAddress | Source IP of the inbound network access, if applicable |`1.1.1.1`|
134
135
| AccessRuleVersion | Version of the network-security-perimeter access rules used to enforce the network access rules | 0 |
@@ -141,8 +142,6 @@ Within the perimeter, all resources have mutual access at the network level. You
141
142
142
143
For resources outside of the network security perimeter, you must specify inbound and outbound access rules. Inbound rules specify which connections to allow in, and outbound rules specify which requests are allowed out.
143
144
144
-
The Azure OpenAI service accepts inbound requests from apps like Azure AI Foundry portal, Azure Machine Learning prompt flow, and any app that sends indexing or query requests. The Azure OpenAI service sends outbound requests during indexer-based indexing and skill set execution. This section explains how to set up inbound and outbound access rules for Azure AI Azure OpenAI scenarios.
145
-
146
145
> [!NOTE]
147
146
> Any service associated with a network security perimeter implicitly allows inbound and outbound access to any other service associated with the same network security perimeter when that access is authenticated using managed identities and role assignments. Access rules only need to be created when allowing access outside of the network security perimeter, or for authenticated access using API keys.
148
147
@@ -188,9 +187,7 @@ To add an inbound access rule in the Azure portal:
188
187
189
188
### Add an outbound access rule
190
189
191
-
The Azure OpenAI service makes outbound calls during indexer-based indexing and skill set execution. If your indexer data sources, Azure AI services, or custom skill logic is outside of the network security perimeter, you should create an outbound access rule that allows your Azure OpenAI service to make the connection.
192
-
193
-
Recall that in public preview, Azure AI Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If your indexers use other data sources, you need an outbound access rule to support that connection.
190
+
Recall that in public preview, Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If you want to use other data sources, you need an outbound access rule to support that connection.
194
191
195
192
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as `mystorageaccount.blob.core.windows.net`.
196
193
@@ -240,11 +237,11 @@ To test your connection through network security perimeter, you need access to a
240
237
241
238
3. Using the IP address, you can create an __inbound access rule__ for that IP address to allow access. You can skip this step if you're using private link.
242
239
243
-
4. Finally, try navigating to the Azure OpenAI service in the Azure portal. If you can view the indexes successfully, then the network security perimeter is configured correctly.
240
+
4. Finally, try navigating to the Azure OpenAI service in the Azure portal. Open Azure OpenAI service in Azure AI Foundry. Deploy a model and chat with the model in the Chat Playground. If you receive a response, then the network security perimeter is configured correctly.
244
241
245
242
## View and manage network security perimeter configuration
246
243
247
-
You can use the [Network Security Perimeter Configuration REST APIs](/rest/api/searchmanagement/network-security-perimeter-configurations?view=rest-searchmanagement-2024-06-01-preview&preserve-view=true) to review and reconcile perimeter configurations. **Be sure to use preview API version**`2024-10-01`.
244
+
You can use the Network Security Perimeter Configuration REST APIs to review and reconcile perimeter configurations. **Be sure to use preview API version**`2024-10-01`.
0 commit comments