You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Scenario: Enable access from selected IP Addresses
821
-
822
-
If you want to enable access from specific IP addresses, use the following actions:
823
-
824
-
1. Enable public network access to the Azure AI Studio Hub. For more information, see [public network access enabled](configure-private-link.md#enable-public-access).
825
-
1. Add your IP addresses to the firewall for Azure AI Studio. For more information, see [enable access only fromIP ranges](configure-private-link.md#enable-public-access-only-from-internet-ip-ranges).
826
-
827
-
> [!NOTE]
828
-
> Only IPv4 addresses are supported.
829
-
830
-
For more information, see [Configure private link](configure-private-link.md#enable-public-access-only-from-internet-ip-ranges).
831
-
832
820
## Private endpoints
833
821
834
822
Private endpoints are currently supported for the following Azure services:
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/configure-private-link.md
-63Lines changed: 0 additions & 63 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -234,69 +234,6 @@ az extension add --name ml
234
234
235
235
---
236
236
237
-
## Enable Public Access only from internet IP ranges
238
-
239
-
You can use IP network rules to allow access to your AI Studio hub and projects from specific public internet IP address ranges by creating IP network rules. Each Azure AI Studio hub supports up to 200 rules. These rules grant access to specific internet-based services and on-premises networks and block general internet traffic.
240
-
241
-
> [!WARNING]
242
-
> * You can only use IPv4 addresses.
243
-
> * To use this feature with Azure Machine Learning managed virtual network, see [Configure managed virtual network](configure-managed-network.md#scenario-enable-access-from-selected-ip-addresses).
244
-
> * If you are using serverless endpoints, your public network access is either enabled or disabled depending on the setting of your hub's public network access. For more information, visit [Serverless API endpoints](deploy-models-serverless.md#network-isolation).
245
-
246
-
# [Portal](#tab/azure-portal)
247
-
248
-
1. From the [Azure portal](https://portal.azure.com), select your Azure AI Studio hub.
249
-
1. From the left side of the page, select __Networking__ and then select the __Public access__ tab.
250
-
1. Select __Enabled from selected IP addresses__, input address ranges and then select __Save__.
251
-
252
-
:::image type="content" source="../media/how-to/network/workspace-public-access-ip-ranges.png" alt-text="Screenshot of the UI to enable access from internet IP ranges.":::
253
-
254
-
# [Azure CLI](#tab/cli)
255
-
256
-
Use the `az ml workspace network-rule` Azure CLI command to manage public access from an IP address or address range:
257
-
258
-
> [!TIP]
259
-
> The configurations for the selected IP addresses are stored in the workspace's properties, under `network_acls`:
260
-
> ```yml
261
-
> properties:
262
-
> # ...
263
-
> network_acls:
264
-
> description: "The network ACLS for this workspace, enforced when public_network_access is set to Enabled."
265
-
> $ref: "3/defintions/networkAcls"
266
-
> ```
267
-
268
-
- __List IP network rules__: `az ml workspace network-rule list --resource-group "myresourcegroup" --workspace-name "myWS" --query ipRules`
269
-
- __Add a rule for a single IP address__: `az ml workspace network-rule add --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.19"`
270
-
- __Add a rule for an IP address range__: `az ml workspace network-rule add --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.0/24"`
271
-
- __Remove a rule for a single IP address__: `az ml workspace network-rule remove --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.19"`
272
-
- __Remove a rule for an IP address range__: `az ml workspace network-rule remove --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.0/24"`
273
-
274
-
---
275
-
276
-
You can also use the [Workspace](/python/api/azure-ai-ml/azure.ai.ml.entities.workspace) class from the Azure Machine Learning [Python SDK](/python/api/overview/azure/ai-ml-readme) to define which IP addresses are allowed inbound access:
The following restrictions apply to IP address ranges:
287
-
288
-
- IP network rules are allowed only for _public internet_ IP addresses.
289
-
290
-
[Reserved IP address ranges](https://en.wikipedia.org/wiki/Reserved_IP_addresses) aren't allowed in IP rules such as private addresses that start with 10, 172.16 to 172.31, and 192.168.
291
-
292
-
- You must provide allowed internet address ranges by using [CIDR notation](https://tools.ietf.org/html/rfc4632) in the form 16.17.18.0/24 or as individual IP addresses like 16.17.18.19.
293
-
294
-
- Only IPv4 addresses are supported for configuration of storage firewall rules.
295
-
296
-
- When this feature is enabled, you can test public endpoints using any client tool such as Curl, but the Endpoint Test tool in the portal isn't supported.
297
-
298
-
- You can only set the IP addresses for the workspace after the workspace has been created.
299
-
300
237
## Managed identity configuration
301
238
302
239
A manged identity configuration is required if you make your storage account private. Our services need to read/write data in your private storage account using [Allow Azure services on the trusted services list to access this storage account](/azure/storage/common/storage-network-security#grant-access-to-trusted-azure-services) with following managed identity configurations. Enable the system assigned managed identity of Azure AI Service and Azure AI Search, then configure role-based access control for each managed identity.
0 commit comments