Skip to content

Commit 734f183

Browse files
authored
pull base content,head:MicrosoftDocs:main,into:wwlpublishsync
2 parents 45016fe + 931f3f6 commit 734f183

File tree

116 files changed

+697
-528
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

116 files changed

+697
-528
lines changed
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.understand-azure-ai-agent-service
3+
title: Understand the Azure AI Agent Service
4+
metadata:
5+
title: Understand the Azure AI Agent Service
6+
description: Learn about the Azure AI Agent Service.
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/1-understand-azure-ai-agent-service.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.secure-azure-ai-agent-service
3+
title: Securing the Azure AI Agent Service
4+
metadata:
5+
title: Securing the Azure AI Agent Service
6+
description: Understand the security controls that can be applied to the Azure AI Agent Service.
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/2-secure-azure-ai-agent-service.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.azure-ai-agent-service-role-based-access-control
3+
title: Azure AI Agent Service Role Based Access Control
4+
metadata:
5+
title: Azure AI Agent Service Role Based Access Control
6+
description: Learn to configure role-based access control for the Azure AI Agent Service.
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 7
12+
content: |
13+
[!include[](includes/3-azure-ai-agent-service-role-based-access-control.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.agent-service-network-access
3+
title: Agent Service and Network Access
4+
metadata:
5+
title: Agent Service and Network Access
6+
description: Learn to configure network access for the Azure AI Agent Service.
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/4-agent-service-network-access.md)]
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.knowledge-check
3+
title: Knowledge Check
4+
metadata:
5+
title: Knowledge Check
6+
description: Check your knowledge of the Azure AI Agent Service security controls.
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: Choose the best response for each question.
13+
quiz:
14+
questions:
15+
- content: "You want to configure an AI Agent Service agent so that outbound data movement is restricted to approved locations. On what resource should you configure this restriction?"
16+
choices:
17+
- content: "Azure AI Hub."
18+
isCorrect: true
19+
explanation: "Correct. You configure network restrictions for Azure Agents at the Azure AI Hub level"
20+
- content: "Virtual Network"
21+
isCorrect: false
22+
explanation: "Incorrect. You configure network restrictions for Azure Agents at the Azure AI Hub level"
23+
- content: "Private Endpoint."
24+
isCorrect: false
25+
explanation: "Incorrect. You configure network restrictions for Azure Agents at the Azure AI Hub level"
26+
- content: "You have disabled public network access to your Azure AI Hub. What steps can you take to configure and interact with the AI Agents deployed in one of the Hub's projects?"
27+
choices:
28+
- content: "Create a network security group."
29+
isCorrect: false
30+
explanation: "Incorrect. Network security groups aren't used to mediate access to Azure AI Hub."
31+
- content: "Deploy Azure Bastion."
32+
isCorrect: false
33+
explanation: "Incorrect. Azure bastion provides secure access to virtual machines. You would need to configure a private endpoint to allow access from the virtual machine to the Azure AI Hub and the projects and AI agents it hosts."
34+
- content: "Create a private endpoint."
35+
isCorrect: true
36+
explanation: "Correct. By creating a private endpoint, you can specify a virtual network and subnet through which you're able to access the Azure AI Hub, the projects it hosts, and AI Agents associated with those projects."
37+
- content: "Which role based access control role is the Azure AI Hub's system assigned managed identity assigned to by default?"
38+
choices:
39+
- content: "Azure AI Administrator."
40+
isCorrect: true
41+
explanation: "Correct. The Azure AI Hub's system assigned managed identity is assigned to the Azure AI Administrator role by default."
42+
- content: "Reader."
43+
isCorrect: false
44+
explanation: "Incorrect. The Azure AI Hub's system assigned managed identity is assigned to the Azure AI Administrator role by default."
45+
- content: "Azure AI Developer."
46+
isCorrect: false
47+
explanation: "Incorrect. The Azure AI Hub's system assigned managed identity is assigned to the Azure AI Administrator role by default."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-agent-service-security-controls.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: Module summary
7+
ms.date: 03/21/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 1
12+
content: |
13+
[!include[](includes/6-summary.md)]
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
Azure AI Agent Service is a fully managed service designed to empower developers to securely build, deploy, and scale high-quality, and extensible AI agents without needing to manage the underlying compute and storage resources. Tasks that can take hundreds of lines of code to support client side function calling can now be achieved with just a few lines of code with Azure AI Agent Service.
2+
3+
An AI Agent acts as a "smart" microservice that can be used to answer questions (Retrieval Augmented Generation), perform actions, or completely automate workflows. AI agents achieve this by combining the power of generative AI models to understand information resources with tools that allow that model to access and interact with real-world data sources.
4+
5+
Because Azure AI Agent Service is a service fully managed by Microsoft, you can focus on building workflows and the agents that power them without needing to worry about scaling, security, or management of the underlying infrastructure for individual agents.
6+
7+
As Azure AI Agent Service is a service managed by Microsoft and you don't need to worry about the underlying security of its moving parts, you should still apply standard security principals when you use the AI agent service. These principles include:
8+
9+
- Restrict access to the service using role based access control. Ensure that only appropriate security principals can interact with the AI agent service.
10+
- Restrict the access of the AI Agent service. The AI Agent service is interacting with sensitive resources, such as organizational data. Ensure that the scope of this access is limited and that the AI Agent service and its tools only have necessary visibility of resources such as data stores.
11+
- Restrict network access to the AI Agent service and the network access of the AI agent service. Limit which network hosts can interact with the AI Agent service and control which network hosts the AI Agent service and it's associated tools are able to reach.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
In Azure AI Foundry, Agents are associated with projects and projects are located within hubs. Hubs are the primary top-level Azure resource for Azure AI Foundry and provide a central way for a team to govern security, connectivity, and computing resources across playgrounds and projects. Typically, an IT Admin or technical lead manages a hub. These IT Admins or technical leads can use hubs to govern infrastructure, including virtual network setup, customer-managed keys, managed identities, and policies, and configure relevant Azure AI services. Once a hub is created, developers can create projects from it and access shared company resources without needing an IT administrator's repeated help.
2+
3+
Projects function as isolated development spaces, allowing developers and data scientists to build, test, and deploy AI systems. Each time a new project gets created within a hub, it automatically inherits that hub's security settings. Agents, being part of projects, can leverage the resources and configurations set at both the hub and project levels.
4+
5+
You can apply security controls through the Azure AI Foundry interface or by applying security controls through the Azure portal. When you deploy a hub and project, these resources are stored within a resource group in your Azure subscription. The Azure AI Foundry provides an abstracted way of interacting with these security controls without requiring an understanding of Azure administration principles. Azure AI Foundry allows you to configure role based access control roles. Within the Azure portal, you can configure the following security settings at the Azure AI Hub level:
6+
7+
- Role based access control
8+
- Network access
9+
- Monitoring alerts, metrics and logs
10+
11+
At the Azure AI project level, you can configure role based access control, monitoring alerts, metrics, and logs, but can't configure network access restrictions. In the majority of scenarios, you configure security controls related to Azure AI Agents Service agents at the hub level. When you need to have different sets of security controls, you host Azure AI Agent Service agents in different Azure AI hubs.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
Azure role-based access control (Azure RBAC) is used to manage access to Azure resources, such as the ability to create new resources or use existing ones. Users in your Microsoft Entra ID are assigned specific roles, which grant access to resources. Azure RBAC allows you to configure access to Azure AI Foundry hubs and projects and by extension agents that exist within those projects.
2+
3+
The Azure AI Foundry hub has built-in roles that are available by default.
4+
5+
| **Role** | **Description** |
6+
|---|---|
7+
| **Owner** | Full access to the hub, including the ability to manage and create new hubs and assign permissions. This role is automatically assigned to the hub creator |
8+
| **Contributor** | User has full access to the hub, including the ability to create new hubs, but isn't able to manage hub permissions on the existing resource. |
9+
| **Azure AI Administrator** | This role is automatically assigned to the system-assigned managed identity for the hub. The Azure AI Administrator role has the minimum permissions needed for the managed identity to perform its tasks. |
10+
| **Azure AI Developer** | Perform all actions except create new hubs and manage the hub permissions. For example, users can create projects, compute, and connections. Users can assign permissions within their project. Users can interact with existing Azure AI resources such as Azure OpenAI, Azure AI Search, and Azure AI services. |
11+
| **Azure AI Inference Deployment Operator** | Perform all actions required to create a resource deployment within a resource group. |
12+
| **Reader** | Read only access to the hub. This role is automatically assigned to all project members within the hub. |
13+
14+
Hubs have the system-assigned managed identity assigned to the Azure AI Administrator role. This role is more narrowly scoped to the minimum permissions needed for the managed identity to perform its tasks. This system-assigned managed identity is inherited at the project level. Depending on how an Azure AI Agent is configured, the process will use the system-assigned managed identity when accessing data sources or performing actions such as running code, running a custom function or an Azure function with the user's identity.
15+
16+
When a user is granted access to a project (for example, through the Azure AI Foundry portal permission management), two more roles are automatically assigned to the user. The first role is Reader on the hub. The second role is the Inference Deployment Operator role, which allows the user to create deployments on the resource group that the project is in.
17+
18+
The following table is an example of how to set up role-based access control for your Azure AI Foundry for an enterprise.
19+
20+
| **Persona** | **Role** | **Purpose** |
21+
|---|---|---|
22+
| **IT admin** | Owner of the hub | The IT admin can ensure the hub is set up to their enterprise standards. They can assign managers the Contributor role on the resource if they want to enable managers to make new hubs. Or they can assign managers the Azure AI Developer role on the resource to not allow for new hub creation. |
23+
| **Managers** | Contributor or Azure AI Developer on the hub | Managers can manage the hub, audit compute resources, audit connections, and create shared connections. |
24+
| **Team lead/Lead developer** | Azure AI Developer on the hub | Lead developers can create projects for their team and create shared resources (such as compute and connections) at the hub level. After project creation, project owners can invite other members. |
25+
| **Team members/developers** | Contributor or Azure AI Developer on the project | Developers can build and deploy AI models within a project and create assets that enable development such as computes and connections. |
26+
27+
You can add users and assign roles directly from Azure AI Foundry at either the hub or project level. In the management center, select Users in either the hub or project section, then select New user to add a user.
28+
29+
![A screenshot Role Based Access Control configuration for an Azure AI Foundary hub in the Azure portal.](../media/hub-user-role.png)
30+
31+
When you create a hub, the built-in role-based access control permissions grant you access to use the resource. However, if you wish to use resources outside of what was created on your behalf, you need to ensure both:
32+
33+
- The resource you're trying to use has permissions set up to allow you to access it.
34+
- Your hub is allowed to access it.
35+
36+
For example, if you're trying to consume a new Blob storage that isn't hosted within the associated Azure AI hub. In this circumstance, you need to ensure that hub's managed identity is added to the Blob Storage Reader role for the Blob. You'll also need to ensure that you have configured workplace managed outbound access to allow network communication to the endpoint associated with the blob storage. Network access configuration is covered in more detail by the next unit.
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
You configure network access for an Azure AI Agent associated with an Azure Foundry project at the Hub level. You can only configure network settings for a hub in the Azure portal and can't configure network settings in Azure Foundry.
2+
3+
You have the following options when configuring network access:
4+
5+
- Public access. Either allow public access from all networks including the internet or disable public access. If you disable public access, you need to access the hub, project, and AI Agent service through a private endpoint.
6+
- Private endpoint connections. Allows you to add private endpoints to access the hub, projects, and Azure AI Agents. When configuring private endpoint access, you can allow access from specific virtual networks and subnets. Private endpoints require a DNS address that can be hosted in a private DNS zone.
7+
- Workspace managed outbound access. When configuring outbound access for the Azure AI hub associated with the project that hosts the Azure AI Agent, you can choose
8+
- Disabled: Compute can access public resources and outbound data movement is unrestricted.
9+
- Allow Internet Outbound: Compute can access private resources and outbound data movement is unrestricted.
10+
- Allow Only Approved Outbound. Compute can access resources that specifically allowlisted and outbound data movement is restricted to approved addresses.
11+
12+
![Screenshot of Azure AI Hub networking configuraiton in Azure portal.](../media/networking-configuration.png)
13+
14+
To access your non-Azure resources located in a different virtual network or located entirely on-premises from your Azure AI Foundry's managed virtual network, you need to configure and deploy an Application Gateway. Through this Application Gateway, you can configure full end to end access to your resources. Once you configure the Application Gateway, you can create a private endpoint from the Azure AI Foundry hub's managed virtual network to the Application Gateway. With the private endpoint, the full end to end path is secured and not routed through the Internet.
15+
16+
![Architecture diagram of Application Gateway connection from Azure AI Foundary to external resources.](../media/ai-foundry-app-gateway.png)

0 commit comments

Comments
 (0)