Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Note
Azure AI Foundry support for network security perimeter is in public preview under supplemental terms of use. It's available in regions providing the feature. This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. Review the limitations and considerations section before you start.
Overview
Use a network security perimeter (NSP) to restrict data‑plane access to your Azure AI Foundry resource and group it with other protected PaaS resources. An NSP lets you:
- Enforce inbound and outbound access rules instead of broad public exposure.
- Reduce data exfiltration risk by containing traffic within a logical boundary.
- Centrally log network access decisions across associated resources.
This article gives only the Foundry-specific pointers you need. All procedural detail for creating perimeters, defining access rules, enabling logging, and using APIs lives in existing Azure networking documentation. Follow the links in each section for the authoritative steps.
Note
You must use a Azure AI Foundry project for this feature. A hub-based project isn't supported. See How do I know which type of project I have? and Create a Foundry project. To migrate your hub-based project to a Azure AI Foundry project, see Migrate from hub-based to Foundry projects.
Limitations and considerations (preview)
Summarized highlights (see linked docs for evolving preview limitations):
- Some Azure AI Foundry capabilities (for example fine-tuning and Assistants APIs) may be unavailable inside an enforced NSP boundary.
- NSP governs data plane traffic. Control plane (management) operations may still succeed unless separately restricted.
- Use a managed identity (system or user‑assigned) with appropriate role assignments for any data source access (for example Azure Blob Storage used for batch inputs/outputs).
- Co-locate dependent services (Azure OpenAI, Azure Storage, Azure AI Search, etc.) in the same NSP when you need mutual access with minimal outbound allow rules.
- Foundry Agent Service: Supported; Secured Standard Agents with full network isolation rely on Private Link and do not require or support NSP.
- Private Link takes precedence over NSP evaluation when both are configured; traffic resolves through Private Link first.
For more information, see Network security perimeter concepts.
Prerequisites
- Register the preview feature flag OpenAI.NspPreview(Azure portal Preview features or CLI).
az feature registration create --name OpenAI.NspPreview --namespace Microsoft.CognitiveServices
az provider register --namespace Microsoft.CognitiveServices
az provider register --namespace Microsoft.Network
- Wait for the feature to reach the Registeredstate (poll withaz feature registration list --namespace Microsoft.CognitiveServices).
- Review the current NSP concepts and limitations in NSP concepts.
- Have an existing Azure AI Foundry resource (or plan to create one) and required managed identity assignments.
If any prerequisite behavior is unclear or changes, consult the latest Azure OpenAI + NSP article for parity details in Azure OpenAI NSP guidance.
Associate your Azure AI Foundry resource
Portal (summary):
- Open the Azure portal and navigate to your Network security perimeter resource.
- Select Associated resources (or Resources depending on UI iteration) > Add / Associate.
- Choose the target profile, pick your Azure AI Foundry resource, set access mode (start with Learning), and confirm.
CLI (for automation) and full creation steps: see the NSP quickstarts (CLI or PowerShell):
After association, traffic evaluation begins per the selected access mode.
Access modes (Learning vs Enforced)
Start in Learning to observe would‑be denies. Switch to Enforced once required inbound/outbound rules are defined. Reference NSP access modes for more details.
Interaction with publicNetworkAccess
- Learning mode: publicNetworkAccessstill governs exposure while you assess logs.
- Enforced mode: NSP rules take precedence; publicNetworkAccessis effectively overridden by allowed inbound rules.
Change access mode
In the portal, locate the association entry for your Foundry resource and choose Change access mode. Use automation via az network perimeter association update (see Azure CLI reference) when scripting.
Enable logging
Configure diagnostic settings on the NSP resource to send allLogs to Log Analytics, Storage, or Event Hubs. For detailed steps and more information about rule context, refer Enable NSP logging.
Interpret logs
Query the network-security-perimeterAccessLogs table in your Log Analytics workspace to validate allow/deny decisions and finalize required sources or destinations before enforcing. Use KQL filters on MatchedRule or Profile to isolate Foundry traffic.
Define access rules
Within the profile, choose:
- Inbound rules: IP ranges or subscription (managed identity) sources.
- Outbound rules: FQDN destinations needed beyond co-located perimeter resources.
Rule creation steps (portal screenshots, CLI parameters, examples):
- A walkthrough of configuring inbound and outbound rules using Azure OpenAI NSP (which applies to Foundry data‑plane scenarios).
- Azure CLI reference (access rules): az network perimeter profile access-rule
Implicit trust: Resources inside the same NSP can reach each other when requests are authenticated via managed identity or role assignment; explicit rules are needed only for external sources/destinations or API key patterns.
Inbound rules
Choose IP range (CIDR) or subscription scope. Prefer subscription + managed identity for internal service‑to‑service traffic; fall back to IP range only when identity‑based access isn't feasible.
Outbound rules
List only required FQDNs (principle of least privilege). Keep dependent Azure services in the same NSP to minimize outbound allow entries.
Validate before enforcement
- Stay in Learning mode initially; review access logs for denies affecting required traffic.
- Add or refine inbound/outbound rules.
- Switch to Enforced mode.
- Open Azure AI Foundry (portal) and perform a model deployment or chat test. Success indicates required traffic is permitted.
- If blocked, revert to Learning or add rules and retry.
View and manage configuration
Use REST or CLI to audit and reconcile:
- REST reference (perimeter core): Network security perimeter REST API
- (Example) Profile and association operations (CLI): Azure CLI network perimeter commands
- Configuration reconciliation APIs (preview) for perimeter profiles and associations. Use the latest published preview or stable version. Use the correct preview version for configuration APIs, currently 2024-10-01.
Always confirm the latest API version in the reference before scripting.