Skip to content

Commit 5f213e0

Browse files
committed
entra ai understand module
1 parent 4b96b3f commit 5f213e0

16 files changed

Lines changed: 351 additions & 0 deletions
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Authentication flows for AI endpoints in Microsoft Foundry
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Human and workload identities in AI workloads
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Identity as the control layer for AI solutions
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
Understanding that identity governs access isn't enough. You also need to understand how an identity proves who it's when calling an AI endpoint.
2+
3+
Every request to an AI endpoint must include valid authentication credentials. Microsoft Foundry relies on industry-standard OAuth 2.0 flows and Microsoft Entra ID to issue and validate access tokens.
4+
5+
At a high level, authentication answers three questions:
6+
7+
- Who is calling the model?
8+
- From where is the request originating?
9+
- What credential is being presented?
10+
11+
## OAuth 2.0 and token issuance
12+
13+
AI endpoints use OAuth 2.0 to authenticate callers. When a user, application, or workload attempts to access a protected AI resource, Microsoft Entra ID evaluates the request and issues an access token if authentication succeeds.
14+
15+
That token represents the authenticated identity. It contains claims about:
16+
17+
- The identity
18+
- The tenant
19+
- Assigned roles or permissions
20+
- Token lifetime
21+
22+
The caller includes the access token in requests to the AI endpoint. The service validates the token before processing the request.
23+
24+
If the token is invalid, expired, or improperly scoped, the request fails before reaching the model.
25+
26+
## Interactive and non-interactive authentication
27+
28+
Authentication flows differ depending on who or what is calling the endpoint.
29+
30+
Interactive authentication typically involves a human user. For example:
31+
32+
- A developer signs in to deploy a model through Microsoft Foundry.
33+
- An administrator configures AI resources in the Azure portal.
34+
35+
In these cases, the user authenticates through Microsoft Entra ID, and an access token is issued for that session.
36+
37+
Non-interactive authentication is used by applications and workloads. Examples include:
38+
39+
- A web application calling a model endpoint
40+
- An automation workflow deploying updates
41+
- A backend service retrieving embeddings
42+
43+
In these scenarios, authentication occurs without human interaction. The application uses a service principal or managed identity to obtain an access token from Microsoft Entra ID.
44+
45+
At runtime, the AI endpoint doesn't distinguish between human and application requests. It validates the token and evaluates authorization based on the identity represented in that token.
46+
47+
## Token flow between client and AI endpoint
48+
49+
The authentication sequence follows a consistent pattern:
50+
51+
1. The client requests an access token from Microsoft Entra ID.
52+
1. Microsoft Entra ID authenticates the caller and issues a token if the request is valid.
53+
1. The client includes the token in the request to the AI endpoint.
54+
1. The endpoint validates the token before evaluating authorization.
55+
56+
Only after successful authentication and authorization does the service process the model request.
57+
58+
This flow ensures that every AI interaction in Microsoft Foundry is tied to a verified identity and evaluated against assigned permissions.
59+
60+
Understanding this sequence prepares you to analyze authentication failures, token misuse, and access control misconfigurations in AI environments.
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
AI endpoints don't distinguish between human and application requests at runtime. They validate tokens and evaluate permissions based on the identity presented.
2+
3+
For security design, the type of identity matters.
4+
5+
Understanding the differences between **human**, **application**, and **managed** identities helps you assign permissions correctly and reduce risk.
6+
7+
## Human identities
8+
9+
Human identities represent individual users authenticated through Microsoft Entra ID.
10+
11+
These identities are used when a person directly interacts with AI resources. Examples include:
12+
13+
- A developer deploying or updating a model
14+
- An administrator configuring resource settings
15+
- A security analyst reviewing posture or activity
16+
17+
Human identities are typically authenticated through interactive sign-in. Conditional Access, multifactor authentication, and device compliance policies commonly apply to these sessions.
18+
19+
Because human identities represent real individuals, their permissions should reflect job responsibilities and follow least-privilege principles.
20+
21+
Overassigning permissions to user accounts increases risk, particularly in the management plane.
22+
23+
## Application identities
24+
25+
Application identities represent software rather than people. In Microsoft Entra ID, these are typically implemented as service principals associated with application registrations.
26+
27+
They're used when software calls an AI endpoint directly. Examples include:
28+
29+
- A web application submitting prompts
30+
- A backend service retrieving embeddings
31+
- An automation workflow deploying updates
32+
33+
Authentication occurs through non-interactive flows. The application presents credentials, and Microsoft Entra ID issues an access token for that identity.
34+
35+
Application identities shouldn't use shared secrets embedded in code or configuration without proper protection. Excessive permissions assigned to a service principal can allow broad, automated misuse of AI resources.
36+
37+
## Managed identities
38+
39+
Managed identities are a specialized type of application identity. They're designed to reduce credential management overhead.
40+
41+
When you enable a managed identity on an Azure resource, Microsoft Entra ID automatically creates and manages the associated identity. The platform handles credential rotation and lifecycle management.
42+
43+
Managed identities are appropriate when:
44+
45+
- An Azure-hosted resource needs to access an AI endpoint
46+
- You want to avoid storing credentials in application code
47+
- You want tighter integration with Azure role assignments
48+
49+
Managed identities reduce the risk associated with secret management. However, they still require careful role assignment and scope control.
50+
51+
## Choosing the appropriate identity model
52+
53+
The appropriate identity type depends on who or what is accessing the AI resource.
54+
55+
Use a human identity when a person is directly performing administrative or development tasks.
56+
57+
Use an application identity when software must authenticate independently.
58+
59+
Use a managed identity when the workload runs in Azure and can rely on platform-managed credentials.
60+
61+
Each identity type introduces different security considerations:
62+
63+
- Human identities require strong authentication controls.
64+
- Application identities require strict permission boundaries.
65+
- Managed identities require careful scope assignment.
66+
67+
The identity type you choose affects the potential blast radius if that identity is compromised.
68+
69+
Understanding these distinctions allows you to design access intentionally rather than defaulting to broad or convenient configurations.
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
Securing AI workloads starts with identity. Before configuring roles or conditional access policies, you need to understand how authentication and authorization govern every interaction with an AI service.
2+
3+
Every prompt submitted to a model, every deployment, every configuration change, and every API call requires an authenticated identity. AI services are designed to enforce identity-based access and don't support anonymous interaction by design.
4+
5+
If identity controls access to Azure resources, it also determines how AI systems are used. That makes identity the control layer for AI security.
6+
7+
Before evaluating model safety settings or data protections, start with a more fundamental question:
8+
9+
**Who is allowed to access the AI service, and under what conditions?**
10+
11+
## Why identity comes first in AI security
12+
13+
AI services expose authenticated endpoints. Access to AI services isn't anonymous. A user, application, or managed workload must present credentials that Microsoft Entra ID validates.
14+
15+
Once authenticated, authorization determines what that identity can do:
16+
17+
- Deploy or modify a model
18+
- Invoke a model endpoint
19+
- Access training data
20+
- Change configuration settings
21+
22+
These decisions occur before the AI service processes a request.
23+
24+
Authentication verifies identity. Authorization enforces assigned permissions. Only after both steps succeed does the AI service process the request.
25+
26+
In many real-world deployments, identity design issues cause more security failures than the model itself. Common examples include:
27+
28+
- Excessive permissions
29+
- Broad role assignments
30+
- Shared credentials
31+
- Unmanaged service principals
32+
33+
When identity is misconfigured, the AI environment inherits that weakness.
34+
35+
## Identity across AI development and runtime
36+
37+
AI solutions are often developed and deployed using services like Microsoft Foundry. These services integrate directly with Microsoft Entra ID for authentication and authorization.
38+
39+
Identity is present at every stage:
40+
41+
- Developers authenticate to create and configure resources.
42+
- Applications authenticate to call model endpoints.
43+
- Automation workflows authenticate to deploy updates.
44+
- Security teams authenticate to review posture and investigate activity.
45+
46+
Security platforms like Microsoft Defender for Cloud rely on identity context to evaluate risk and surface misconfigurations. Without a clear identity architecture, posture insights lack meaningful context.
47+
48+
Understanding how identity governs AI access is the foundation for designing secure AI workloads. Every subsequent decision about access, roles, conditions, and enforcement builds on this layer.

learn-pr/wwl-sci/entra-ai-understand/includes/introduction.md

Whitespace-only changes.
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
Identity determines who can access AI services. The next step is understanding where that access is enforced.
2+
3+
Azure separates access into two distinct layers: the **management plane** and the **data plane**. Each plane controls a different category of actions, and each introduces different security risks.
4+
5+
Understanding the distinction between these planes is essential for designing least-privilege access and avoiding misconfiguration.
6+
7+
## Management plane access
8+
9+
The management plane governs configuration and administrative operations. It controls how AI resources are created, modified, and managed.
10+
11+
Examples of management plane actions include:
12+
13+
- Creating or deleting an Azure AI resource
14+
- Deploying or updating a model
15+
- Changing network configuration
16+
- Assigning role-based access control permissions
17+
18+
Management plane access is enforced through Azure role-based access control. Permissions are typically assigned at the subscription, resource group, or resource level.
19+
20+
If a user or application has excessive management plane permissions, they can alter how an AI system is deployed or secured. This can introduce risk even if runtime access is tightly controlled.
21+
22+
## Data plane access
23+
24+
The data plane governs runtime interaction with the AI service. It controls how identities interact with deployed models and associated data.
25+
26+
Examples of data plane actions include:
27+
28+
- Submitting prompts to a model endpoint
29+
- Retrieving model responses
30+
- Accessing training or grounding data
31+
- Using embeddings or inference APIs
32+
33+
Data plane access determines who can use the model and how they can interact with it.
34+
35+
A common mistake is assuming that restricting management access is enough. An identity with broad data plane access can still expose sensitive data, misuse models, or operate outside intended boundaries.
36+
37+
## Why the distinction matters
38+
39+
Management plane and data plane permissions are evaluated independently. An identity might have access in one plane but not the other.
40+
41+
This separation affects:
42+
43+
- How you design role assignments
44+
- How you apply least privilege
45+
- How you analyze misconfigurations
46+
- How you interpret security alerts
47+
48+
When investigating an AI security issue, one of the first questions should be:
49+
50+
Was this action performed through the management plane or the data plane?
51+
52+
That distinction shapes both risk assessment and remediation.
53+
54+
Understanding these two planes prepares you to design access intentionally rather than granting broad permissions that span configuration and runtime activity.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
Authentication proves identity. Authorization determines what that identity can do.
2+
3+
In Azure environments, authorization is enforced through role-based access control. Role assignments define which actions an identity can perform and where those permissions apply.
4+
5+
When securing AI workloads in Microsoft Foundry, role design directly affects risk exposure and blast radius.
6+
7+
## Role-based access control in Azure
8+
9+
Azure uses role-based access control, or RBAC (role-based access control), to grant permissions to identities. Roles contain a defined set of allowed actions. When you assign a role to an identity, you grant that identity the ability to perform those actions within a specific scope.
10+
11+
RBAC applies to both management plane and data plane operations, though the permission models differ.
12+
13+
Management plane permissions control administrative operations such as deploying models, modifying configuration, or assigning additional roles.
14+
15+
Data plane permissions control runtime access to AI endpoints and associated data.
16+
17+
Understanding which permissions apply to which plane is critical when designing access boundaries.
18+
19+
## Scope hierarchy
20+
21+
Every role assignment includes a scope. Scope defines where the role applies.
22+
23+
Azure uses a hierarchical model:
24+
25+
- Subscription
26+
- Resource group
27+
- Individual resource, such as an AI endpoint
28+
29+
Permissions assigned at a higher scope apply to all child resources beneath that scope.
30+
31+
For example, assigning a contributor role at the subscription level grants broad control across all resource groups and resources within that subscription. Assigning a role at the resource level limits that access to a specific AI resource.
32+
33+
Scope selection directly affects blast radius. The broader the scope, the greater the potential impact if that identity is compromised.
34+
35+
Designing for least privilege requires careful alignment between role permissions and scope.
36+
37+
## Built-in and custom roles
38+
39+
Azure provides built-in roles that cover common administrative and operational scenarios. These roles simplify configuration but might grant more permissions than necessary in tightly controlled environments.
40+
41+
Custom roles allow you to define a specific set of permitted actions. They're useful when built-in roles exceed the level of access required.
42+
43+
Choosing between built-in and custom roles depends on the balance between operational simplicity and precision. In AI environments where data sensitivity is high, tighter control might be appropriate.
44+
45+
Regardless of role type, permissions should align to defined responsibilities and avoid unnecessary privilege.
46+
47+
## Designing role assignments intentionally
48+
49+
Role assignments should never be an afterthought.
50+
51+
When evaluating access to AI workloads, consider:
52+
53+
- Which identity is performing the action
54+
- Which plane the action affects
55+
- Which scope is appropriate
56+
- Whether the role grants more access than required
57+
58+
Poorly designed role assignments can undermine even strong authentication controls. A correctly issued token still enables misuse if the associated permissions are too broad.
59+
60+
Effective AI security depends on aligning identity, role, and scope in a deliberate way.

learn-pr/wwl-sci/entra-ai-understand/includes/summary.md

Whitespace-only changes.

0 commit comments

Comments
 (0)