Skip to content

Commit ee346e3

Browse files
authored
Merge pull request #53352 from wwlpublish/LP156462-1
Feedback bug fix
2 parents 1ce4e92 + 2c05c92 commit ee346e3

26 files changed

Lines changed: 446 additions & 0 deletions
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.introduction
3+
title: "Introduction"
4+
metadata:
5+
title: "Introduction"
6+
description: "Learn how to configure Microsoft Foundry hubs, optimize AI infrastructure, and establish shared resources for scalable enterprise AI solutions."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.understand-microsoft-foundry-architecture-components
3+
title: "Understand Microsoft Foundry architecture components"
4+
metadata:
5+
title: "Understand Microsoft Foundry Architecture Components"
6+
description: "Learn how Microsoft Foundry's three-tier architecture balances governance and autonomy for AI projects with shared resources and security policies."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
ms.custom: references_regions
12+
durationInMinutes: 9
13+
content: |
14+
[!include[](includes/2-understand-microsoft-foundry-architecture-components.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.configure-hubs-organize-projects
3+
title: "Configure hubs and organize projects"
4+
metadata:
5+
title: "Configure Hubs and Organize Projects"
6+
description: "Learn how to configure hubs, organize projects, and enforce governance using Azure Policy for scalable AI infrastructure management."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
ms.custom: references_regions
12+
durationInMinutes: 9
13+
content: |
14+
[!include[](includes/3-configure-hubs-organize-projects.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.implement-hub-level-shared-connections-azure
3+
title: "Implement hub-level shared connections to Azure AI Search"
4+
metadata:
5+
title: "Implement Hub-Level Shared Connections to Azure AI Search"
6+
description: "Learn how to implement hub-level shared connections to Azure AI Search for cost efficiency, reduced complexity, and optimized performance."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 16
12+
content: |
13+
[!include[](includes/4-implement-hub-level-shared-connections-azure.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.exercise-provision-microsoft-foundry-infrastructure
3+
title: "Provision Microsoft Foundry infrastructure"
4+
metadata:
5+
title: "Provision Microsoft Foundry Infrastructure"
6+
description: "Learn to provision Microsoft Foundry infrastructure by creating hub-level and project-level service connections for secure Azure integration."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 9
12+
content: |
13+
[!include[](includes/5-exercise-provision-microsoft-foundry-infrastructure.md)]
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.knowledge-check
3+
title: "Module assessment"
4+
metadata:
5+
title: "Knowledge check"
6+
description: "Test your understanding of Microsoft Foundry infrastructure configuration by applying concepts to realistic scenarios. These questions assess your ability to make architectural decisions about hub design, connection strategies, and RBAC assignments rather than memorizing portal navigation steps. Consider the organizational context, compliance requirements, and cost implications when selecting your answers."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
ms.custom: references_regions
12+
module_assessment: false
13+
durationInMinutes: 7
14+
content: "Choose the best response for each of the following questions."
15+
quiz:
16+
questions:
17+
- content: "Your organization runs 12 AI projects across three departments: Sales (4 projects), Marketing (5 projects), and Support (3 projects). The CFO requires monthly cost reports showing AI spending per department for chargeback purposes. Projects within each department share common Azure AI Search indexes but need isolated Azure OpenAI deployments due to different prompt engineering approaches. What connection strategy optimizes costs while enabling accurate department-level cost tracking?"
18+
choices:
19+
- content: "Create department-specific hubs (Sales Hub, Marketing Hub, Support Hub), establish hub-level Azure AI Search connections for shared indexes, and use project-level Azure OpenAI connections tagged with department cost centers"
20+
isCorrect: true
21+
explanation: "Department-specific hubs with mixed connection levels provide the optimal balance. Option A correctly establishes hub boundaries aligned with cost allocation requirements (departments) while using hub-level connections for shared services (search) and project-level connections for isolated services (OpenAI). Each department's hub aggregates costs for shared infrastructure, while project-level tags enable fine-grained tracking of dedicated resources. Microsoft Cost Management automatically groups spending by hub (department-level) and by project tags (application-level)."
22+
- content: "Create environment-based hubs (Production Hub, Development Hub), establish all connections at hub level including both Azure AI Search and Azure OpenAI, then use Azure tags on projects to track department spending"
23+
isCorrect: false
24+
explanation: "Option B fails because environment-based hubs don't align with the CFO's requirement for department-level reporting—all production projects across departments would aggregate into one cost bucket."
25+
- content: "Create one enterprise hub with all connections at hub level, rely on Microsoft Cost Management's resource-level spending reports to manually allocate costs per department each month"
26+
isCorrect: false
27+
explanation: "Option C requires manual cost allocation effort every month and risks errors when teams deploy resources outside the standard pattern."
28+
- content: "A junior team member attempts to connect to a hub's shared Azure AI Search service from a new project and receives error 'AuthorizationFailed: The client does not have authorization to perform action 'Microsoft.Search/searchServices/read''. The hub's managed identity has Search Index Data Reader role on the search service, and the team member holds Cognitive Services Contributor role on the hub. What is the most likely cause and appropriate solution?"
29+
choices:
30+
- content: "The team member needs the Search Service Contributor role assigned directly on the Azure AI Search service; add this role assignment to resolve access issues"
31+
isCorrect: false
32+
explanation: "The first option is incorrect because individual users don't need direct RBAC roles on the search service—they access it through the hub's inherited connection using the hub's managed identity."
33+
- content: "The project was created before the hub-level search connection was established, so it didn't inherit the connection; recreate the project to reinitialize connection inheritance"
34+
isCorrect: true
35+
explanation: "Connection inheritance only occurs at project creation time—projects don't automatically discover connections added to the hub after they already exist. Option B correctly identifies that the project needs to be recreated to inherit the new hub-level connection. When you create a project in a hub, Microsoft Foundry copies the hub's connection metadata into the project's configuration. Connections added later don't automatically propagate to existing projects."
36+
- content: "The hub's managed identity role assignment hasn't propagated yet; wait 10-15 minutes for Azure RBAC replication, then retry the search operation"
37+
isCorrect: false
38+
explanation: "The third option misdiagnoses the problem: the error message indicates missing authorization at the search service level, not RBAC propagation delays which would show different error patterns."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-ai-ready-infrastructure-microsoft-foundry.summary
3+
title: "Summary"
4+
metadata:
5+
title: "Summary"
6+
description: "Learn how Azure Microsoft Foundry's hub-and-project model simplifies governance, enhances security, and optimizes AI infrastructure management."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/7-summary.md)]
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
Your retail organization plans to deploy three AI applications this quarter: a customer support chatbot, a product recommendation engine, and an inventory forecasting model. The team currently provisions separate Azure AI resources—duplicating Azure OpenAI deployments, creating isolated storage accounts, and deploying dedicated search services. This scattered approach creates four critical problems: security teams struggle to audit 15+ separate services, finance lacks visibility into AI spending across departments, developers waste time configuring the same network rules repeatedly, and your organization pays for underutilized search capacity that could be shared.
2+
3+
Microsoft Foundry solves these infrastructure challenges through a hub-and-project architecture. Hubs establish shared governance boundaries where you configure networking, managed identities, and policy enforcement once. Projects within each hub inherit those settings while providing isolated workspaces where teams build AI solutions independently. Hub-level connections to services like Azure AI Search enable multiple projects to share infrastructure, reducing your search costs by 50-70% compared to provisioning dedicated instances per team.
4+
5+
In this module, you configure a hub that enforces consistent security policies across all AI projects, establish a hub-level connection to Azure AI Search that eliminates resource duplication, create projects that inherit governance settings while maintaining team autonomy, and validate that your infrastructure supports enterprise-scale AI deployments. By the end, you have the architectural knowledge to provision scalable AI infrastructure that satisfies security, finance, and development stakeholders simultaneously.
6+
7+
## Learning objectives
8+
9+
By the end of this module, you're able to:
10+
11+
- Configure Microsoft Foundry hubs with appropriate governance and security settings
12+
- Create and organize AI projects within hubs to support team collaboration
13+
- Establish connected resources including Azure AI Search for shared infrastructure
14+
- Implement hub-level shared connections to optimize resource utilization across projects
15+
16+
## Prerequisites
17+
18+
- Familiarity with Azure portal navigation and resource management
19+
- Basic understanding of AI and machine learning concepts
20+
- Experience with Azure resource groups and role-based access control (RBAC)
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
## The three-tier organizational model
2+
3+
When your organization deploys AI at scale, you need infrastructure that balances centralized governance with team autonomy. Microsoft Foundry addresses this challenge through a three-tier hierarchy that mirrors how enterprises actually organize work. At the top, the Microsoft Foundry Portal provides a unified management interface where IT leadership views all AI initiatives across departments. With this single pane of glass, your CTO can monitor spending, track project health, and identify underutilized resources without switching between multiple Azure services.
4+
5+
Beneath the Portal, hubs establish shared governance boundaries—typically aligned with departments, environments, or compliance requirements. Your organization might create a Production Hub for customer-facing applications that enforces strict network isolation and a Development Hub where data scientists experiment with public endpoints. Each hub contains configuration that automatically applies to every project within it: virtual network integration managed identities for authentication, and Azure Policy assignments that prevent teams from deploying noncompliant resources. This inheritance model reduces your operational overhead by 40-60% compared to configuring security settings separately for each AI project.
6+
7+
Projects sit at the bottom tier as isolated workspaces where teams build AI solutions. Think of projects as dedicated folders within a shared drive—each team has full autonomy to train models, manage datasets, and deploy applications while inheriting the hub's network and security settings. The Support Team's chatbot project and the Sales Team's forecasting project both live in the same Production Hub, sharing network rules and managed identities while maintaining separate code, data, and model repositories. This structure answers the common challenge: "How do we let teams move fast without creating security or compliance gaps?"
8+
9+
:::image type="content" source="../media/hub-level-policy-inheritance.png" alt-text="Diagram showing hub-level policy inheritance with three lanes.":::
10+
11+
## Connected resources and the sharing model
12+
13+
Now that you understand the three-tier hierarchy, consider how Azure services integrate with this architecture. Connected resources—like Azure AI Search, Azure OpenAI Service, Azure Storage, and Application Insights—attach at either the hub or project level depending on whether they're shared or dedicated. Hub-level connections make the most impact: when you connect Azure AI Search at the hub level, all projects within that hub can query the same search service without duplicating configuration or incurring separate costs. Your five AI projects share one Standard-tier search instance instead of each provisioning its own Basic tier, cutting your monthly search spend from **$1,250** to **$250**.
14+
15+
With this shared connection in place, project teams maintain logical isolation through separate search indexes. The E-commerce Bot Project queries the Product Catalog index containing 2 million product documents, while the Support Agent Project queries the Knowledge Base index with 500,000 troubleshooting articles. Both indexes live in the same hub-connected search service, yet each project only accesses its authorized data. At the same time, your centralized operations team monitors performance, manages capacity, and reviews audit logs from a single Azure AI Search resource instead of tracking metrics across multiple isolated instances.
16+
17+
Project-level connections serve scenarios requiring dedicated resources. If your healthcare application needs an isolated Azure OpenAI deployment with specific data residency guarantees, you connect that service directly to the Healthcare Project rather than sharing it hub-wide. This flexibility becomes essential when compliance, performance, or cost allocation requirements demand separation. However, most organizations start with hub-level connections for common services like search and storage, then add project-specific connections only when justified by regulatory or technical constraints.
18+
19+
## Identity, networking, and policy inheritance
20+
21+
Building on this foundation of shared and dedicated resources, examine how hubs enforce consistent security across projects. When you provision a hub, Azure creates a system-assigned managed identity that authenticates to connected services without storing credentials. This managed identity rotates automatically, eliminating the security risk of long-lived API keys scattered across project code. Your hub's managed identity receives the Search Index Data Reader role on the connected Azure AI Search service, and every project inheriting that connection uses the same identity—your security team audits one permission assignment instead of 15.
22+
23+
Network configuration follows the same inheritance pattern. Configure the hub with a virtual network integration and private endpoint to your on-premises data center, and all child projects automatically route traffic through that secure path. Developers building the Customer Insights Project never see network configuration options—they inherit the Production Hub's network topology and focus on training models. This becomes especially important when your compliance team requires network traffic logs: Azure Network Watcher captures packets at the hub level, providing unified visibility across all AI workloads instead of requiring per-project monitoring.
24+
25+
Azure Policy assignments applied at the hub scope cascade to projects, preventing teams from accidentally violating organizational standards. Assign a policy requiring specific tags on all resources (CostCenter, DataClassification, Owner), and every storage account or compute instance deployed in any project automatically inherits those requirements. If a developer attempts to create a resource without required tags, Azure blocks the deployment with a clear error message pointing to the policy definition. With this approach, your governance team defines rules once at the hub level and enforces them consistently across dozens of projects without manual audits.
26+
27+
:::image type="content" source="../media/azure-policy-hub-scope-cascade.png" alt-text="Diagram showing Azure Policy assignments applied at the hub scope cascade to projects.":::
28+
29+
## Practical organizational patterns
30+
31+
Consider what happens when your organization scales from three pilot projects to 20 production applications across five business units. Create separate hubs for Production, Staging, and Development environments provide clear promotion paths with appropriate security boundaries. Development hubs use public endpoints and relaxed policies to maximize experimentation velocity, while Production hubs enforce private endpoints, require multifactor authentication for administrative access, and log every API call to Azure Monitor. Projects move through this pipeline: data scientists build prototypes in Development, DevOps engineers validate configurations in Staging, and only approved applications graduate to Production.
32+
33+
Now that you understand how hubs, projects, and connected resources interact, you're ready to configure these components in your Azure subscription. The next unit walks through the specific settings and decisions you'll make when provisioning hubs and organizing projects to support your organization's AI initiatives.
34+
35+
:::image type="content" source="../media/foundry-three-tier-architecture.png" alt-text="Diagram showing the Microsoft Foundry three-tier architecture showing Portal managing multiple hubs.":::
36+
37+
*Microsoft Foundry three-tier architecture showing Portal managing multiple hubs, each hub containing projects with shared connections to Azure AI Search, Azure OpenAI Service, and Azure Storage at the hub level*
38+
39+
40+
## More resources
41+
42+
- [Microsoft Foundry documentation](/azure/ai-studio/) - Official architecture overview and service limits
43+
- [Managed identities for Azure resources](/azure/active-directory/managed-identities-azure-resources/overview) - Authentication and credential rotation patterns
44+
45+

0 commit comments

Comments
 (0)