Client Security Portal

Enter your service principal API key to access your real-time security telemetry.

NeuralPath AI Security Portal
AI/ML Security Intelligence
Live telemetry
np-svc-principal-01 Sign out
89

Critical Risk Level

3 critical findings require immediate action. Training data exposed on public storage.

0 — Low 100 — Critical
Critical Findings
3
Requires immediate action
High Findings
3
Elevated risk
Medium Findings
2
Needs attention
Resources Monitored
Azure services
Model Endpoints
47
44 healthy · 3 degraded
SIEM Connection
✓ Active
Azure tenant connected
Top Open Findings View all →
Infrastructure Status
Requests (24h)
Avg Latency P50
milliseconds
Latency P99
milliseconds
Security Events (24h)
unauthorized attempts
Inference Volume (Last 24h)
Security Event Breakdown
API Key (Service Principal Token)

This key grants read-only access to your NeuralPath SIEM data. Pass it as the X-API-Key header or as a Bearer token.

sk_np_••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ClientNeuralPath AI
Scoperead:siem
Azure Tenant IDa1b2c3d4-e5f6-7890-abcd-ef1234567890
Service Principalnp-svc-principal-01
RoleReader (Azure Management API)
ExpiryNever (revocable on demand)
API Endpoints
# Verify your API key POST https://neuralpath.polsia.app/api/client/neuralpath/verify-key Body: { "api_key": "sk_np_..." } # Get current security findings GET https://neuralpath.polsia.app/api/client/neuralpath/findings Header: X-API-Key: sk_np_... # Get ML model monitoring metrics GET https://neuralpath.polsia.app/api/client/neuralpath/metrics Header: X-API-Key: sk_np_... # Get connection status GET https://neuralpath.polsia.app/api/client/neuralpath/status Header: X-API-Key: sk_np_...
IAM Trust Policy (Azure)

Assign the following role to allow NeuralPath to read your Azure telemetry:

# Assign Reader role to NeuralPath service principal az role assignment create \ --assignee "np-svc-principal-01" \ --role "Reader" \ --scope "/subscriptions/YOUR_SUBSCRIPTION_ID" # Also grant Security Reader for Defender for Cloud findings az role assignment create \ --assignee "np-svc-principal-01" \ --role "Security Reader" \ --scope "/subscriptions/YOUR_SUBSCRIPTION_ID"
neuralpath-ml-platform.bicep

Deploys NeuralPath's Azure ML infrastructure: resource group, VNet, AKS cluster, Azure ML workspace, Key Vault, storage, and the NeuralPath service principal with Reader role.

Deployment Commands
# Login to Azure az login --tenant a1b2c3d4-e5f6-7890-abcd-ef1234567890 # Create resource group az group create --name neuralpath-ml-rg --location eastus # Deploy Bicep template az deployment group create \ --resource-group neuralpath-ml-rg \ --template-file neuralpath-ml-platform.bicep \ --parameters environmentName=prod budgetAmountUsd=50 # Verify deployment az deployment group show \ --resource-group neuralpath-ml-rg \ --name neuralpath-ml-platform \ --query "properties.provisioningState"