# Architecture Overview
AI Fabrix is designed as an in-tenant, Azure-native enterprise AI architecture where identity, policy, and governance are enforced structurally across every execution path.
The architecture deliberately separates control, execution, orchestration, and interaction to eliminate common enterprise AI failure modes such as identity loss, service-account sprawl, and non-deterministic audits.
This section explains the architecture from four perspectives:
- High-level structure
- Trust boundaries and execution zones
- Identity and policy flow
- End-to-end request lifecycle
High-Level Architecture
AI Fabrix is composed of four distinct architectural layers, each with a single, non-overlapping responsibility.
Architectural Layers
-
Controller Layer (Miso)
Governance, identity, policy enforcement, and lifecycle management. -
Dataplane
Secure execution boundary where enterprise data is accessed and transformed through governed pipelines. -
Orchestration Layer
Composition of AI agents, workflows, and retrieval logic using governed tools. -
Interface Layer
Enterprise user interaction surfaces such as chat, portals, and collaboration tools.
Each layer is independently evolvable, but no layer can bypass another.
Trust Boundaries and Execution Zones
AI Fabrix explicitly defines trust boundaries to prevent implicit privilege escalation and accidental data exposure.
In-Tenant Boundary
All AI Fabrix components are deployed entirely inside the customer's Azure tenant:
- Customer-managed subscriptions
- Private networking and endpoints
- Entra ID–based identity
- Customer-controlled encryption keys
There is no shared SaaS control plane by default.
Execution Zones
| Zone | Purpose | Characteristics |
|---|---|---|
| Controller | Governance and policy | No business data access |
| Dataplane | Data execution | Identity- and policy-enforced |
| Orchestration | AI logic | No raw system access |
| Interface | Human interaction | No direct data/system access |
This ensures compromise of one zone does not expose the others.
Identity and Policy Flow
Identity is the primary execution context in AI Fabrix.
It is never dropped, replaced, or generalized.
Identity Model
- Authentication via Microsoft Entra ID
- User and workload identity propagate end-to-end
- AI agents act strictly on behalf of authenticated identities
- No default service accounts for data access
Policy Enforcement
Policies are defined and evaluated centrally and enforced structurally at execution boundaries.
Policy categories include:
- RBAC and ABAC
- Environment and lifecycle controls
- Data egress and movement policies
- Quotas and usage limits
- Compliance and audit requirements
Policies are not embedded in application logic and are not re-implemented per workflow.
End-to-End Request Lifecycle
Every request—human, API, or agent—follows the same governed execution path.
Request Flow
- User authenticates via Entra ID
- Interaction occurs through a governed interface
- Orchestration composes the request using governed tools
- Dataplane executes pipelines with enforced identity and policy
- Controller evaluates policy, records audit, and enforces constraints
- Response is returned with permissions already applied
There are no AI-specific exception paths.