Skip to content

Commit 0319003

Browse files
committed
Response to review comments
1 parent 2a3df6c commit 0319003

File tree

3 files changed

+14
-14
lines changed

3 files changed

+14
-14
lines changed

articles/healthcare-apis/azure-api-for-fhir-additional-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ For more information on how to change the default settings, see [configure datab
2626

2727
The Azure API for FHIR will only allow authorized users to access the FHIR API. You can configure authorized users through two different mechanisms. The primary and recommended way to configure access control is using [Azure Role Based Access Control (RBAC)](https://docs.microsoft.com/azure/role-based-access-control/), which is accessible through the **Access control (IAM)** blade. Azure RBAC only works if you want to secure data plane access using the Azure Active Directory tenant associated with your subscription. If you wish to use a different tenant, the Azure API for FHIR offers a local FHIR data plane access control mechanism. The configuration options are not as rich when using the local RBAC mechanism. For details, choose one of the following options:
2828

29-
1. [Azure RBAC for FHIR data plane](configure-azure-rbac.md). This is the preferred option when you are using the Azure Active Directory tenant associated with your subscription.
30-
1. [Local FHIR data plane access control](configure-local-rbac.md). Use this option only when you need to use an external Azure Active Directory tenant for data plane access control.
29+
* [Azure RBAC for FHIR data plane](configure-azure-rbac.md). This is the preferred option when you are using the Azure Active Directory tenant associated with your subscription.
30+
* [Local FHIR data plane access control](configure-local-rbac.md). Use this option only when you need to use an external Azure Active Directory tenant for data plane access control.
3131

3232
## Enable diagnostic logging
3333
You may want to enable diagnostic logging as part of your setup to be able to monitor your service and have accurate reporting for compliance purposes. For details on how to set up diagnostic logging, see our [how-to-guide](enable-diagnostic-logging.md) on how to set up diagnostic logging, along with some sample queries.

articles/healthcare-apis/configure-azure-rbac.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Azure Role Based Access Control (RBAC)
2+
title: Configure Azure Role Based Access Control (RBAC) for Azure API for FHIR
33
description: This article describes how to configure Azure RBAC for the Azure API for FHIR data plane
44
author: hansenms
55
ms.service: healthcare-apis
@@ -32,18 +32,18 @@ In the **Role** selection, search for one of the built-in roles for the FHIR dat
3232

3333
You can choose between:
3434

35-
1. FHIR Data Reader: Can read (and search) FHIR data.
36-
1. FHIR Data Writer: Can read, write, and soft delete FHIR data.
37-
1. FHIR Data Exporter: Can read and export (`$export` operator) data.
38-
1. FHIR Data Contributor: Can perform all data plane operations.
35+
* FHIR Data Reader: Can read (and search) FHIR data.
36+
* FHIR Data Writer: Can read, write, and soft delete FHIR data.
37+
* FHIR Data Exporter: Can read and export (`$export` operator) data.
38+
* FHIR Data Contributor: Can perform all data plane operations.
3939

4040
If these roles are not sufficient for your need, you can also [create custom roles](https://docs.microsoft.com/azure/role-based-access-control/tutorial-custom-role-powershell).
4141

4242
In the **Select** box, search for a user, service principal, or group that you wish to assign the role to.
4343

4444
## Caching behavior
4545

46-
The Azure API for FHIR will cache decisions for up to 5 minutes. If you grant a user access to the FHIR server by adding them to the list of allowed object ids, or you remove them from the list, you should expect it to take up to five minutes for changes in permissions to propagate.
46+
The Azure API for FHIR will cache decisions for up to 5 minutes. If you grant a user access to the FHIR server by adding them to the list of allowed object IDs, or you remove them from the list, you should expect it to take up to five minutes for changes in permissions to propagate.
4747

4848
## Next steps
4949

articles/healthcare-apis/configure-local-rbac.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Local Role Based Access Control (RBAC)
2+
title: Configure local Role Based Access Control (RBAC) for Azure API for FHIR
33
description: This article describes how to configure the Azure API for FHIR to use an external Azure AD tenant for data plane
44
author: hansenms
55
ms.service: healthcare-apis
@@ -8,7 +8,7 @@ ms.topic: reference
88
ms.date: 03/15/2020
99
ms.author: mihansen
1010
---
11-
# Configure Local RBAC for FHIR
11+
# Configure local RBAC for FHIR
1212

1313
This article explains how to configure the Azure API for FHIR to use an external, secondary Azure Active Directory tenant for managing data plane access. Use this mode only if it is not possible for you to use the Azure Active Directory tenant associated with your subscription.
1414

@@ -45,17 +45,17 @@ You can configure the Azure API for FHIR to use an external or secondary Azure A
4545

4646
In the authority box, enter a valid Azure Active Directory tenant. Once the tenant has been validated, the **Allowed object IDs** box should be activated and you can enter a list of identity object IDs. These IDs can be the identity object IDs of:
4747

48-
1. An Azure Active Directory user.
49-
1. An Azure Active Directory service principal.
50-
1. An Azure Active directory security group.
48+
* An Azure Active Directory user.
49+
* An Azure Active Directory service principal.
50+
* An Azure Active directory security group.
5151

5252
You can read the article on how to [find identity object IDs](find-identity-object-ids.md) for more details.
5353

5454
After entering the required object IDs, click **Save** and wait for changes to be saved before trying to access the data plane using the assigned users, service principals, or groups.
5555

5656
## Caching behavior
5757

58-
The Azure API for FHIR will cache decisions for up to 5 minutes. If you grant a user access to the FHIR server by adding them to the list of allowed object ids, or you remove them from the list, you should expect it to take up to five minutes for changes in permissions to propagate.
58+
The Azure API for FHIR will cache decisions for up to 5 minutes. If you grant a user access to the FHIR server by adding them to the list of allowed object IDs, or you remove them from the list, you should expect it to take up to five minutes for changes in permissions to propagate.
5959

6060
## Next steps
6161

0 commit comments

Comments
 (0)