Skip to content

Commit 11ddb92

Browse files
committed
correcting de-ident caps
1 parent 4b7b3ff commit 11ddb92

File tree

5 files changed

+40
-40
lines changed

5 files changed

+40
-40
lines changed

articles/healthcare-apis/deidentification/manage-access-rbac.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,21 @@ ms.topic: how-to
99
ms.date: 07/16/2024
1010
---
1111

12-
# Use Azure role-based access control with the De-identification service (preview)
12+
# Use Azure role-based access control with the de-identification service (preview)
1313

14-
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The De-identification service (preview) defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
14+
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The de-identification service (preview) defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
1515

1616
Microsoft Entra ID uses the concept of a security principal, which can be a user, a group, an application service principal, or a [managed identity for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
1717

1818
When an Azure role is assigned to a Microsoft Entra ID security principal over a specific scope, Azure grants access to that scope for that security principal. For more information about scopes, see [Understand scope for Azure RBAC](/azure/role-based-access-control/scope-overview).
1919

2020
## Prerequisites
2121

22-
- A De-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
22+
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
2323

2424
## Available built-in roles
2525

26-
The De-identification service (preview) has the following built-in roles available:
26+
The de-identification service (preview) has the following built-in roles available:
2727

2828
|Role |Description |
2929
|-----|------------|
@@ -34,7 +34,7 @@ The De-identification service (preview) has the following built-in roles availab
3434

3535
## Assign a built-in role
3636

37-
Keep in mind the following points about Azure role assignments with the De-identification service (preview):
37+
Keep in mind the following points about Azure role assignments with the de-identification service (preview):
3838

3939
- When you create a de-identification service, you aren't automatically assigned permissions to access data via Microsoft Entra ID. You need to explicitly assign yourself an applicable Azure role. You can assign it at the level of your subscription, resource group, or de-identification service.
4040
- When roles are assigned, it can take up to 10 minutes for changes to take effect.
@@ -45,15 +45,15 @@ You can use different tools to assign built-in roles. Select the tab that applie
4545

4646
# [Azure portal](#tab/azure-portal)
4747

48-
To use the De-identification service (preview), with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
48+
To use the de-identification service (preview), with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
4949

5050
# [Azure PowerShell](#tab/azure-powershell)
5151

5252
To assign an Azure role to a security principal with PowerShell, call the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command. In order to run the command, you must have a role that includes **Microsoft.Authorization/roleAssignments/write** permissions assigned to you at the corresponding scope or higher.
5353

5454
The format of the command can differ based on the scope of the assignment, but `ObjectId` and `RoleDefinitionName` are required parameters. While the `Scope` parameter is optional, you should set it to retain the principle of least privilege. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised.
5555

56-
The scope for a De-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
56+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
5757

5858
The example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values
5959
in angle brackets `<>` with your own values:
@@ -88,7 +88,7 @@ To assign an Azure role to a security principal with Azure CLI, use the [az role
8888

8989
The format of the command can differ based on the type of security principal, but `role` and `scope` are required parameters.
9090

91-
The scope for a De-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
91+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
9292

9393
The following example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values in angle brackets `<>` with your own values:
9494

articles/healthcare-apis/deidentification/managed-identities.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,22 +9,22 @@ ms.topic: how-to
99
ms.date: 07/17/2024
1010
---
1111

12-
# Use managed identities with the De-identification service (preview)
12+
# Use managed identities with the de-identification service (preview)
1313

1414
Managed identities provide Azure services with a secure, automatically managed identity in Microsoft Entra ID. Using managed identities eliminates the need for developers to manage credentials by providing an identity. There are two types of managed identities: system-assigned and user-assigned. The de-identification service supports both.
1515

16-
Managed identities can be used to grant the De-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
16+
Managed identities can be used to grant the de-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
1717

1818
## Prerequisites
1919

2020
- Understand the differences between **system-assigned** and **user-assigned** managed identities, described in [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
21-
- A De-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
21+
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
2222

23-
## Create an instance of the De-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
23+
## Create an instance of the de-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
2424

2525
# [Azure portal](#tab/portal)
2626

27-
1. Access the De-identification service (preview) settings in the Azure portal under the **Security** group in the left navigation pane.
27+
1. Access the de-identification service (preview) settings in the Azure portal under the **Security** group in the left navigation pane.
2828
1. Select **Identity**.
2929
1. Within the **System assigned** tab, switch **Status** to **On** and choose **Save**.
3030

@@ -46,7 +46,7 @@ the resource definition:
4646
# [Azure portal](#tab/portal)
4747

4848
1. Create a user-assigned managed identity resource according to [these instructions](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
49-
1. In the navigation pane of your De-identification service (preview), scroll to the **Security** group.
49+
1. In the navigation pane of your de-identification service (preview), scroll to the **Security** group.
5050
1. Select **Identity**.
5151
1. Select the **User assigned** tab, and then choose **Add**.
5252
1. Search for the identity you created, select it, and then choose **Add**.
@@ -69,16 +69,16 @@ the resource definition, replacing **resource-id** with the Azure Resource Manag
6969

7070
## Supported scenarios using managed identities
7171

72-
Managed identities assigned to the De-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
72+
Managed identities assigned to the de-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
7373

7474
## Clean-up steps
7575

7676
When you remove a system-assigned identity, you delete it from Microsoft Entra ID. System-assigned identities are also automatically removed from Microsoft Entra ID
77-
when you delete the De-identification service (preview), described as follows.
77+
when you delete the de-identification service (preview), described as follows.
7878

7979
# [Azure portal](#tab/portal)
8080

81-
1. In the navigation pane of your De-identification service (preview), scroll down to the **Security** group.
81+
1. In the navigation pane of your de-identification service (preview), scroll down to the **Security** group.
8282
1. Select **Identity**, then follow the steps based on the identity type:
8383
- **System-assigned identity**: Within the **System assigned** tab, switch **Status** to **Off**, and then choose **Save**.
8484
- **User-assigned identity**: Select the **User assigned** tab, select the checkbox for the identity, and select **Remove**. Select **Yes** to confirm.

articles/healthcare-apis/deidentification/overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.date: 7/17/2024
99
ms.author: kimiamavon
1010
---
1111

12-
# What is the De-identification service (preview)?
12+
# What is the de-identification service (preview)?
1313

14-
The De-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities - including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
14+
The de-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities - including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
1515

1616
## Use de-identified data in research, analytics, and machine learning
1717

18-
The De-identification service (preview) unlocks data that was previously difficult to de-identify so organizations can conduct research and derive insights from analytics. The De-identification service supports three operations: **tag**, **redact**, or **surrogate PHI**. The de-identification service offers many benefits, including:
18+
The de-identification service (preview) unlocks data that was previously difficult to de-identify so organizations can conduct research and derive insights from analytics. The de-identification service supports three operations: **tag**, **redact**, or **surrogate PHI**. The de-identification service offers many benefits, including:
1919

2020
- **Surrogation**: Surrogation, or replacement, is a best practice for PHI protection. The service can replace PHI elements with plausible replacement values, resulting in data that is most representative of the source data. Surrogation strengthens privacy protections as any false-negative PHI values are hidden within a document.
2121

@@ -25,7 +25,7 @@ The De-identification service (preview) unlocks data that was previously difficu
2525

2626
## De-identify clinical data securely and efficiently
2727

28-
The De-identification service (preview) offers many benefits, including:
28+
The de-identification service (preview) offers many benefits, including:
2929

3030
- **PHI compliance**: The de-identification service is designed for protected health information (PHI). The service uses machine learning to identify PHI entities, including HIPAA’s 18 identifiers, using the “TAG” operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate, or pseudonym. The service also meets all regional compliance requirements including HIPAA, GDPR, and the California Consumer Privacy Act (CCPA).
3131

@@ -35,14 +35,14 @@ The De-identification service (preview) offers many benefits, including:
3535

3636
## Synchronous or asynchronous endpoints
3737

38-
The De-identification service (preview) offers two ways to interact with the REST API or Client library (Azure SDK).
38+
The de-identification service (preview) offers two ways to interact with the REST API or Client library (Azure SDK).
3939

4040
- Directly submit raw unstructured text for analysis. The API output is returned in your application.
4141
- Submit a job to asynchronously endpoint process files in bulk from Azure Blob Storage using tag, redact, or surrogation with consistency within a job.
4242

4343
## Input requirements and service limits
4444

45-
The De-identification service (preview) is designed to receive unstructured text. To de-identify data stored in the FHIR&reg; service, see [Export deidentified data](/azure/healthcare-apis/fhir/deidentified-export).
45+
The de-identification service (preview) is designed to receive unstructured text. To de-identify data stored in the FHIR&reg; service, see [Export deidentified data](/azure/healthcare-apis/fhir/deidentified-export).
4646

4747
The following service limits are applicable during preview:
4848
- Requests can't exceed 50 KB.
@@ -60,7 +60,7 @@ When you choose to store documents in Azure Blob Storage, you are charged based
6060

6161
## Responsible use of AI
6262

63-
An AI system includes the technology, the people who use it, the people affected by it, and the environment where you deploy it. Read the transparency note for the De-identification service (preview) to learn about responsible AI use and deployment in your systems.
63+
An AI system includes the technology, the people who use it, the people affected by it, and the environment where you deploy it. Read the transparency note for the de-identification service (preview) to learn about responsible AI use and deployment in your systems.
6464

6565
## Related content
6666

articles/healthcare-apis/deidentification/quickstart-sdk-net.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Quickstart: Azure Health De-identification client library for .NET"
2+
title: "Quickstart: Azure Health de-identification client library for .NET"
33
description: A quickstart guide to de-identify health data with the .NET client library
44
author: GrahamMThomas
55
ms.author: gthomas
@@ -25,7 +25,7 @@ Get started with the Azure Health De-identification client library for .NET to d
2525

2626
### Create a Deidentification service (preview)
2727

28-
A De-identification service (preview) provides you with an endpoint URL. This endpoint url can be utilized as a Rest API or with an SDK.
28+
A de-identification service (preview) provides you with an endpoint URL. This endpoint url can be utilized as a Rest API or with an SDK.
2929

3030
1. Install [Azure CLI](/cli/azure/install-azure-cli)
3131
2. Create a de-identification service resource
@@ -47,9 +47,9 @@ A De-identification service (preview) provides you with an endpoint URL. This en
4747
az storage account create --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCE_GROUP_NAME --location $REGION
4848
```
4949

50-
### Authorize Deidentification service (preview) on Azure Storage Account
50+
### Authorize deidentification service (preview) on Storage Account
5151

52-
- Give the De-identification service (preview) access to your storage account
52+
- Give the de-identification service (preview) access to your storage account
5353

5454
```bash
5555
STORAGE_ACCOUNT_ID=$(az storage account show --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCE_GROUP_NAME --query id --output tsv)
@@ -90,7 +90,7 @@ The client library is available through NuGet, as the `Azure.Health.Deidentifica
9090

9191
### Create a deidentification client
9292

93-
Before you can create the client, you need to find your **De-identification service (preview) endpoint URL**.
93+
Before you can create the client, you need to find your **de-identification service (preview) endpoint URL**.
9494

9595
You can find the endpoint URL with the Azure CLI:
9696

@@ -198,9 +198,9 @@ az role assignment delete --assignee $DEID_SERVICE_PRINCIPAL_ID --role "Storage
198198

199199
### Unable to access source or target storage
200200

201-
Ensure the permissions are given, and the Managed Identity for the De-identification service (preview) is set up properly.
201+
Ensure the permissions are given, and the Managed Identity for the de-identification service (preview) is set up properly.
202202

203-
See [Authorize Deidentification Service on Storage Account](#authorize-deidentification-service-preview-on-azure-storage-account)
203+
See [Authorize deidentification service on Storage Account](#authorize-deidentification-service-preview-on-storage-account)
204204

205205
### Job failed with status PartialFailed
206206

@@ -212,7 +212,7 @@ See [Sample](https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/healthdata
212212
## Next steps
213213

214214
In this quickstart, you learned:
215-
- How to create a De-identification service (preview) and assign a role on a storage account.
215+
- How to create a de-identification service (preview) and assign a role on a storage account.
216216
- How to create a deidentification client
217217
- How to de-identify strings and create jobs on documents within a storage account.
218218

0 commit comments

Comments
 (0)