You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/manage-access-rbac.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,21 +9,21 @@ ms.topic: how-to
9
9
ms.date: 07/16/2024
10
10
---
11
11
12
-
# Use Azure role-based access control with the De-identification service (preview)
12
+
# Use Azure role-based access control with the de-identification service (preview)
13
13
14
-
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The De-identification service (preview) defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
14
+
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The de-identification service (preview) defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
15
15
16
16
Microsoft Entra ID uses the concept of a security principal, which can be a user, a group, an application service principal, or a [managed identity for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
17
17
18
18
When an Azure role is assigned to a Microsoft Entra ID security principal over a specific scope, Azure grants access to that scope for that security principal. For more information about scopes, see [Understand scope for Azure RBAC](/azure/role-based-access-control/scope-overview).
19
19
20
20
## Prerequisites
21
21
22
-
- A De-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
22
+
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
23
23
24
24
## Available built-in roles
25
25
26
-
The De-identification service (preview) has the following built-in roles available:
26
+
The de-identification service (preview) has the following built-in roles available:
27
27
28
28
|Role |Description |
29
29
|-----|------------|
@@ -34,7 +34,7 @@ The De-identification service (preview) has the following built-in roles availab
34
34
35
35
## Assign a built-in role
36
36
37
-
Keep in mind the following points about Azure role assignments with the De-identification service (preview):
37
+
Keep in mind the following points about Azure role assignments with the de-identification service (preview):
38
38
39
39
- When you create a de-identification service, you aren't automatically assigned permissions to access data via Microsoft Entra ID. You need to explicitly assign yourself an applicable Azure role. You can assign it at the level of your subscription, resource group, or de-identification service.
40
40
- When roles are assigned, it can take up to 10 minutes for changes to take effect.
@@ -45,15 +45,15 @@ You can use different tools to assign built-in roles. Select the tab that applie
45
45
46
46
# [Azure portal](#tab/azure-portal)
47
47
48
-
To use the De-identification service (preview), with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
48
+
To use the de-identification service (preview), with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
49
49
50
50
# [Azure PowerShell](#tab/azure-powershell)
51
51
52
52
To assign an Azure role to a security principal with PowerShell, call the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command. In order to run the command, you must have a role that includes **Microsoft.Authorization/roleAssignments/write** permissions assigned to you at the corresponding scope or higher.
53
53
54
54
The format of the command can differ based on the scope of the assignment, but `ObjectId` and `RoleDefinitionName` are required parameters. While the `Scope` parameter is optional, you should set it to retain the principle of least privilege. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised.
55
55
56
-
The scope for a De-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
56
+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
57
57
58
58
The example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values
59
59
in angle brackets `<>` with your own values:
@@ -88,7 +88,7 @@ To assign an Azure role to a security principal with Azure CLI, use the [az role
88
88
89
89
The format of the command can differ based on the type of security principal, but `role` and `scope` are required parameters.
90
90
91
-
The scope for a De-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
91
+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
92
92
93
93
The following example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values in angle brackets `<>` with your own values:
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/managed-identities.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,22 +9,22 @@ ms.topic: how-to
9
9
ms.date: 07/17/2024
10
10
---
11
11
12
-
# Use managed identities with the De-identification service (preview)
12
+
# Use managed identities with the de-identification service (preview)
13
13
14
14
Managed identities provide Azure services with a secure, automatically managed identity in Microsoft Entra ID. Using managed identities eliminates the need for developers to manage credentials by providing an identity. There are two types of managed identities: system-assigned and user-assigned. The de-identification service supports both.
15
15
16
-
Managed identities can be used to grant the De-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
16
+
Managed identities can be used to grant the de-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
17
17
18
18
## Prerequisites
19
19
20
20
- Understand the differences between **system-assigned** and **user-assigned** managed identities, described in [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
21
-
- A De-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
21
+
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
22
22
23
-
## Create an instance of the De-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
23
+
## Create an instance of the de-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
24
24
25
25
# [Azure portal](#tab/portal)
26
26
27
-
1. Access the De-identification service (preview) settings in the Azure portal under the **Security** group in the left navigation pane.
27
+
1. Access the de-identification service (preview) settings in the Azure portal under the **Security** group in the left navigation pane.
28
28
1. Select **Identity**.
29
29
1. Within the **System assigned** tab, switch **Status** to **On** and choose **Save**.
30
30
@@ -46,7 +46,7 @@ the resource definition:
46
46
# [Azure portal](#tab/portal)
47
47
48
48
1. Create a user-assigned managed identity resource according to [these instructions](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
49
-
1. In the navigation pane of your De-identification service (preview), scroll to the **Security** group.
49
+
1. In the navigation pane of your de-identification service (preview), scroll to the **Security** group.
50
50
1. Select **Identity**.
51
51
1. Select the **User assigned** tab, and then choose **Add**.
52
52
1. Search for the identity you created, select it, and then choose **Add**.
@@ -69,16 +69,16 @@ the resource definition, replacing **resource-id** with the Azure Resource Manag
69
69
70
70
## Supported scenarios using managed identities
71
71
72
-
Managed identities assigned to the De-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
72
+
Managed identities assigned to the de-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
73
73
74
74
## Clean-up steps
75
75
76
76
When you remove a system-assigned identity, you delete it from Microsoft Entra ID. System-assigned identities are also automatically removed from Microsoft Entra ID
77
-
when you delete the De-identification service (preview), described as follows.
77
+
when you delete the de-identification service (preview), described as follows.
78
78
79
79
# [Azure portal](#tab/portal)
80
80
81
-
1. In the navigation pane of your De-identification service (preview), scroll down to the **Security** group.
81
+
1. In the navigation pane of your de-identification service (preview), scroll down to the **Security** group.
82
82
1. Select **Identity**, then follow the steps based on the identity type:
83
83
-**System-assigned identity**: Within the **System assigned** tab, switch **Status** to **Off**, and then choose **Save**.
84
84
-**User-assigned identity**: Select the **User assigned** tab, select the checkbox for the identity, and select **Remove**. Select **Yes** to confirm.
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/overview.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,13 @@ ms.date: 7/17/2024
9
9
ms.author: kimiamavon
10
10
---
11
11
12
-
# What is the De-identification service (preview)?
12
+
# What is the de-identification service (preview)?
13
13
14
-
The De-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities - including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
14
+
The de-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities - including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
15
15
16
16
## Use de-identified data in research, analytics, and machine learning
17
17
18
-
The De-identification service (preview) unlocks data that was previously difficult to de-identify so organizations can conduct research and derive insights from analytics. The De-identification service supports three operations: **tag**, **redact**, or **surrogate PHI**. The de-identification service offers many benefits, including:
18
+
The de-identification service (preview) unlocks data that was previously difficult to de-identify so organizations can conduct research and derive insights from analytics. The de-identification service supports three operations: **tag**, **redact**, or **surrogate PHI**. The de-identification service offers many benefits, including:
19
19
20
20
-**Surrogation**: Surrogation, or replacement, is a best practice for PHI protection. The service can replace PHI elements with plausible replacement values, resulting in data that is most representative of the source data. Surrogation strengthens privacy protections as any false-negative PHI values are hidden within a document.
21
21
@@ -25,7 +25,7 @@ The De-identification service (preview) unlocks data that was previously difficu
25
25
26
26
## De-identify clinical data securely and efficiently
27
27
28
-
The De-identification service (preview) offers many benefits, including:
28
+
The de-identification service (preview) offers many benefits, including:
29
29
30
30
-**PHI compliance**: The de-identification service is designed for protected health information (PHI). The service uses machine learning to identify PHI entities, including HIPAA’s 18 identifiers, using the “TAG” operation. The redaction and surrogation operations replace these identified PHI values with a tag of the entity type or a surrogate, or pseudonym. The service also meets all regional compliance requirements including HIPAA, GDPR, and the California Consumer Privacy Act (CCPA).
31
31
@@ -35,14 +35,14 @@ The De-identification service (preview) offers many benefits, including:
35
35
36
36
## Synchronous or asynchronous endpoints
37
37
38
-
The De-identification service (preview) offers two ways to interact with the REST API or Client library (Azure SDK).
38
+
The de-identification service (preview) offers two ways to interact with the REST API or Client library (Azure SDK).
39
39
40
40
- Directly submit raw unstructured text for analysis. The API output is returned in your application.
41
41
- Submit a job to asynchronously endpoint process files in bulk from Azure Blob Storage using tag, redact, or surrogation with consistency within a job.
42
42
43
43
## Input requirements and service limits
44
44
45
-
The De-identification service (preview) is designed to receive unstructured text. To de-identify data stored in the FHIR® service, see [Export deidentified data](/azure/healthcare-apis/fhir/deidentified-export).
45
+
The de-identification service (preview) is designed to receive unstructured text. To de-identify data stored in the FHIR® service, see [Export deidentified data](/azure/healthcare-apis/fhir/deidentified-export).
46
46
47
47
The following service limits are applicable during preview:
48
48
- Requests can't exceed 50 KB.
@@ -60,7 +60,7 @@ When you choose to store documents in Azure Blob Storage, you are charged based
60
60
61
61
## Responsible use of AI
62
62
63
-
An AI system includes the technology, the people who use it, the people affected by it, and the environment where you deploy it. Read the transparency note for the De-identification service (preview) to learn about responsible AI use and deployment in your systems.
63
+
An AI system includes the technology, the people who use it, the people affected by it, and the environment where you deploy it. Read the transparency note for the de-identification service (preview) to learn about responsible AI use and deployment in your systems.
0 commit comments