Skip to content

Commit 1d73b77

Browse files
committed
initial
1 parent 6e33ef2 commit 1d73b77

11 files changed

+71
-71
lines changed

articles/healthcare-apis/deidentification/configure-private-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: deidentification-service
1010
# customer intent: As an IT admin, I want to restrict network access to a de-identification service to a private endpoint in a virtual network.
1111
---
1212

13-
# Configure Private Endpoint network access to Azure Health Data Services de-identification service (preview)
13+
# Configure Private Endpoint network access to Azure Health Data Services de-identification service
1414
Azure Private Link enables you to access Azure services over a **private endpoint** in your virtual network.
1515

1616
A private endpoint is a network interface that connects you privately and securely to an Azure service which supports Azure Private Link. The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service is routed through the private endpoint, so no gateways, NAT devices, ExpressRoute or VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses the Microsoft backbone network, eliminating exposure from the public Internet. You can restrict connections to specific instances of an Azure service, giving you the highest level of granularity in access control.
@@ -28,7 +28,7 @@ For more information, see [What is Azure Private Link?](../../private-link/priva
2828

2929
Follow the steps at [Quickstart: Create a private endpoint by using the Azure portal](/azure/private-link/create-private-endpoint-portal).
3030

31-
- Instead of a webapp, create a private endpoint to a de-identification service (preview).
31+
- Instead of a webapp, create a private endpoint to a de-identification service.
3232
- When you reach [Create a private endpoint](/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip#create-a-private-endpoint), step 5, enter resource type **Microsoft.HealthDataAIServices/deidServices**.
3333
- Your private endpoint and virtual network must be in the same region. When you select a region for the private endpoint using the portal, it automatically filters virtual networks that are in that region. Your de-identification service can be in a different region.
3434
- When you reach [Test connectivity to the private endpoint](/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip#test-connectivity-to-the-private-endpoint) steps 8 and 10, use the service URL of your de-identification service plus the `/health` path.
@@ -38,7 +38,7 @@ Follow the steps at [Quickstart: Create a private endpoint by using the Azure po
3838
> [!IMPORTANT]
3939
> Creating a private endpoint does **not** restrict public network access automatically.
4040
41-
When creating a de-identification service (preview), you can either allow public only (from all networks) or private only (only via private endpoints) access to the de-identification service.
41+
When creating a de-identification service, you can either allow public only (from all networks) or private only (only via private endpoints) access to the de-identification service.
4242

4343
If you already have a de-identification service, you can configure network access by going to the service's Azure portal **Networking** page, and under **Public network access**, selecting **Disabled**.
4444

articles/healthcare-apis/deidentification/configure-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 11/01/2024
1414

1515
# Tutorial: Configure Azure Storage to de-identify documents
1616

17-
The Azure Health Data Services de-identification service (preview) can de-identify documents in Azure Storage via an asynchronous job. If you have many documents that you would like
17+
The Azure Health Data Services de-identification service can de-identify documents in Azure Storage via an asynchronous job. If you have many documents that you would like
1818
to de-identify, using a job is a good option. Jobs also provide consistent surrogation, meaning that surrogate values in the de-identified output will match across
19-
all documents. For more information about de-identification, including consistent surrogation, see [What is the de-identification service (preview)?](overview.md)
19+
all documents. For more information about de-identification, including consistent surrogation, see [What is the de-identification service?](overview.md)
2020

2121
When you choose to store documents in Azure Blob Storage, you're charged based on Azure Storage pricing. This cost isn't included in the
2222
de-identification service pricing. [Explore Azure Blob Storage pricing](https://azure.microsoft.com/pricing/details/storage/blobs).
@@ -32,7 +32,7 @@ In this tutorial, you:
3232
## Prerequisites
3333

3434
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35-
* A de-identification service with system-assigned managed identity. [Deploy the de-identification service (preview)](quickstart.md).
35+
* A de-identification service with system-assigned managed identity. [Deploy the de-identification service](quickstart.md).
3636

3737
## Open Azure CLI
3838

articles/healthcare-apis/deidentification/manage-access-rbac.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Manage access to the de-identification service (preview) with Azure role-based access control (RBAC) in Azure Health Data Services
3-
description: Learn how to manage access to the de-identification service (preview) using Azure role-based access control.
2+
title: Manage access to the de-identification service with Azure role-based access control (RBAC) in Azure Health Data Services
3+
description: Learn how to manage access to the de-identification service using Azure role-based access control.
44
author: jovinson-ms
55
ms.author: jovinson
66
ms.service: azure-health-data-services
@@ -9,21 +9,21 @@ ms.topic: how-to
99
ms.date: 07/16/2024
1010
---
1111

12-
# Use Azure role-based access control with the de-identification service (preview)
12+
# Use Azure role-based access control with the de-identification service
1313

14-
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The de-identification service (preview) defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
14+
Microsoft Entra ID authorizes access rights to secured resources through Azure role-based access control (RBAC). The de-identification service defines a set of built-in roles that encompass common sets of permissions used to access de-identification functionality.
1515

1616
Microsoft Entra ID uses the concept of a security principal, which can be a user, a group, an application service principal, or a [managed identity for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
1717

1818
When an Azure role is assigned to a Microsoft Entra ID security principal over a specific scope, Azure grants access to that scope for that security principal. For more information about scopes, see [Understand scope for Azure RBAC](/azure/role-based-access-control/scope-overview).
1919

2020
## Prerequisites
2121

22-
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
22+
- A de-identification service in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
2323

2424
## Available built-in roles
2525

26-
The de-identification service (preview) has the following built-in roles available:
26+
The de-identification service has the following built-in roles available:
2727

2828
|Role |Description |
2929
|-----|------------|
@@ -34,7 +34,7 @@ The de-identification service (preview) has the following built-in roles availab
3434

3535
## Assign a built-in role
3636

37-
Keep in mind the following points about Azure role assignments with the de-identification service (preview):
37+
Keep in mind the following points about Azure role assignments with the de-identification service:
3838

3939
- When you create a de-identification service, you aren't automatically assigned permissions to access data via Microsoft Entra ID. You need to explicitly assign yourself an applicable Azure role. You can assign it at the level of your subscription, resource group, or de-identification service.
4040
- When roles are assigned, it can take up to 10 minutes for changes to take effect.
@@ -45,15 +45,15 @@ You can use different tools to assign built-in roles. Select the tab that applie
4545

4646
# [Azure portal](#tab/azure-portal)
4747

48-
To use the de-identification service (preview), with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
48+
To use the de-identification service, with Microsoft Entra ID credentials, a security principal must be assigned one of the built-in roles. To learn how to assign these roles to a security principal, follow the steps in [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
4949

5050
# [Azure PowerShell](#tab/azure-powershell)
5151

5252
To assign an Azure role to a security principal with PowerShell, call the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command. In order to run the command, you must have a role that includes **Microsoft.Authorization/roleAssignments/write** permissions assigned to you at the corresponding scope or higher.
5353

5454
The format of the command can differ based on the scope of the assignment, but `ObjectId` and `RoleDefinitionName` are required parameters. While the `Scope` parameter is optional, you should set it to retain the principle of least privilege. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised.
5555

56-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
56+
The scope for a de-identification service is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
5757

5858
The example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values
5959
in angle brackets `<>` with your own values:
@@ -88,7 +88,7 @@ To assign an Azure role to a security principal with Azure CLI, use the [az role
8888

8989
The format of the command can differ based on the type of security principal, but `role` and `scope` are required parameters.
9090

91-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
91+
The scope for a de-identification service is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
9292

9393
The following example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values in angle brackets `<>` with your own values:
9494

articles/healthcare-apis/deidentification/managed-identities.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Use managed identities with the de-identification service (preview) in Azure Health Data Services
3-
description: Learn how to use managed identities with the Azure Health Data Services de-identification service (preview) using the Azure portal and ARM template.
2+
title: Use managed identities with the de-identification service in Azure Health Data Services
3+
description: Learn how to use managed identities with the Azure Health Data Services de-identification service using the Azure portal and ARM template.
44
author: jovinson-ms
55
ms.author: jovinson
66
ms.service: azure-health-data-services
@@ -9,22 +9,22 @@ ms.topic: how-to
99
ms.date: 07/17/2024
1010
---
1111

12-
# Use managed identities with the de-identification service (preview)
12+
# Use managed identities with the de-identification service
1313

1414
Managed identities provide Azure services with a secure, automatically managed identity in Microsoft Entra ID. Using managed identities eliminates the need for developers to manage credentials by providing an identity. There are two types of managed identities: system-assigned and user-assigned. The de-identification service supports both.
1515

16-
Managed identities can be used to grant the de-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
16+
Managed identities can be used to grant the de-identification service access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
1717

1818
## Prerequisites
1919

2020
- Understand the differences between **system-assigned** and **user-assigned** managed identities, described in [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
21-
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
21+
- A de-identification service in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
2222

23-
## Create an instance of the de-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
23+
## Create an instance of the de-identification service in Azure Health Data Services with a system-assigned managed identity
2424

2525
# [Azure portal](#tab/portal)
2626

27-
1. Access the de-identification service (preview) settings in the Azure portal under the **Security** group in the left navigation pane.
27+
1. Access the de-identification service settings in the Azure portal under the **Security** group in the left navigation pane.
2828
1. Select **Identity**.
2929
1. Within the **System assigned** tab, switch **Status** to **On** and choose **Save**.
3030

@@ -46,7 +46,7 @@ the resource definition:
4646
# [Azure portal](#tab/portal)
4747

4848
1. Create a user-assigned managed identity resource according to [these instructions](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
49-
1. In the navigation pane of your de-identification service (preview), scroll to the **Security** group.
49+
1. In the navigation pane of your de-identification service, scroll to the **Security** group.
5050
1. Select **Identity**.
5151
1. Select the **User assigned** tab, and then choose **Add**.
5252
1. Search for the identity you created, select it, and then choose **Add**.
@@ -69,16 +69,16 @@ the resource definition, replacing **resource-id** with the Azure Resource Manag
6969

7070
## Supported scenarios using managed identities
7171

72-
Managed identities assigned to the de-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
72+
Managed identities assigned to the de-identification service can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
7373

7474
## Clean-up steps
7575

7676
When you remove a system-assigned identity, you delete it from Microsoft Entra ID. System-assigned identities are also automatically removed from Microsoft Entra ID
77-
when you delete the de-identification service (preview), described as follows.
77+
when you delete the de-identification service, described as follows.
7878

7979
# [Azure portal](#tab/portal)
8080

81-
1. In the navigation pane of your de-identification service (preview), scroll down to the **Security** group.
81+
1. In the navigation pane of your de-identification service, scroll down to the **Security** group.
8282
1. Select **Identity**, then follow the steps based on the identity type:
8383
- **System-assigned identity**: Within the **System assigned** tab, switch **Status** to **Off**, and then choose **Save**.
8484
- **User-assigned identity**: Select the **User assigned** tab, select the checkbox for the identity, and select **Remove**. Select **Yes** to confirm.
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Monitoring data reference for the De-identification service (preview) in Azure Health Data Services
3-
description: This article contains important reference material you need when you monitor the De-identification service (preview) in Azure Health Data Services.
2+
title: Monitoring data reference for the De-identification service in Azure Health Data Services
3+
description: This article contains important reference material you need when you monitor the De-identification service in Azure Health Data Services.
44
ms.date: 09/05/2024
55
ms.custom: horz-monitor
66
ms.topic: reference
@@ -10,10 +10,10 @@ ms.service: azure-health-data-services
1010
ms.subservice: deidentification-service
1111
---
1212

13-
# Azure Health Data Services de-identification service (preview) monitoring data reference
13+
# Azure Health Data Services de-identification service monitoring data reference
1414
[!INCLUDE [horz-monitor-ref-intro](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-intro.md)]
1515

16-
See [Monitor the de-identification service (preview)](monitor-deidentification-service.md) for details on the data you can collect for the de-identification service and how to use it.
16+
See [Monitor the de-identification service](monitor-deidentification-service.md) for details on the data you can collect for the de-identification service and how to use it.
1717

1818
[!INCLUDE [horz-monitor-ref-resource-logs](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-resource-logs.md)]
1919

@@ -22,7 +22,7 @@ See [Monitor the de-identification service (preview)](monitor-deidentification-s
2222

2323
[!INCLUDE [horz-monitor-ref-logs-tables](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-logs-tables.md)]
2424

25-
### Azure Health Data Services de-identification service (preview)
25+
### Azure Health Data Services de-identification service
2626
Microsoft.HealthDataAIServices/deidServices
2727
- [AHDSDeidAuditLogs](/azure/azure-monitor/reference/tables/ahdsdeidauditlogs#columns)
2828

@@ -31,5 +31,5 @@ Microsoft.HealthDataAIServices/deidServices
3131

3232
## Related content
3333

34-
- See [Monitor the Azure Health Data Services de-identification service](monitor-deidentification-service.md) for a description of monitoring the Azure Health Data Services de-identification service (preview).
34+
- See [Monitor the Azure Health Data Services de-identification service](monitor-deidentification-service.md) for a description of monitoring the Azure Health Data Services de-identification service.
3535
- See [Monitor Azure resources with Azure Monitor](/azure/azure-monitor/essentials/monitor-azure-resource) for details on monitoring Azure resources.

0 commit comments

Comments
 (0)