Skip to content

Commit 2a3df6c

Browse files
committed
Updated figured for portal release
1 parent 65d5a98 commit 2a3df6c

7 files changed

+8
-8
lines changed

articles/healthcare-apis/configure-azure-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,19 @@ In this article, you will learn how to use [Azure Role Based Access Control (RBA
1616

1717
To use Azure RBAC, your Azure API for FHIR must be configured to use your Azure subscription tenant for data plane and there should be no assigned identity object IDs. You can verify your settings by inspecting the **Authentication** blade of your Azure API for FHIR:
1818

19-
![Confirm Azure RBAC mode](media/rbac/confirm-azure-rbac-mode.png)
19+
:::image type="content" source="media/rbac/confirm-azure-rbac-mode.png" alt-text="Confirm Azure RBAC mode":::
2020

2121
The **Authority** should be set to the Azure Active directory tenant associated with your subscription and there should be no GUIDs in the box labeled **Allowed object IDs**. You will also notice that the box is disabled and a label indicates that Azure RBAC should be used to assign data plane roles.
2222

2323
## Assign roles
2424

2525
To grant users, service principals or groups access to the FHIR data plane, click **Access control (IAM)**, then click **Role assignments** and click **+ Add**:
2626

27-
![Add Azure RBAC role assignment](media/rbac/add-azure-rbac-role-assignment.png)
27+
:::image type="content" source="media/rbac/add-azure-rbac-role-assignment.png" alt-text="Add Azure RBAC role assignment":::
2828

2929
In the **Role** selection, search for one of the built-in roles for the FHIR data plane:
3030

31-
![Built-in FHIR data roles](media/rbac/built-in-fhir-data-roles.png)
31+
:::image type="content" source="media/rbac/built-in-fhir-data-roles.png" alt-text="Built-in FHIR data roles":::
3232

3333
You can choose between:
3434

articles/healthcare-apis/fhir-paas-portal-quickstart.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,29 +26,29 @@ Open the [Azure portal](https://portal.azure.com) and click **Create a resource*
2626

2727
You can find Azure API for FHIR by typing "FHIR" into the search box:
2828

29-
![Search for Healthcare APIs](media/quickstart-paas-portal/portal-search-healthcare-apis.png)
29+
:::image type="content" source="media/quickstart-paas-portal/portal-search-healthcare-apis.png" alt-text="Search for Healthcare APIs":::
3030

3131
## Create Azure API for FHIR account
3232

3333
Select **Create** to create a new Azure API for FHIR account:
3434

35-
![Create Azure API for FHIR account](media/quickstart-paas-portal/portal-create-healthcare-apis.png)
35+
:::image type="content" source="media/quickstart-paas-portal/portal-create-healthcare-apis.png" alt-text="Create Azure API for FHIR account":::
3636

3737
## Enter account details
3838

3939
Select an existing resource group or create a new one, choose a name for the account, and finally click **Review + create**:
4040

41-
![New healthcare api details](media/quickstart-paas-portal/portal-new-healthcareapi-details.png)
41+
:::image type="content" source="media/quickstart-paas-portal/portal-new-healthcareapi-details.png" alt-text="New healthcare api details":::
4242

4343
Confirm creation and await FHIR API deployment.
4444

4545
## Additional settings (optional)
4646

4747
You can also click **Next: Additional settings** to view the authentication settings. The default configuration for the Azure API for FHIR is to [use Azure RBAC for assigning data plane roles](configure-azure-rbac.md). When configured in this mode, the "Authority" for the FHIR service will be set to the Azure Active Directory tenant of the subscription:
4848

49-
![Default Authentication settings](media/rbac/confirm-azure-rbac-mode.png)
49+
:::image type="content" source="media/rbac/confirm-azure-rbac-mode-create.png" alt-text="Default Authentication settings":::
5050

51-
Notice that the box for entering allowed object IDs is greyed, since we use Azure RBAC for configuring role assignments in this case.
51+
Notice that the box for entering allowed object IDs is grayed out, since we use Azure RBAC for configuring role assignments in this case.
5252

5353
If you wish to configure the FHIR service to use an external or secondary Azure Active Directory tenant, you can change the Authority and enter object IDs for user and groups that should be allowed access to the server. For more information, see the [local RBAC configuration](configure-local-rbac.md) guide.
5454

38.7 KB
Loading
-1.48 KB
Loading
85.3 KB
Loading
88.8 KB
Loading
68.8 KB
Loading

0 commit comments

Comments
 (0)