Skip to content

Commit 346e571

Browse files
committed
markdown cleanup, edits for clarity
1 parent 0992dc1 commit 346e571

File tree

3 files changed

+37
-38
lines changed

3 files changed

+37
-38
lines changed

articles/healthcare-apis/fhir/configure-identity-providers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: namalu
1313

1414
# Configure multiple service identity providers
1515

16-
In addition to [Microsoft Entra ID](/entra/fundamentals/whatis), you can configure up to two additional identity providers for a FHIR service, whether the service already exists or is newly created.
16+
In addition to [Microsoft Entra ID](/entra/fundamentals/whatis), you can configure up to two additional identity providers for a FHIR® service, whether the service already exists or is newly created.
1717

1818
## Identity providers prerequisite
1919
Identity providers must support OpenID Connect (OIDC), and must be able to issue JSON Web Tokens (JWT) with a `fhirUser` claim, a `azp` or `appid` claim, and an `scp` claim with [SMART on FHIR v1 Scopes](https://www.hl7.org/fhir/smart-app-launch/1.0.0/scopes-and-launch-context/index.html#scopes-for-requesting-clinical-data).
@@ -58,7 +58,7 @@ Add the `smartIdentityProviders` element to the FHIR service `authenticationConf
5858

5959
#### Configure the `smartIdentityProviders` array
6060

61-
If you don't need any identity providers besides Microsoft Entra ID, set the `smartIdentityProviders` array to null, or omit it from the provisioning request. Otherwise, include at least one valid identity provider configuration object in the array. You can configure up to two additional identity providers.
61+
If you don't need any identity providers beside Microsoft Entra ID, set the `smartIdentityProviders` array to null, or omit it from the provisioning request. Otherwise, include at least one valid identity provider configuration object in the array. You can configure up to two additional identity providers.
6262

6363
#### Specify the `authority`
6464

@@ -74,19 +74,19 @@ https://yourIdentityProvider.com/authority/v2.0/.well-known/openid-configuration
7474

7575
#### Configure the `applications` array
7676

77-
You must include at least one application configuration and can add upto 25 applications in the `applications` array. Each application configuration has values that validate access token claims and an array that defines the permissions for the application to access FHIR resources.
77+
You must include at least one application configuration and can add up to 25 applications in the `applications` array. Each application configuration has values that validate access token claims, and an array that defines the permissions for the application to access FHIR resources.
7878

7979
#### Identify the application with the `clientId` string
8080

81-
The identity provider defines the application with a unique identifier called the `clientId` string (or application ID). The FHIR service validates the access token by checking the `authorized party` (azp) or `application id` (appid) claim against the `clientId` string. The FHIR service rejects requests with a `401 Unauthorized` error code if the `clientId` string and the token claim don't match exactly.
81+
The identity provider defines the application with a unique identifier called the `clientId` string (or application ID). The FHIR service validates the access token by checking the `authorized party` (azp) or `application id` (appid) claim against the `clientId` string. If the `clientId` string and the token claim don't match exactly, the FHIR service rejects the request with a `401 Unauthorized` error code.
8282

8383
#### Validate the access token with the `audience` string
8484

85-
The `aud` claim in an access token identifies the intended recipient of the token. The `audience` string is the unique identifier for the recipient. The FHIR service validates the access token by checking the `audience` string against the `aud` claim. The FHIR service rejects requests with a `401 Unauthorized` error code if the `audience` string and the `aud` claim don't match exactly.
85+
The `aud` claim in an access token identifies the intended recipient of the token. The `audience` string is the unique identifier for the recipient. The FHIR service validates the access token by checking the `audience` string against the `aud` claim. If the `audience` string and the `aud` claim don't match exactly, the FHIR service rejects requests with a `401 Unauthorized` error code.
8686

8787
#### Specify the permissions with the `allowedDataActions` array
8888

89-
Include at least one permission string in the `allowedDataActions` array. You can include any valid permission strings, but avoid duplicates.
89+
Include at least one permission string in the `allowedDataActions` array. You can include any valid permission strings. Avoid duplicates.
9090

9191
| **Valid permission string** | **Description** |
9292
|---|---|

articles/healthcare-apis/fhir/configure-import-data.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,10 @@ ms.author: kesheth
1111

1212
# Configure FHIR import settings
1313

14-
This article walks you through the steps to configure settings on the FHIR service for `import` operations. To configure settings, you need to:
14+
This article walks you through the steps to configure settings on the FHIR® service for `import` operations. To configure settings, you need to:
1515

1616
1. Enable a managed identity on the FHIR service.
17-
1. Create an Azure storage account or use an existing storage account, and then grant permissions to the FHIR service to access it.
17+
1. Create an Azure storage account or use an existing storage account, and grant permissions for the FHIR service to access it.
1818
1. Set the import configuration of the FHIR service.
1919
1. Use one of the options to securely import FHIR data into the FHIR service from an Azure Data Lake Storage Gen2 account.
2020

@@ -35,7 +35,7 @@ After you enable the managed identity, a system-assigned GUID value appears.
3535

3636
## Step 2: Assign permissions to the FHIR service
3737

38-
Use the following steps to assign permissions to access the storage account:
38+
Use the following steps to assign permissions to access the storage account.
3939

4040
1. In the storage account, browse to **Access Control (IAM)**.
4141
2. Select **Add role assignment**. If the option for adding a role assignment is unavailable, ask your Azure administrator to assign you permission to perform this step.
@@ -53,14 +53,13 @@ Now you're ready to select the storage account for import.
5353
> [!NOTE]
5454
> If you haven't assigned storage access permissions to the FHIR service, the `import` operation will fail.
5555
56-
For this step, you need to get the request URL and JSON body:
56+
For this step, you need to get the request URL and JSON body.
5757

5858
1. In the Azure portal, browse to your FHIR service.
5959
2. Select **Overview**.
6060
3. Select **JSON View**.
6161
4. Select the API version as **2022-06-01** or later.
6262

63-
6463
To specify the Azure storage account in JSON view which is in **READ** mode, you need to use the [REST API](/rest/api/healthcareapis/services/create-or-update) to update the FHIR service.
6564

6665
[![Screenshot of selections for opening the JSON view.](media/bulk-import/fhir-json-view.png)](media/bulk-import/fhir-json-view.png#lightbox)
@@ -69,7 +68,7 @@ The following steps walk you through setting configurations for initial and incr
6968

7069
### Set the import configuration for initial import mode
7170

72-
Make the following changes to JSON:
71+
Make the following changes to JSON.
7372

7473
1. In `importConfiguration`, set `enabled` to `true`.
7574
2. Update `integrationDataStore` with the target storage account name.
@@ -82,7 +81,7 @@ You're now ready to perform initial-mode import by using `import`.
8281

8382
### Set the import configuration for incremental import mode
8483

85-
Make the following changes to JSON:
84+
Make the following changes to JSON.
8685

8786
1. In `importConfiguration`, set `enabled` to `true`.
8887
2. Update `integrationDataStore` with the target storage account name.
@@ -105,7 +104,7 @@ To securely import FHIR data into the FHIR service from an Azure Data Lake Stora
105104

106105
### Enable the FHIR service as a trusted Microsoft service
107106

108-
1. In the Azure portal, go to your Data Lake Storage Gen2 account in the Azure portal.
107+
1. In the Azure portal, go to your Data Lake Storage Gen2 account.
109108

110109
1. On the left menu, select **Networking**.
111110

@@ -153,9 +152,9 @@ You're now ready to securely import FHIR data from the storage account. The stor
153152

154153
## Next steps
155154

156-
In this article, you learned how the FHIR service supports the `import` operation and how you can import data into the FHIR service from a storage account. You also learned about the steps for configuring import settings in the FHIR service. For more information about converting data to FHIR, exporting settings to set up a storage account, and moving data to Azure Synapse Analytics, see:
155+
In this article, you learned how the FHIR service supports the `import` operation, and how you can import data into the FHIR service from a storage account. You also learned about the steps for configuring import settings in the FHIR service. For more information about converting data to FHIR, exporting settings to set up a storage account, and moving data to Azure Synapse Analytics, see:
157156

158157
>[!div class="nextstepaction"]
159158
>[Import FHIR data](import-data.md)
160159
161-
FHIR® is a registered trademark of [HL7](https://hl7.org/fhir/) and is used with the permission of HL7.
160+
[!INCLUDE [FHIR trademark statement](../includes/healthcare-apis-fhir-trademark.md)]

0 commit comments

Comments
 (0)