You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/network-access-security.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,38 +16,38 @@ Azure Health Data Services provides multiple options for securing network access
16
16
17
17
## Private Link
18
18
19
-
[Private Link](https://learn.microsoft.com/azure/private-link/) is a network isolation technique that allows access to Azure services, including Azure Health Data Services. Private Link allows data to flow over private Microsoft networks instead of the public internet. By using Private Link, you can allow access only to specified virtual networks, and lock down access to provisioned services. For more information, see [Configuring Private Link](https://learn.microsoft.com/azure/healthcare-apis/healthcare-apis-configure-private-link).
19
+
[Private Link](../private-link/index.yml) is a network isolation technique that allows access to Azure services, including Azure Health Data Services. Private Link allows data to flow over private Microsoft networks instead of the public internet. By using Private Link, you can allow access only to specified virtual networks, and lock down access to provisioned services. For more information, see [Configure Private Link](healthcare-apis-configure-private-link.md).
20
20
21
21
## Microsoft Trusted Services
22
22
23
-
Although most interactions with Azure Health Data Services are inbound requests, there are a few features of the services that need to make outbound connections to other resources. To control access from outbound connections, we recommend that you leverage the [Microsoft Trusted Service](../storage/common/storage-network-security.md) connections in the network settings of the target resource. Each outbound feature can have slightly different setup steps and intended target resources.
23
+
Although most interactions with Azure Health Data Services are inbound requests, there are a few features of the services that need to make outbound connections to other resources. To control access from outbound connections, we recommend that you use the [Microsoft Trusted Service](../storage/common/storage-network-security.md) connections in the network settings of the target resource. Each outbound feature can have slightly different setup steps and intended target resources.
24
24
25
25
Here's a list of features that can make outbound connections from Azure Health Data Services:
26
26
27
27
### FHIR service
28
28
29
-
-**Export**: [Allowing FHIR service export as a Microsoft Trusted Service](fhir/configure-export-data.md)
30
-
-**Import**: [Allowing FHIR service import as a Microsoft Trusted Service](fhir/configure-import-data.md)
31
-
-**Convert**: [Allowing trusted services access to Azure Container Registry](../container-registry/allow-access-trusted-services.md)
32
-
-**Events**: [Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
33
-
-**Customer-managed keys**: [Allowing trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
29
+
-**Export**: [Allow FHIR service export as a Microsoft Trusted Service](fhir/configure-export-data.md)
30
+
-**Import**: [Allow FHIR service import as a Microsoft Trusted Service](fhir/configure-import-data.md)
31
+
-**Convert**: [Allow trusted services access to Azure Container Registry](../container-registry/allow-access-trusted-services.md)
32
+
-**Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
33
+
-**Customer-managed keys**: [Allow trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
34
34
35
35
### DICOM service
36
36
37
-
-**Import, export, and analytical support**: [Trusted Services access to Azure Storage Accounts](../storage/common/storage-network-security.md)
38
-
-**Events**: [Microsoft Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
39
-
-**Customer-managed keys**: [Allowing Microsoft Trusted Services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
37
+
-**Import, export, and analytical support**: [Allow trusted services access to Azure Storage accounts](../storage/common/storage-network-security.md)
38
+
-**Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
39
+
-**Customer-managed keys**: [Allow trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
40
40
41
41
### MedTech service
42
42
43
-
-**Events**: [Microsoft Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
43
+
-**Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
44
44
45
45
## Service tags
46
46
47
47
[Service tags](../virtual-network/service-tags-overview.md) are sets of IP addresses that correspond to an Azure Service, for example Azure Health Data Services. You can use tags to control access on several Azure networking offerings such as Network Security Groups, Azure Firewall, and more.
48
48
49
-
Azure Health Data Services offers a [service tag](../virtual-network/service-tags-overview.md)`AzureHealthcareAPIs` that you can use to control access to and from the services. However, there are a number of caveats that come with using Service Tags for network isolation, and we don't recommend relying on them. Instead, use the approaches described in this article for more granular controls. Service tags are shared across all users of a service, and all provisioned instances. Tags provide no isolation between customers within Azure Health Data Services, between separate instances of the workspaces, nor between the different service offerings.
49
+
Azure Health Data Services offers a [service tag](../virtual-network/service-tags-overview.md)`AzureHealthcareAPIs` that you can use to control access to and from the services. However, there are a few caveats that come with using Service Tags for network isolation, and we don't recommend relying on them. Instead, use the approaches described in this article for more granular controls. Service tags are shared across all users of a service, and all provisioned instances. Tags provide no isolation between customers within Azure Health Data Services, between separate instances of the workspaces, nor between the different service offerings.
50
50
51
-
If you use service tags, keep in mind that they are a convenient way of keeping track of sets of IP addresses, and aren't a substitute for proper network security measures.
51
+
If you use service tags, keep in mind that they're a convenient way of keeping track of sets of IP addresses. However, tags aren't a substitute for proper network security measures.
52
52
53
53
[!INCLUDE [FHIR and DICOM trademark statement](includes/healthcare-apis-fhir-dicom-trademark.md)]
0 commit comments