Skip to content

Commit 4691b54

Browse files
fixed links
1 parent 4d80fdc commit 4691b54

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@
9191
"redirect_document_id": true
9292
},
9393
{
94-
"source_path_from_root": "/articles/healthcare-apis/configure-private-link.md",
94+
"source_path_from_root": "/articles/healthcare-apis/healthcare-apis-configure-private-link.md",
9595
"redirect_url": "/azure/healthcare-apis/fhir/configure-private-link",
9696
"redirect_document_id": true
9797
},

articles/healthcare-apis/network-access-security.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,38 +16,38 @@ Azure Health Data Services provides multiple options for securing network access
1616

1717
## Private Link
1818

19-
[Private Link](https://learn.microsoft.com/azure/private-link/) is a network isolation technique that allows access to Azure services, including Azure Health Data Services. Private Link allows data to flow over private Microsoft networks instead of the public internet. By using Private Link, you can allow access only to specified virtual networks, and lock down access to provisioned services. For more information, see [Configuring Private Link](https://learn.microsoft.com/azure/healthcare-apis/healthcare-apis-configure-private-link).
19+
[Private Link](../private-link/index.yml) is a network isolation technique that allows access to Azure services, including Azure Health Data Services. Private Link allows data to flow over private Microsoft networks instead of the public internet. By using Private Link, you can allow access only to specified virtual networks, and lock down access to provisioned services. For more information, see [Configure Private Link](healthcare-apis-configure-private-link.md).
2020

2121
## Microsoft Trusted Services
2222

23-
Although most interactions with Azure Health Data Services are inbound requests, there are a few features of the services that need to make outbound connections to other resources. To control access from outbound connections, we recommend that you leverage the [Microsoft Trusted Service](../storage/common/storage-network-security.md) connections in the network settings of the target resource. Each outbound feature can have slightly different setup steps and intended target resources.
23+
Although most interactions with Azure Health Data Services are inbound requests, there are a few features of the services that need to make outbound connections to other resources. To control access from outbound connections, we recommend that you use the [Microsoft Trusted Service](../storage/common/storage-network-security.md) connections in the network settings of the target resource. Each outbound feature can have slightly different setup steps and intended target resources.
2424

2525
Here's a list of features that can make outbound connections from Azure Health Data Services:
2626

2727
### FHIR service
2828

29-
- **Export**: [Allowing FHIR service export as a Microsoft Trusted Service](fhir/configure-export-data.md)
30-
- **Import**: [Allowing FHIR service import as a Microsoft Trusted Service](fhir/configure-import-data.md)
31-
- **Convert**: [Allowing trusted services access to Azure Container Registry](../container-registry/allow-access-trusted-services.md)
32-
- **Events**: [Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
33-
- **Customer-managed keys**: [Allowing trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
29+
- **Export**: [Allow FHIR service export as a Microsoft Trusted Service](fhir/configure-export-data.md)
30+
- **Import**: [Allow FHIR service import as a Microsoft Trusted Service](fhir/configure-import-data.md)
31+
- **Convert**: [Allow trusted services access to Azure Container Registry](../container-registry/allow-access-trusted-services.md)
32+
- **Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
33+
- **Customer-managed keys**: [Allow trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
3434

3535
### DICOM service
3636

37-
- **Import, export, and analytical support**: [Trusted Services access to Azure Storage Accounts](../storage/common/storage-network-security.md)
38-
- **Events**: [Microsoft Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
39-
- **Customer-managed keys**: [Allowing Microsoft Trusted Services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
37+
- **Import, export, and analytical support**: [Allow trusted services access to Azure Storage accounts](../storage/common/storage-network-security.md)
38+
- **Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
39+
- **Customer-managed keys**: [Allow trusted services access to Azure Key Vault](../key-vault/general/overview-vnet-service-endpoints.md)
4040

4141
### MedTech service
4242

43-
- **Events**: [Microsoft Trusted Services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
43+
- **Events**: [Allow trusted services access to Azure Event Hubs](../event-hubs/event-hubs-service-endpoints.md)
4444

4545
## Service tags
4646

4747
[Service tags](../virtual-network/service-tags-overview.md) are sets of IP addresses that correspond to an Azure Service, for example Azure Health Data Services. You can use tags to control access on several Azure networking offerings such as Network Security Groups, Azure Firewall, and more.
4848

49-
Azure Health Data Services offers a [service tag](../virtual-network/service-tags-overview.md) `AzureHealthcareAPIs` that you can use to control access to and from the services. However, there are a number of caveats that come with using Service Tags for network isolation, and we don't recommend relying on them. Instead, use the approaches described in this article for more granular controls. Service tags are shared across all users of a service, and all provisioned instances. Tags provide no isolation between customers within Azure Health Data Services, between separate instances of the workspaces, nor between the different service offerings.
49+
Azure Health Data Services offers a [service tag](../virtual-network/service-tags-overview.md) `AzureHealthcareAPIs` that you can use to control access to and from the services. However, there are a few caveats that come with using Service Tags for network isolation, and we don't recommend relying on them. Instead, use the approaches described in this article for more granular controls. Service tags are shared across all users of a service, and all provisioned instances. Tags provide no isolation between customers within Azure Health Data Services, between separate instances of the workspaces, nor between the different service offerings.
5050

51-
If you use service tags, keep in mind that they are a convenient way of keeping track of sets of IP addresses, and aren't a substitute for proper network security measures.
51+
If you use service tags, keep in mind that they're a convenient way of keeping track of sets of IP addresses. However, tags aren't a substitute for proper network security measures.
5252

5353
[!INCLUDE [FHIR and DICOM trademark statement](includes/healthcare-apis-fhir-dicom-trademark.md)]

articles/healthcare-apis/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
- name: Business continuity & disaster recovery
2222
href: business-continuity-disaster-recovery.md
2323
- name: Manage network access security
24-
href: network-security.md
24+
href: network-access-security.md
2525
- name: Quickstarts
2626
items:
2727
- name: Workspace provisioning

0 commit comments

Comments
 (0)