Skip to content

Commit 690c064

Browse files
authored
Merge pull request #285016 from KendalBond007/DICOMcleanup
Markdown cleanup of new content
2 parents 06e91da + 7a84f9f commit 690c064

File tree

5 files changed

+31
-35
lines changed

5 files changed

+31
-35
lines changed

articles/healthcare-apis/deidentification/manage-access-rbac.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Keep in mind the following points about Azure role assignments with the de-ident
4141
- When the de-identification service is locked with an [Azure Resource Manager read-only lock](/azure/azure-resource-manager/management/lock-resources), the lock prevents the assignment of Azure roles that are scoped to the de-identification service.
4242
- When Azure deny assignments have been applied, your access might be blocked even if you have a role assignment. For more information, see [Understand Azure deny assignments](/azure/role-based-access-control/deny-assignments).
4343

44-
You can use different tools to assign built-in roles.
44+
You can use different tools to assign built-in roles. Select the tab that applies for details.
4545

4646
# [Azure portal](#tab/azure-portal)
4747

@@ -53,7 +53,7 @@ To assign an Azure role to a security principal with PowerShell, call the [New-A
5353

5454
The format of the command can differ based on the scope of the assignment, but `ObjectId` and `RoleDefinitionName` are required parameters. While the `Scope` parameter is optional, you should set it to retain the principle of least privilege. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised.
5555

56-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
56+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
5757

5858
The example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values
5959
in angle brackets `<>` with your own values:
@@ -62,24 +62,22 @@ in angle brackets `<>` with your own values:
6262
New-AzRoleAssignment
6363
-SignInName <Email> `
6464
-RoleDefinitionName "DeID Data Owner" `
65-
-Scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>"
65+
-Scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>"
6666
```
6767

6868
A successful response should look like:
6969

7070
```
71-
7271
console
73-
RoleAssignmentId : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>/providers/Microsoft.Authorization/roleAssignments/<Role Assignment ID>
74-
Scope : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>
72+
RoleAssignmentId : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>/providers/Microsoft.Authorization/roleAssignments/<Role Assignment ID>
73+
Scope : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>
7574
DisplayName : Mark Patrick
7675
SignInName : [email protected]
7776
RoleDefinitionName : DeID Data Owner
7877
RoleDefinitionId : <Role Definition ID>
7978
ObjectId : <Object ID>
8079
ObjectType : User
8180
CanDelegate : False
82-
8381
```
8482

8583
For more information, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-powershell).
@@ -90,15 +88,15 @@ To assign an Azure role to a security principal with Azure CLI, use the [az role
9088

9189
The format of the command can differ based on the type of security principal, but `role` and `scope` are required parameters.
9290

93-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
91+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
9492

9593
The following example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values in angle brackets `<>` with your own values:
9694

9795
```azurecli
9896
az role assignment create \
9997
--assignee <Email> \
10098
--role "DeID Data Owner" \
101-
--scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>"
99+
--scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>"
102100
```
103101

104102
For more information, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-cli).

articles/healthcare-apis/deidentification/managed-identities.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ ms.date: 07/17/2024
1111

1212
# Use managed identities with the de-identification service (preview)
1313

14-
Managed identities provide Azure services with a secure, automatically managed identity in Microsoft Entra ID. Using managed identities eliminates the need for developers having to manage credentials by providing an identity. There are two types of managed identities: system-assigned and user-assigned. The de-identification service supports both.
14+
Managed identities provide Azure services with a secure, automatically managed identity in Microsoft Entra ID. Using managed identities eliminates the need for developers to manage credentials by providing an identity. There are two types of managed identities: system-assigned and user-assigned. The de-identification service supports both.
1515

1616
Managed identities can be used to grant the de-identification service (preview) access to your storage account for batch processing. In this article, you learn how to assign a managed identity to your de-identification service.
1717

1818
## Prerequisites
1919

20-
- Understand the differences between **system-assigned** and **user-assigned** described in [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
20+
- Understand the differences between **system-assigned** and **user-assigned** managed identities, described in [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
2121
- A de-identification service (preview) in your Azure subscription. If you don't have a de-identification service, follow the steps in [Quickstart: Deploy the de-identification service](quickstart.md).
2222

2323
## Create an instance of the de-identification service (preview) in Azure Health Data Services with a system-assigned managed identity
@@ -69,14 +69,12 @@ the resource definition, replacing **resource-id** with the Azure Resource Manag
6969

7070
## Supported scenarios using managed identities
7171

72-
Managed identities assigned to the de-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as
73-
the managed identity to access Blob Storage and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity,
74-
see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
72+
Managed identities assigned to the de-identification service (preview) can be used to allow access to Azure Blob Storage for batch de-identification jobs. The service acquires a token as the managed identity to access Blob Storage, and de-identify blobs that match a specified pattern. For more information, including how to grant access to your managed identity, see [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md).
7573

7674
## Clean-up steps
7775

7876
When you remove a system-assigned identity, you delete it from Microsoft Entra ID. System-assigned identities are also automatically removed from Microsoft Entra ID
79-
when you delete the de-identification service (preview).
77+
when you delete the de-identification service (preview), described as follows.
8078

8179
# [Azure portal](#tab/portal)
8280

articles/healthcare-apis/deidentification/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Overview of the de-identification service (preview) in Azure Health Data Services
3-
description: Learn how the de-identification service (preview) in Azure Health Data Services anonymizes clinical data, ensuring HIPAA compliance while retaining data relevance for research and analytics.
2+
title: Overview of the De-identification service (preview) in Azure Health Data Services
3+
description: Learn how the De-identification service (preview) in Azure Health Data Services anonymizes clinical data, ensuring HIPAA compliance while retaining data relevance for research and analytics.
44
author: kimiamavon
55
ms.service: azure-health-data-services
66
ms.subservice: deidentification-service
@@ -11,7 +11,7 @@ ms.author: kimiamavon
1111

1212
# What is the de-identification service (preview)?
1313

14-
The de-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities, including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
14+
The de-identification service (preview) in Azure Health Data Services enables healthcare organizations to anonymize clinical data so that the resulting data retains its clinical relevance and distribution while also adhering to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule. The service uses state-of-the-art machine learning models to automatically extract, redact, or surrogate 28 entities - including the HIPAA 18 Protected Health Information (PHI) identifiers – from unstructured text such as clinical notes, transcripts, messages, or clinical trial studies.
1515

1616
## Use de-identified data in research, analytics, and machine learning
1717

articles/healthcare-apis/deidentification/quickstart-sdk-net.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Quickstart: Azure Health De-identification client library for .NET"
2+
title: "Quickstart: Azure Health de-identification client library for .NET"
33
description: A quickstart guide to de-identify health data with the .NET client library
44
author: GrahamMThomas
55
ms.author: gthomas
@@ -37,7 +37,7 @@ A de-identification service (preview) provides you with an endpoint URL. This en
3737
az resource create -g $RESOURCE_GROUP_NAME -n $DEID_SERVICE_NAME --resource-type microsoft.healthdataaiservices/deidservices --is-full-object -p "{\"identity\":{\"type\":\"SystemAssigned\"},\"properties\":{},\"location\":\"$REGION\"}"
3838
```
3939

40-
### Create an Azure Storage Account
40+
### Create an Azure Storage account
4141

4242
1. Install [Azure CLI](/cli/azure/install-azure-cli)
4343
1. Create an Azure Storage Account
@@ -47,7 +47,7 @@ A de-identification service (preview) provides you with an endpoint URL. This en
4747
az storage account create --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCE_GROUP_NAME --location $REGION
4848
```
4949

50-
### Authorize de-identification service (preview) on storage account
50+
### Authorize de-identification service (preview) on the Azure Storage account
5151

5252
- Give the de-identification service (preview) access to your storage account
5353

@@ -82,15 +82,15 @@ The client library is available through NuGet, as the `Azure.Health.Deidentifica
8282

8383

8484
## Code examples
85-
- [Create a Deidentification Client](#create-a-deidentification-client)
85+
- [Create a de-identification Client](#create-a-de-identification-client)
8686
- [De-identify a string](#de-identify-a-string)
8787
- [Tag a string](#tag-a-string)
88-
- [Create a Deidentification Job](#create-a-deidentification-job)
89-
- [Get the status of a Deidentification Job](#get-the-status-of-a-deidentification-job)
88+
- [Create a de-identification Job](#create-a-de-identification-job)
89+
- [Get the status of a de-identification Job](#get-the-status-of-a-de-identification-job)
9090

91-
### Create a Deidentification Client
91+
### Create a de-identification client
9292

93-
Before you can create the client, you need to find your **deidentification service (preview) endpoint URL**.
93+
Before you can create the client, you need to find your **de-identification service (preview) endpoint URL**.
9494

9595
You can find the endpoint URL with the Azure CLI:
9696

@@ -131,7 +131,7 @@ content.Operation = OperationType.Tag;
131131
DeidentificationResult result = await client.DeidentifyAsync(content);
132132
```
133133

134-
### Create a Deidentification Job
134+
### Create a de-identification job
135135

136136
This function allows you to de-identify all files, filtered via prefix, within an Azure Blob Storage Account.
137137

@@ -156,7 +156,7 @@ DeidentificationJob job = new(
156156
job = client.CreateJob(WaitUntil.Started, "my-job-1", job).Value;
157157
```
158158

159-
### Get the status of a Deidentification Job
159+
### Get the status of a de-identification job
160160

161161
Once a job is created, you can view the status and other details of the job.
162162

@@ -175,19 +175,19 @@ dotnet run
175175

176176
## Clean up resources
177177

178-
### Delete Deidentification Service
178+
### Delete de-identification service
179179

180180
```bash
181181
az resource delete -n $DEID_SERVICE_NAME -g $RESOURCE_GROUP_NAME --resource-type microsoft.healthdataaiservices/deidservices
182182
```
183183

184-
### Delete Azure Storage Account
184+
### Delete Azure Storage account
185185

186186
```bash
187187
az resource show -n $STORAGE_ACCOUNT_NAME -g $RESOURCE_GROUP_NAME --resource-type Microsoft.Storage/storageAccounts
188188
```
189189

190-
### Delete Role Assignment
190+
### Delete role assignment
191191

192192
```bash
193193
az role assignment delete --assignee $DEID_SERVICE_PRINCIPAL_ID --role "Storage Blob Data Contributor" --scope $STORAGE_ACCOUNT_ID
@@ -198,9 +198,9 @@ az role assignment delete --assignee $DEID_SERVICE_PRINCIPAL_ID --role "Storage
198198

199199
### Unable to access source or target storage
200200

201-
Ensure the permissions are given and the Managed Identity for the de-identification service (preview) is set up properly.
201+
Ensure the permissions are given, and the Managed Identity for the de-identification service (preview) is set up properly.
202202

203-
See [Authorize Deidentification Service on Storage Account](#authorize-de-identification-service-preview-on-storage-account)
203+
See [Authorize de-identification service (preview) on the Azure Storage account](#authorize-de-identification-service-preview-on-the-azure-storage-account)
204204

205205
### Job failed with status PartialFailed
206206

@@ -213,7 +213,7 @@ See [Sample](https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/healthdata
213213

214214
In this quickstart, you learned:
215215
- How to create a de-identification service (preview) and assign a role on a storage account.
216-
- How to create a Deidentification Client
216+
- How to create a de-identification client
217217
- How to de-identify strings and create jobs on documents within a storage account.
218218

219219
> [!div class="nextstepaction"]

articles/healthcare-apis/deidentification/quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ For more information, see [Use tags to organize your Azure resources](/azure/azu
5454
In the **Managed Identity** tab, you can assign a managed identity to your de-identification service (preview). For more information, see [managed identities](managed-identities.md).
5555

5656
1. To create a system-assigned managed identity, select **On** under **Status**.
57-
1. To add a user-assigned managed identity, select **Add** to use the selection pane to choose an existing identity to assign.
57+
1. To add a user-assigned managed identity, select **Add** to use the selection pane to assign an existing identity.
5858

5959
## Review and create
6060

0 commit comments

Comments
 (0)