Skip to content

Commit 73d8730

Browse files
broken links
1 parent 41fa57b commit 73d8730

File tree

2 files changed

+102
-2
lines changed

2 files changed

+102
-2
lines changed

articles/healthcare-apis/dicom/dicom-register-application.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,7 @@ The following steps are required for the DICOM service. In addition, user access
8181

8282
3. Select scopes (permissions) that the confidential client application will ask for on behalf of a user. Select **Dicom.ReadWrite**, and then select **Add permissions**.
8383

84-
[ ![Select permissions scopes.](./media/dicom-select-scopes-new.png) ](./media/dicom-select-scopes.png#lightbox)
85-
84+
[ ![Select permissions scopes.](./media/dicom-select-scopes-new.png) ](./media/dicom-select-scopes.new.png#lightbox)
8685

8786
Your application registration is now complete.
8887

Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
---
2+
title: Register a client application in Azure Active Directory for the Azure Health Data Services
3+
description: How to register a client application in the Azure AD and how to add a secret and API permissions to the Azure Health Data Services
4+
services: healthcare-apis
5+
author: dougseven
6+
ms.service: healthcare-apis
7+
ms.topic: tutorial
8+
ms.date: 03/21/2022
9+
ms.author: dseven
10+
---
11+
12+
# Register a client application in Azure Active Directory
13+
14+
In this article, you'll learn how to register a client application in Azure Active Directory (Azure AD) in order to access Azure Health Data Services. You can find more information on [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
15+
16+
## Register a new application
17+
18+
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory**.
19+
2. Select **App registrations**.
20+
[ ![Screen shot of new app registration window.](media/register-application-one.png) ](media/register-application-one.png#lightbox)
21+
3. Select **New registration**.
22+
4. For Supported account types, select **Accounts in this organization directory only**. Leave the other options as is.
23+
[ ![Screenshot of new registration account options.](media/register-application-two.png) ](media/register-application-two.png#lightbox)
24+
5. Select **Register**.
25+
26+
## Application ID (client ID)
27+
28+
After registering a new application, you can find the application (client) ID and Directory (tenant) ID from the overview menu option. Make a note of the values for use later.
29+
30+
[ ![Screenshot of client ID overview panel.](media/register-application-three.png) ](media/register-application-three.png#lightbox)
31+
32+
[ ![Screenshot of client ID](media/register-application-four.png) ](media/register-application-four.png#lightbox)
33+
34+
## Authentication setting: confidential vs. public
35+
36+
Select **Authentication** to review the settings. The default value for **Allow public client flows** is "No".
37+
38+
If you keep this default value, the application registration is a **confidential client application** and a certificate or secret is required.
39+
40+
[ ![Screenshot of confidential client application.](media/register-application-five.png) ](media/register-application-five.png#lightbox)
41+
42+
If you change the default value to "Yes" for the "Allow public client flows" option in the advanced setting, the application registration is a **public client application** and a certificate or secret isn't required. The "Yes" value is useful when you want to use the client application in your mobile app or a JavaScript app where you don't want to store any secrets.
43+
44+
For tools that require a redirect URL, select **Add a platform** to configure the platform.
45+
46+
[ ![Screenshot of add a platform.](media/register-application-five-alpha.png) ](media/register-application-five-alpha.png#lightbox)
47+
48+
For Postman, select **Mobile and desktop applications**. Enter "https://www.getpostman.com/oauth2/callback" in the **Custom redirect URIs** section. Select the **Configure** button to save the setting.
49+
50+
[ ![Screenshot of configure other services.](media/register-application-five-bravo.png) ](media/register-application-five-bravo.png#lightbox)
51+
52+
## Certificates & secrets
53+
54+
Select **Certificates & Secrets** and select **New Client Secret**. Select **Recommended 6 months** in the **Expires** field. This new secret will be valid for six months. You can also choose different values such as:
55+
56+
* 03 months
57+
* 12 months
58+
* 24 months
59+
* Custom start date and end date.
60+
61+
>[!NOTE]
62+
>It is important that you save the secret value, not the secret ID.
63+
64+
[ ![Screenshot of certificates and secrets.](media/register-application-six.png) ](media/register-application-six.png#lightbox)
65+
66+
Optionally, you can upload a certificate (public key) and use the Certificate ID, a GUID value associated with the certificate. For testing purposes, you can create a self-signed certificate using tools such as the PowerShell command line, `New-SelfSignedCertificate`, and then export the certificate from the certificate store.
67+
68+
## API permissions
69+
70+
The following steps are required for the DICOM service, but optional for the FHIR service. In addition, user access permissions or role assignments for the Azure Health Data Services are managed through RBAC. For more details, visit [Configure Azure RBAC for Azure Health Data Services](configure-azure-rbac.md).
71+
72+
1. Select the **API permissions** blade.
73+
74+
[ ![Add API permissions](dicom/media/dicom-add-api-permissions.png) ](dicom/media/dicom-add-api-permissions.png#lightbox)
75+
76+
2. Select **Add a permission**.
77+
78+
If you're using Azure Health Data Services, you'll add a permission to the DICOM service by searching for **Azure API for DICOM** under **APIs my organization** uses.
79+
80+
[ ![Search API permissions](dicom/media/dicom-search-apis-permissions.png) ](dicom/media/dicom-search-apis-permissions.png#lightbox)
81+
82+
The search result for Azure API for DICOM will only return if you've already deployed the DICOM service in the workspace.
83+
84+
If you're referencing a different resource application, select your DICOM API Resource Application Registration that you created previously under **APIs my organization**.
85+
86+
3. Select scopes (permissions) that the confidential client application will ask for on behalf of a user. Select **user_impersonation**, and then select **Add permissions**.
87+
88+
[ ![Select permissions scopes.](dicom/media/dicom-select-scopes.png) ](dicom/media/dicom-select-scopes.png#lightbox)
89+
90+
>[!NOTE]
91+
>Use grant_type of client_credentials when trying to otain an access token for the FHIR service using tools such as Postman or Rest Client. For more details, visit [Access using Postman](./fhir/use-postman.md) and [Accessing Azure Health Data Services using the REST Client Extension in Visual Studio Code](./fhir/using-rest-client.md).
92+
>>Use grant_type of client_credentials or authentication_doe when trying to obtain an access token for the DICOM service. For more details, visit [Using DICOM with cURL](dicom/dicomweb-standard-apis-curl.md).
93+
94+
Your application registration is now complete.
95+
96+
## Next steps
97+
98+
In this article, you learned how to register a client application in the Azure AD. Additionally, you learned how to add a secret and API permissions to Azure Health Data Services. For more information about Azure Health Data Services, see
99+
100+
>[!div class="nextstepaction"]
101+
>[Overview of Azure Health Data Services](healthcare-apis-overview.md)

0 commit comments

Comments
 (0)