You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/manage-access-rbac.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ To assign an Azure role to a security principal with PowerShell, call the [New-A
53
53
54
54
The format of the command can differ based on the scope of the assignment, but `ObjectId` and `RoleDefinitionName` are required parameters. While the `Scope` parameter is optional, you should set it to retain the principle of least privilege. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised.
55
55
56
-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
56
+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
57
57
58
58
The example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values
59
59
in angle brackets `<>` with your own values:
@@ -62,15 +62,15 @@ in angle brackets `<>` with your own values:
62
62
New-AzRoleAssignment
63
63
-SignInName <Email> `
64
64
-RoleDefinitionName "DeID Data Owner" `
65
-
-Scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>"
65
+
-Scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>"
66
66
```
67
67
68
68
A successful response should look like:
69
69
70
70
```
71
71
console
72
-
RoleAssignmentId : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>/providers/Microsoft.Authorization/roleAssignments/<Role Assignment ID>
73
-
Scope : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>
72
+
RoleAssignmentId : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>/providers/Microsoft.Authorization/roleAssignments/<Role Assignment ID>
73
+
Scope : /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>
@@ -88,15 +88,15 @@ To assign an Azure role to a security principal with Azure CLI, use the [az role
88
88
89
89
The format of the command can differ based on the type of security principal, but `role` and `scope` are required parameters.
90
90
91
-
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>`
91
+
The scope for a de-identification service (preview) is in the form `/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>`
92
92
93
93
The following example assigns the **DeID Data Owner** built-in role to a user, scoped to a specific de-identification service. Make sure to replace the placeholder values in angle brackets `<>` with your own values:
94
94
95
95
```azurecli
96
96
az role assignment create \
97
97
--assignee <Email> \
98
98
--role "DeID Data Owner" \
99
-
--scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<Deidentification Service Name>"
99
+
--scope "/subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.HealthDataAIServices/deidServices/<De-identification Service Name>"
100
100
```
101
101
102
102
For more information, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-cli).
Copy file name to clipboardExpand all lines: articles/healthcare-apis/deidentification/quickstart-sdk-net.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 08/05/2024
10
10
---
11
11
12
12
13
-
# Quickstart: Azure Health Deidentification client library for .NET
13
+
# Quickstart: Azure Health De-identification client library for .NET
14
14
15
15
Get started with the Azure Health De-identification client library for .NET to de-identify your health data. Follow these steps to install the package and try out example code for basic tasks.
16
16
@@ -23,7 +23,7 @@ Get started with the Azure Health De-identification client library for .NET to d
23
23
24
24
## Setting up
25
25
26
-
### Create a deidentification service (preview)
26
+
### Create a de-identification service (preview)
27
27
28
28
A de-identification service (preview) provides you with an endpoint URL. This endpoint url can be utilized as a Rest API or with an SDK.
29
29
@@ -47,7 +47,7 @@ A de-identification service (preview) provides you with an endpoint URL. This en
47
47
az storage account create --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCE_GROUP_NAME --location $REGION
48
48
```
49
49
50
-
### Authorize deidentification service (preview) on the Azure Storage account
50
+
### Authorize de-identification service (preview) on the Azure Storage account
51
51
52
52
- Give the de-identification service (preview) access to your storage account
53
53
@@ -82,13 +82,13 @@ The client library is available through NuGet, as the `Azure.Health.Deidentifica
82
82
83
83
84
84
## Code examples
85
-
- [Create a Deidentification Client](#create-a-deidentification-client)
85
+
- [Create a de-identification Client](#create-a-de-identification-client)
86
86
- [De-identify a string](#de-identify-a-string)
87
87
- [Tag a string](#tag-a-string)
88
-
- [Create a Deidentification Job](#create-a-deidentification-job)
89
-
- [Get the status of a Deidentification Job](#get-the-status-of-a-deidentification-job)
88
+
- [Create a de-identification Job](#create-a-de-identification-job)
89
+
- [Get the status of a de-identification Job](#get-the-status-of-a-de-identification-job)
90
90
91
-
### Create a deidentification client
91
+
### Create a de-identification client
92
92
93
93
Before you can create the client, you need to find your **de-identification service (preview) endpoint URL**.
Once a job is created, you can view the status and other details of the job.
162
162
@@ -175,13 +175,13 @@ dotnet run
175
175
176
176
## Clean up resources
177
177
178
-
### Delete deidentification service
178
+
### Delete de-identification service
179
179
180
180
```bash
181
181
az resource delete -n $DEID_SERVICE_NAME -g $RESOURCE_GROUP_NAME --resource-type microsoft.healthdataaiservices/deidservices
182
182
```
183
183
184
-
### Delete Azure Storage Account
184
+
### Delete Azure Storage account
185
185
186
186
```bash
187
187
az resource show -n $STORAGE_ACCOUNT_NAME -g $RESOURCE_GROUP_NAME --resource-type Microsoft.Storage/storageAccounts
@@ -200,7 +200,7 @@ az role assignment delete --assignee $DEID_SERVICE_PRINCIPAL_ID --role "Storage
200
200
201
201
Ensure the permissions are given, and the Managed Identity for the de-identification service (preview) is set up properly.
202
202
203
-
See [Authorize deidentification service on Storage Account](#authorize-deidentification-service-preview-on-the-azure-storage-account)
203
+
See [Authorize de-identification service (preview) on the Azure Storage account](#authorize-de-identification-service-preview-on-the-azure-storage-account)
204
204
205
205
### Job failed with status PartialFailed
206
206
@@ -213,7 +213,7 @@ See [Sample](https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/healthdata
213
213
214
214
In this quickstart, you learned:
215
215
- How to create a de-identification service (preview) and assign a role on a storage account.
216
-
- How to create a deidentification client
216
+
- How to create a de-identification client
217
217
- How to de-identify strings and create jobs on documents within a storage account.
0 commit comments