Skip to content

Commit 7bcfe3f

Browse files
committed
edits and markdown cleanup
1 parent 33f4171 commit 7bcfe3f

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/healthcare-apis/azure-api-for-fhir/azure-api-fhir-access-token-validation.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,19 @@ ms.author: kesheth
1313

1414
[!INCLUDE[retirement banner](../includes/healthcare-apis-azure-api-fhir-retirement.md)]
1515

16-
How Azure API for FHIR® validates the access token will depend on implementation and configuration. In this article, we'll walk through the validation steps, which can be helpful when troubleshooting access issues.
16+
How Azure API for FHIR® validates the access token depends on implementation and configuration. In this article, we walk through the validation steps, which can be helpful when troubleshooting access issues.
1717

1818
## Validate the token has no issues with identity provider
1919

20-
The first step in the token validation is to verify that the token was issued by the correct identity provider and that it hasn't been modified. The FHIR server will be configured to use a specific identity provider known as the authority `Authority`. The FHIR server will retrieve information about the identity provider from the `/.well-known/openid-configuration` endpoint. When you use Microsoft Entra ID, the full URL is:
20+
The first step in the token validation is to verify that the token was issued by the correct identity provider and that it hasn't been modified. The FHIR server is configured to use a specific identity provider known as the authority `Authority`. The FHIR server retrieves information about the identity provider from the `/.well-known/openid-configuration` endpoint. When you use Microsoft Entra ID, the full URL is:
2121

2222
```
2323
GET https://login.microsoftonline.com/<TENANT-ID>/.well-known/openid-configuration
2424
```
2525

2626
where `<TENANT-ID>` is the specific Microsoft Entra tenant (either a tenant ID or a domain name).
2727

28-
Microsoft Entra ID will return a document like the following to the FHIR server.
28+
Microsoft Entra ID returns a document like the following to the FHIR server.
2929

3030
```json
3131
{
@@ -96,16 +96,16 @@ The important properties for the FHIR server are `jwks_uri`, which tells the ser
9696

9797
## Validate claims of the token
9898

99-
Once the server has verified the authenticity of the token, the FHIR server will then proceed to validate that the client has the required claims to access the token.
99+
Once the server verifies the authenticity of the token, the FHIR server proceeds to validate that the client has the required claims to access the token.
100100

101-
When you use Azure API for FHIR, the server will validate:
101+
When you use Azure API for FHIR, the server validates:
102102

103103
1. The token has the right `Audience` (`aud` claim).
104104
1. The user or principal that the token was issued for is allowed to access the FHIR server data plane. The `oid` claim of the token contains an identity object ID, which uniquely identifies the user or principal.
105105

106106
We recommend that the FHIR service be [configured to use Azure RBAC](configure-azure-rbac.md) to manage data plane role assignments. However, you can also [configure local RBAC](configure-local-rbac.md) if your FHIR service uses an external or secondary Microsoft Entra tenant.
107107

108-
When you use the OSS Microsoft FHIR server for Azure, the server will validate:
108+
When you use the OSS Microsoft FHIR server for Azure, the server validates:
109109

110110
1. The token has the right `Audience` (`aud` claim).
111111
1. The token has a role in the `roles` claim, which is allowed access to the FHIR server.

0 commit comments

Comments
 (0)