You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/fhir-paas-portal-quickstart.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,17 +44,16 @@ Confirm creation and await FHIR API deployment.
44
44
45
45
## Additional settings
46
46
47
-
Click **Next: Additional settings** to configure the authority, audience, identity object IDs that should be allowed to access this Azure API for FHIR, enable SMART on FHIR if needed, and configure Cosmos DB throughput:
47
+
Click **Next: Additional settings** to configure the authority, audience, identity object IDs that should be allowed to access this Azure API for FHIR, enable SMART on FHIR if needed, and configure database throughput:
48
48
49
49
-**Authority:** You can specify different Azure AD tenant from the one that you are logged into as authentication authority for the service.
50
50
-**Audience:** You can specify audience, that is different from https:\//azurehealthcareapis.com.
51
-
-**Allowed object IDs:** You can specify identity object IDs that should be allowed to access this Azure API for FHIR
51
+
-**Allowed object IDs:** You can specify identity object IDs that should be allowed to access this Azure API for FHIR. You can learn more on finding the object id for users and service principals in the [Find identity object IDs](find-identity-object-ids.md) how-to guide.
52
52
-**Smart On FHIR proxy:** You can enable SMART on FHIR proxy. For details on how to configure SMART on FHIR proxy see tutorial [Azure API for FHIR SMART on FHIR proxy](https://docs.microsoft.com/azure/healthcare-apis/use-smart-on-fhir-proxy)
53
-
-**Cosmos DB throughput:**Azure API for FHIR relies on Cosmos DB as its underlying database. Here you can specify Cosmos DB throughput settings for your Azure API for FHIR. You can change this setting later in the Cosmos DB blade. For details on Cosmos DB RUs please read [Request Units in Azure Cosmos DB](https://docs.microsoft.com/azure/cosmos-db/request-units)
53
+
-**Provisioned throughput (RU/s):** Here you can specify throughput settings for the underlying database for your Azure API for FHIR. You can change this setting later in the Database blade. For more details, please see the [configure database settings](configure-database.md) page.
Copy file name to clipboardExpand all lines: articles/healthcare-apis/register-public-azure-ad-client-app.md
+14-7Lines changed: 14 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: mihansen
12
12
13
13
# Register a public client application in Azure Active Directory
14
14
15
-
In this article, you'll learn how to register a public application in Azure Active Directory. This is preparation for deploying FHIR API in Azure.
15
+
In this article, you'll learn how to register a public application in Azure Active Directory.
16
16
17
17
Client application registrations are Azure Active Directory representations of applications that can authenticate and ask for API permissions on behalf of a user. Public clients are applications such as mobile applications and single page javascript applications that can't keep secrets confidential. The procedure is similar to [registering a confidential client](register-confidential-azure-ad-client-app.md), but since public clients can't be trusted to hold an application secret, there's no need to add one.
18
18
@@ -28,7 +28,7 @@ Client application registrations are Azure Active Directory representations of a
28
28
29
29
## Application registration overview
30
30
31
-
1. Give the application with a display name.
31
+
1. Give the application a display name.
32
32
33
33
2. Provide a reply URL. The reply URL is where authentication codes will be returned to the client application. You can add more reply URLs and edit existing ones later.
34
34
@@ -38,15 +38,22 @@ Client application registrations are Azure Active Directory representations of a
38
38
39
39
Similarly to the [confidential client application](register-confidential-azure-ad-client-app.md), you'll need to select which API permissions this application should be able to request on behalf of users:
40
40
41
-
1. Open the **API permissions** and select your [FHIR API Resource Application Registration](register-resource-azure-ad-client-app.md):
41
+
1. Open the **API permissions**. If you are using the Azure API for FHIR, you will add a permission to the Azure Healthcare APIs by searching for Azure Healthcare APIs under **APIs my organization uses** (image below). If you are referencing a different Resource Application, select your [FHIR API Resource Application Registration](register-resource-azure-ad-client-app.md) that you created previously under **My APIs**:
42
42
43
-

43
+

44
44
45
-
2. Select the scopes that you would like the application to be able to request.
45
+
46
+
2. Select the permissions that you would like the application to be able to request:
If the application you registered in this article and your FHIR server are in the same Azure AD tenant, you are good to proceed to the next steps.
51
+
52
+
If you configure your client application in a different Azure AD tenant from your FHIR server, you will need to update the **Authority**. In Azure API for FHIR, you do set the Authority under Settings --> Authentication. Set your Authority to **https://login.microsoftonline.com/\<TENANT-ID>**.
46
53
47
54
## Next steps
48
55
49
-
In this article, you've learned how to register a public client application in Azure Active Directory. Next, learn more about using SMART on FHIR.
56
+
In this article, you've learned how to register a public client application in Azure Active Directory. Next, test access to your FHIR server using Postman.
50
57
51
58
>[!div class="nextstepaction"]
52
-
>[Azure API for FHIR SMART on FHIR proxy](use-smart-on-fhir-proxy.md)
59
+
>[Access Azure API for FHIR with Postman](access-fhir-postman-tutorial.md)
Copy file name to clipboardExpand all lines: articles/healthcare-apis/register-resource-azure-ad-client-app.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,8 @@ ms.author: mihansen
14
14
15
15
In this article, you'll learn how to register a resource (or API) application in Azure Active Directory. A resource application is an Azure Active Directory representation of the FHIR server API itself and client applications can request access to the resource when authenticating. The resource application is also known as the *audience* in OAuth parlance.
16
16
17
+
If you are using the Azure API for FHIR, a resource application is automatically created when you deploy the service. As long as you are using the Azure API for FHIR in the same Azure Active Directory tenant as you are deploying your application, you can skip this how-to-guide and instead deploy your Azure API for FHIR to get started.
18
+
17
19
## App registrations in Azure portal
18
20
19
21
1. In the [Azure portal](https://portal.azure.com), on the left navigation panel, click **Azure Active Directory**.
@@ -40,9 +42,9 @@ A resource application has an identifier URI (Application ID URI), which clients
40
42
41
43
3. Enter the identifier URI and click **Save**. A good identifier URI would be the URI of your FHIR server.
42
44
43
-
4. Click **Add a scope** and add any scopes that you would like to define for your API. Azure AD does not currently allow slashes (`/`) in scope names. We recommend using `$` instead. A scope like `patient/*.read` would be `patient$*.read`.
45
+
4. Click **Add a scope** and add any scopes that you would like to define for your API. You are required to add at least one scope in order to grant permissions to your resource application in the future. If you don't have any specific scopes you want to add, you can add user_impersonation as a scope.
44
46
45
-

47
+

0 commit comments