You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-undelete.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,25 @@ ms.date: 10/4/2023
7
7
ms.topic: article
8
8
ms.custom: devx-track-azurepowershell
9
9
---
10
+
# Restore deleted App Service app
10
11
11
-
# Restore Deleted App Service App Using PowerShell
12
+
If you happened to accidentally delete your app in Azure App Service, you can now restore it by using the Azure portal or PowerShell.
12
13
13
-
If you happened to accidentally delete your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](/powershell/azure/).
14
+
## Restore deleted App Service app by using the portal
15
+
16
+
If you deleted your app in Azure App Service, you can now restore it from the portal by using following steps:
17
+
18
+
1. Navigate to App Services in the portal.
19
+
1. Click on **Manage Deleted Apps**.
20
+
1. Select **Subscription**.
21
+
1. From the dropdown, select the deleted app. Apps deleted in last 30 days will show up in the drop down list.
22
+
1. Select destination app from the dropdown where you want to restore your app.
23
+
1. If you would like to restore the deleted app to a slot of destination app, check the slot checkbox and select available slots from the dropdown.
24
+
1. By default only app content is restored. If you want app configuration also to be restored, check **Restore App configuration**.
25
+
26
+
## Restore deleted App Service app by using PowerShell
27
+
28
+
If you deleted your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](/powershell/azure/).
14
29
15
30
> [!NOTE]
16
31
> - Deleted apps are purged from the system 30 days after the initial deletion. After an app is purged, it can't be recovered.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/concept-customer-managed-keys.md
+52-9Lines changed: 52 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,12 +17,7 @@ Azure App Configuration [encrypts sensitive information at rest](../security/fun
17
17
Azure App Configuration encrypts sensitive information at rest by using a 256-bit AES encryption key provided by Microsoft. Every App Configuration instance has its own encryption key managed by the service and used to encrypt sensitive information. Sensitive information includes the values found in key-value pairs. When the customer-managed key capability is enabled, App Configuration uses a managed identity assigned to the App Configuration instance to authenticate with Microsoft Entra ID. The managed identity then calls Azure Key Vault and wraps the App Configuration instance's encryption key. The wrapped encryption key is then stored, and the unwrapped encryption key is cached within App Configuration for one hour. Every hour, the App Configuration refreshes the unwrapped version of the App Configuration instance's encryption key. This process ensures availability under normal operating conditions.
18
18
19
19
> [!IMPORTANT]
20
-
> If the identity assigned to the App Configuration instance is no longer authorized to unwrap the instance's encryption key, or if the managed key is permanently deleted, then it will no longer be possible to decrypt sensitive information stored in the App Configuration instance. By using Azure Key Vault's [soft delete](/azure/key-vault/general/soft-delete-overview) function, you mitigate the chance of accidentally deleting your encryption key.
21
-
22
-
When users enable the customer-managed key capability on their Azure App Configuration instance, they control the service’s ability to access their sensitive information. The managed key serves as a root encryption key. Users can revoke their App Configuration instance’s access to their managed key by changing their key vault access policy. When this access is revoked, App Configuration will lose the ability to decrypt user data within one hour. At this point, the App Configuration instance will forbid all access attempts. This situation is recoverable by granting the service access to the managed key once again. Within one hour, App Configuration will be able to decrypt user data and operate under normal conditions.
23
-
24
-
> [!NOTE]
25
-
> All Azure App Configuration data is stored for up to 24 hours in an isolated backup. This includes the unwrapped encryption key. This data isn't immediately available to the service or service team. In the event of an emergency restore, Azure App Configuration will revoke itself again from the managed key data.
20
+
> If the identity assigned to the App Configuration instance is no longer authorized to unwrap the instance's encryption key, or if the managed key is permanently deleted, or if the managed key version in use becomes expired, then it will no longer be possible to decrypt sensitive information stored in the App Configuration instance. By using Azure Key Vault's [soft delete](/azure/key-vault/general/soft-delete-overview) function, you mitigate the chance of accidentally deleting your encryption key. By omitting key version when configuring managed key encryption and setting up [key auto-rotation](/azure/key-vault/keys/how-to-configure-key-rotation) in key vault, you mitigate the possibility of the underlying managed key expiring.
26
21
27
22
## Requirements
28
23
@@ -40,7 +35,7 @@ After these resources are configured, use the following steps so that the Azure
40
35
* For Key Vault's with [Azure RBAC](/azure/key-vault/general/rbac-guide) enabled, assign the identity the `Key Vault Crypto Service Encryption User` role on the target Key Vault.
41
36
* For Key Vault's using access policy authorization, grant the identity `GET`, `WRAP`, and `UNWRAP` permissions in the target Key Vault's access policy.
42
37
43
-
## Enable customer-managed key encryption for your App Configuration store
38
+
## Enable customer-managed key encryption
44
39
45
40
1.[Create an App Configuration store](./quickstart-azure-app-configuration-create.md) in the Standard or Premium tier if you don't have one.
46
41
@@ -102,16 +97,64 @@ After these resources are configured, use the following steps so that the Azure
102
97
1. Now that the Azure App Configuration instance can access the managed key, we can enable the customer-managed key capability in the service by using the Azure CLI. Recall the following properties recorded during the key creation steps: `key name` `key vault URI`.
The command uses system-assigned managed identity to authenticate with the key vault by default.
109
104
110
105
> [!NOTE]
111
-
> When using a user-assigned managed identity to access the customermanaged key, you can specify its client ID explicitly by adding `--identity-client-id <client ID of your user assigned identity>` to the command.
106
+
> When using a user-assigned managed identity to access the customer-managed key, you can specify its client ID explicitly by adding `--identity-client-id <client ID of your user assigned identity>` to the command.
112
107
113
108
Your Azure App Configuration instance is now configured to use a customer-managed key stored in Azure Key Vault.
114
109
110
+
## Disable customer-managed key encryption
111
+
112
+
1. Ensure the current customer-managed key is valid and operational. App Configuration needs to decrypt existing data with the current key before reverting to Microsoft-managed keys. If the current key has expired or its access has been revoked, you must first restore access to that key.
113
+
114
+
2. Use the Azure CLI to update your App Configuration instance and remove the customer-managed key configuration. Replace `contoso-resource-group` and `contoso-app-config` with the appropriate values for your setup.
115
+
116
+
```azurecli
117
+
az appconfig update -g contoso-resource-group -n contoso-app-config --encryption-key-name ""
118
+
```
119
+
120
+
This command removes the customer-managed key configuration from your App Configuration instance.
121
+
122
+
3. Verify that the customer-managed key configuration has been removed by checking the properties of your App Configuration instance.
123
+
124
+
```azurecli
125
+
az appconfig show -g contoso-resource-group -n contoso-app-config --query "encryption"
126
+
```
127
+
128
+
The output should show that the `encryption.keyVaultProperties` property is set to `null`.
129
+
130
+
Your Azure App Configuration instance is now configured to use Microsoft managed keys for encryption.
131
+
132
+
> [!NOTE]
133
+
> Disabling customer-managed key encryption will revert your App Configuration instance to use Microsoft managed keys. Ensure that this change aligns with your organization's security policies and compliance requirements.
134
+
135
+
## Access Revocation
136
+
137
+
When users enable the customer-managed key capability on their Azure App Configuration instance, they control the service’s ability to access their sensitive information. The managed key serves as a root encryption key. Users can revoke their App Configuration instance’s access to their managed key by changing their key vault access policy. When this access is revoked, App Configuration will lose the ability to decrypt user data within one hour. At this point, the App Configuration instance will forbid all access attempts. This situation is recoverable by granting the service access to the managed key once again. Within one hour, App Configuration will be able to decrypt user data and operate under normal conditions.
138
+
139
+
> [!NOTE]
140
+
> All Azure App Configuration data is stored for up to 24 hours in an isolated backup. This includes the unwrapped encryption key. This data isn't immediately available to the service or service team. In the event of an emergency restore, Azure App Configuration will revoke itself again from the managed key data.
141
+
142
+
## Key Rotation
143
+
144
+
When customer-managed key is configured on an App Configuration instance it is necessary to periodically rotate the managed key to ensure that it never expires. It's important to note that for a successful key rotation, the current key must be valid and operational. If the current key has already expired or App Configuration's access to it has been revoked, the App Configuration instance will not be able to decrypt data, making rotation impossible. [Key vault key auto-rotation](/azure/key-vault/keys/how-to-configure-key-rotation) can be configured to avoid the need to manually rotate encryption keys, and thus ensure that the latest version of a key remains valid. When relying on key vault key auto-rotation, you should ensure your App Configuration instance's managed key configuration does not reference a specific key version. Omitting the version allows App Configuration to always move to the latest version of the key vault key when an auto-rotation is performed. Failure to rotate the managed key can be considered a security concern, but additionally a lack of rotation can result in loss of access to the App Configuration instance. This is due to the fact that if the managed key version in use expires, then App Configuration will not be able to decrypt data.
145
+
146
+
To recap, the following best practices are encouraged:
147
+
148
+
* Enable [key vault key auto-rotation](/azure/key-vault/keys/how-to-configure-key-rotation) for your managed key.
149
+
* Omit using a specific version of a key vault key when setting up customer-managed key encryption.
150
+
151
+
### Versioned vs versionless keys
152
+
153
+
Setting up customer-managed key encryption requires passing an identifier of a key in key vault. A key vault key identifier may or may not contain a version. Our recommendation is to omit version when configuring customer-managed key encryption to enable auto-rotation. Using a versioned key should be considered carefully as failure to manually rotate will result in loss of access to the App Configuration instance if the key version in question expires.
* Versioned key identifier example (not recommended): `https://{my key vault}.vault.azure.net/keys/{key-name}/{key-version}`
157
+
115
158
## Next Steps
116
159
117
160
In this article, you configured your Azure App Configuration instance to use a customer-managed key for encryption. To learn more about how to integrate your app service with Azure managed identities, continue to the next step.
Copy file name to clipboardExpand all lines: articles/azure-health-insights/radiology-insights/overview.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Output from the Radiology insights service doesn't reflect the opinions of Micro
34
34
35
35
36
36
> [!IMPORTANT]
37
-
> The Radiology Insights model is a capability provided “AS IS” and “WITH ALL FAULTS”. The Radiology insights service is not intended, designed, or made available: (i) as a medical device, (ii) to be used in the diagnosis, cure, mitigation, monitoring, treatment or prevention of a disease, condition or illness, and no license or right is granted by Microsoft to use the healthcare add-on or online services for such purposes, and (iii) to be a substitute for professional medical advice, diagnosis, treatment, or judgment and should not be used to replace or as a substitute for professional medical advice, diagnosis, treatment, or judgment. The customer is solely responsible for testing and evaluating whether Radiology Insights is fit for purpose and identifying and mitigating any risks or harms to end users associated with its use. Output from the Radiology insights service does not reflect the opinions of Microsoft. The accuracy and reliability of the information provided by the Radiology insights service may vary and are not guaranteed.
37
+
> The Radiology Insights model is a capability provided “AS IS” and “WITH ALL FAULTS”. The Radiology insights service isn't intended, designed, or made available: (i) as a medical device, (ii) to be used in the diagnosis, cure, mitigation, monitoring, treatment or prevention of a disease, condition or illness, and no license or right is granted by Microsoft to use the healthcare add-on or online services for such purposes, and (iii) to be a substitute for professional medical advice, diagnosis, treatment, or judgment and should not be used to replace or as a substitute for professional medical advice, diagnosis, treatment, or judgment. The customer is solely responsible for testing and evaluating whether Radiology Insights is fit for purpose and identifying and mitigating any risks or harms to end users associated with its use. Output from the Radiology insights service does not reflect the opinions of Microsoft. The accuracy and reliability of the information provided by the Radiology insights service may vary and are not guaranteed.
38
38
39
39
40
40
<!--- The Radiology Insights model is a capability provided “AS IS” and “WITH ALL FAULTS”. The Radiology Insights model isn't intended or made available for use as a medical device, clinical support, diagnostic tool, or other technology intended to be used in the diagnosis, cure, mitigation, treatment, or prevention of disease or other conditions, and no license or right is granted by Microsoft to use this capability for such purposes. This capability isn't designed or intended to be implemented or deployed as a substitute for professional medical advice or healthcare opinion, diagnosis, treatment, or the clinical judgment of a healthcare professional, and should not be used as such. The customer is solely responsible for any use of the Radiology Insights model. The customer is responsible for ensuring compliance with those license terms, including any geographic or other applicable restrictions.
@@ -75,6 +75,18 @@ The insights can be used to guide improvement efforts, minimize errors, and impr
75
75
76
76
The Radiology Insights model isn't creating dashboards but delivers extracted information. The information can be aggregated by a user for research and administrative purposes. The model is stateless.
77
77
78
+
**Quality Measures: Compliance with Reimbursement Criteria in Healthcare Programs**: A healthcare organization needs to ensure compliance with evolving reimbursement programs, such as the Merit-based Incentive Payment System (MIPS) established under the MACRA act. The organization must meet specific performance criteria to qualify for reimbursement incentives or avoid penalties.
79
+
80
+
The organization aggregates the appropriate Quality Measure criteria from its clinical and administrative data. The organization automates the tracking and reporting of these criteria, the system supports compliance with reimbursement requirements, reducing manual effort and ensuring accurate reporting to Medicare. The RI model is not creating dashboards but delivers extracted information, not deduced, to be aggregated by the customer. The model is stateless.
81
+
82
+
**Scoring and Assessment: Population Health Management through Radiology Insights**: A healthcare provider seeks to improve population health management by identifying individuals or patient groups in need of additional screening or preventative services. The organization wants to extract valuable insights from radiology reports to improve patient outcomes.
83
+
84
+
Scores and values are then aggregated to identify trends, establish baselines, and flag individuals or groups that could benefit from further screening or preventative care. The system helps clinicians proactively manage patient populations, improving preventative care while reducing the likelihood of future complications.
85
+
86
+
**Clinical Guidance for the Radiologist**: Radiologists frequently need to reference specific clinical guidelines when documenting findings in their reports. However, missing or incomplete information can delay access to these guidelines and its recommendations, potentially impacting the accuracy of their reports.
87
+
88
+
Radiology Insights automatically highlights documented findings in the radiology report that are relevant to the applicable clinical guidelines and its candidate recommendations. If key information is missing, which could affect the recommendation outcome of a clinical guideline, the system flags these gaps. This proactive approach ensures that radiologists have immediate access to the necessary guidelines information, enhancing the accuracy and completeness of their reports.
89
+
78
90
## Language support
79
91
80
92
The service currently supports the English language.
0 commit comments