Skip to content

Commit dd6d6a5

Browse files
authored
Merge pull request #289730 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 11/3
2 parents 687da82 + 02a67d7 commit dd6d6a5

31 files changed

+1702
-543
lines changed

articles/azure-netapp-files/configure-network-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 10/24/2024
8+
ms.date: 11/01/2024
99
ms.custom: references_regions
1010
ms.author: anfdocs
1111
---
@@ -81,7 +81,7 @@ You can edit the network features option of existing volumes from *Basic* to *St
8181

8282
* You should only use the edit network features option for an [application volume group for SAP HANA](application-volume-group-introduction.md) if you have enrolled in the [extension one preview](application-volume-group-introduction.md#extension-1-features), which adds support for Standard network features.
8383
* If you enabled both the `ANFStdToBasicNetworkFeaturesRevert` and `ANFBasicToStdNetworkFeaturesUpgrade` AFECs and are using 1 or 2-TiB capacity pools, see [Resize a capacity pool or a volume](azure-netapp-files-resize-capacity-pools-or-volumes.md) for information about sizing your capacity pools.
84-
* <a name="no-downtime"></a> Azure NetApp Files supports a non-disruptive upgrade to Standard network features and a revert to Basic network features. This operation is expected to take at least 25 minutes. You can't create a regular or data protection volume or application volume group while the edit network feature operation is underway. This feature is currently in **preview** in the Australia East, Central India, North Central US, and Switzerland North regions. In all other regions, updating network features can cause a network disruption on the volumes for up to 5 minutes.
84+
* <a name="no-downtime"></a> Azure NetApp Files supports a non-disruptive upgrade to Standard network features and a revert to Basic network features. This operation is expected to take at least 25 minutes. You can't create a regular or data protection volume or application volume group while the edit network feature operation is underway. This feature is currently in **preview** in the Australia East, Central India, East Asia, North Central US, and Switzerland North regions. In all other regions, updating network features can cause a network disruption on the volumes for up to 5 minutes.
8585

8686
> [!NOTE]
8787
> You need to submit a waitlist request for accessing the feature through the **[Azure NetApp Files standard networking features (edit volumes) Request Form](https://aka.ms/anfeditnetworkfeaturespreview)**. The feature can take approximately one week to be enabled after you submit the waitlist request. You can check the status of feature registration by using the following command:

articles/azure-netapp-files/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
2020

2121
Azure NetApp Files now supports the ability to edit network features (that is, upgrade from Basic to Standard network features) with no downtime for Azure NetApp Files volumes. Standard Network Features provide you with an enhanced virtual networking experience for a seamless and consistent experience along with security posture for Azure NetApp Files.
2222

23-
This feature is currently in preview in the Australia East, Central India, North Central US, and Switzerland North regions.
23+
This feature is currently in preview in the Australia East, Central India, East Asia, North Central US, and Switzerland North regions.
2424

2525
## September 2024
2626

articles/frontdoor/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
### YamlMime:Landing
22

33
title: Azure Front Door and CDN documentation
4-
summary: Azure Front Door is a scalable and secure entry point for fast delivery of your global web applications.
4+
summary: Azure Front Door is a modern cloud content delivery network (CDN) service that delivers high performance, scalability, and secure user experiences for your content and applications.
55

66
metadata:
77
title: Azure Front Door and CDN Documentation
8-
description: Azure Front Door provides a scalable and secure entry point for fast delivery of your global web applications. Learn how to use Front Door with our quickstarts, tutorials, and samples.
8+
description: Azure Front Door is a modern cloud content delivery network (CDN) service that delivers high performance, scalability, and secure user experiences for your content and applications. Learn how to use Front Door with our quickstarts, tutorials, and samples.
99
ms.service: azure-frontdoor
1010
ms.topic: landing-page
1111
author: duongau
Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
---
2+
title: Learn how to configure Azure Storage to de-identify documents with the de-identification service
3+
description: "Learn how to configure Azure Storage to de-identify documents with the de-identification service."
4+
author: jovinson-ms
5+
ms.author: jovinson
6+
ms.service: azure-health-data-services
7+
ms.subservice: deidentification-service
8+
ms.topic: tutorial
9+
ms.date: 11/01/2024
10+
11+
#customer intent: As an IT admin, I want to know how to configure an Azure Storage account to allow access to the de-identification service to de-identify documents.
12+
13+
---
14+
15+
# Tutorial: Configure Azure Storage to de-identify documents
16+
17+
The Azure Health Data Services de-identification service (preview) can de-identify documents in Azure Storage via an asynchronous job. If you have many documents that you would like
18+
to de-identify, using a job is a good option. Jobs also provide consistent surrogation, meaning that surrogate values in the de-identified output will match across
19+
all documents. For more information about de-identification, including consistent surrogation, see [What is the de-identification service (preview)?](overview.md)
20+
21+
When you choose to store documents in Azure Blob Storage, you're charged based on Azure Storage pricing. This cost isn't included in the
22+
de-identification service pricing. [Explore Azure Blob Storage pricing](https://azure.microsoft.com/pricing/details/storage/blobs).
23+
24+
In this tutorial, you:
25+
26+
> [!div class="checklist"]
27+
> * Create a storage account and container
28+
> * Upload a sample document
29+
> * Grant the de-identification service access
30+
> * Configure network isolation
31+
32+
## Prerequisites
33+
34+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* A de-identification service with system-assigned managed identity. [Deploy the de-identification service (preview)](quickstart.md).
36+
37+
## Open Azure CLI
38+
39+
Install [Azure CLI](/cli/azure/install-azure-cli) and open your terminal of choice. In this tutorial, we're using PowerShell.
40+
41+
## Create a storage account and container
42+
1. Set your context, substituting the subscription name containing your de-identification service for the `<subscription_name>` placeholder:
43+
```powershell
44+
az account set --subscription "<subscription_name>"
45+
```
46+
1. Save a variable for the resource group, substituting the resource group containing your de-identification service for the `<resource_group>` placeholder:
47+
```powershell
48+
$ResourceGroup = "<resource_group>"
49+
```
50+
1. Create a storage account, providing a value for the `<storage_account_name>` placeholder:
51+
```powershell
52+
$StorageAccountName = "<storage_account_name>"
53+
$StorageAccountId = $(az storage account create --name $StorageAccountName --resource-group $ResourceGroup --sku Standard_LRS --kind StorageV2 --min-tls-version TLS1_2 --allow-blob-public-access false --query id --output tsv)
54+
```
55+
1. Assign yourself a role to perform data operations on the storage account:
56+
```powershell
57+
$UserId = $(az ad signed-in-user show --query id -o tsv)
58+
az role assignment create --role "Storage Blob Data Contributor" --assignee $UserId --scope $StorageAccountId
59+
```
60+
1. Create a container to hold your sample document:
61+
```powershell
62+
az storage container create --account-name $StorageAccountName --name deidtest --auth-mode login
63+
```
64+
## Upload a sample document
65+
Next, you upload a document that contains synthetic PHI:
66+
```powershell
67+
$DocumentContent = "The patient came in for a visit on 10/12/2023 and was seen again November 4th at Contoso Hospital."
68+
az storage blob upload --data $DocumentContent --account-name $StorageAccountName --container-name deidtest --name deidsample.txt --auth-mode login
69+
```
70+
71+
## Grant the de-identification service access to the storage account
72+
73+
In this step, you grant the de-identification service's system-assigned managed identity role-based access to the container. You grant the **Storage Blob
74+
Data Contributor** role because the de-identification service will both read the original document and write de-identified output documents. Substitute the name of
75+
your de-identification service for the `<deid_service_name>` placeholder:
76+
```powershell
77+
$DeidServicePrincipalId=$(az resource show -n <deid_service_name> -g $ResourceGroup --resource-type microsoft.healthdataaiservices/deidservices --query identity.principalId --output tsv)
78+
az role assignment create --assignee $DeidServicePrincipalId --role "Storage Blob Data Contributor" --scope $StorageAccountId
79+
```
80+
81+
## Configure network isolation on the storage account
82+
Next, you update the storage account to disable public network access and only allow access from trusted Azure services such as the de-identification service.
83+
After running this command, you won't be able to view the storage container contents without setting a network exception.
84+
Learn more at [Configure Azure Storage firewalls and virtual networks](/azure/storage/common/storage-network-security).
85+
86+
```powershell
87+
az storage account update --name $StorageAccountName --public-network-access Disabled --bypass AzureServices
88+
```
89+
90+
## Clean up resources
91+
Once you're done with the storage account, you can delete the storage account and role assignments:
92+
```powershell
93+
az role assignment delete --assignee $DeidServicePrincipalId --role "Storage Blob Data Contributor" --scope $StorageAccountId
94+
az role assignment delete --assignee $UserId --role "Storage Blob Data Contributor" --scope $StorageAccountId
95+
az storage account delete --ids $StorageAccountId --yes
96+
```
97+
98+
## Next step
99+
100+
> [!div class="nextstepaction"]
101+
> [Quickstart: Azure Health De-identification client library for .NET](quickstart-sdk-net.md)

articles/healthcare-apis/deidentification/quickstart.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,5 @@ If you no longer need them, delete the resource group and de-identification serv
6969

7070
## Related content
7171

72-
[De-identification service overview](overview.md)
72+
> [!div class="nextstepaction"]
73+
> [Tutorial: Configure Azure Storage to de-identify documents](configure-storage.md)

articles/healthcare-apis/deidentification/toc.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@ items:
1515
href: quickstart.md
1616
- name: Azure Health De-identification client library for .NET
1717
href: quickstart-sdk-net.md
18+
- name: Tutorials
19+
expanded: true
20+
items:
21+
- name: Configure Azure Storage to de-identify documents
22+
href: configure-storage.md
1823
- name: How-to
1924
expanded: true
2025
items:

articles/iot-operations/.openpublishing.redirection.iot-operations.json

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -202,13 +202,23 @@
202202
},
203203
{
204204
"source_path_from_root": "/articles/iot-operations/manage-mqtt-connectivity/howto-configure-tls-manual.md",
205-
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-tls-manual",
206-
"redirect_document_id": true
205+
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener",
206+
"redirect_document_id": false
207+
},
208+
{
209+
"source_path_from_root": "/articles/iot-operations/manage-mqtt-broker/howto-configure-tls-manual.md",
210+
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener",
211+
"redirect_document_id": false
207212
},
208213
{
209214
"source_path_from_root": "/articles/iot-operations/manage-mqtt-connectivity/howto-configure-tls-auto.md",
210-
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-tls-auto",
211-
"redirect_document_id": true
215+
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path_from_root": "/articles/iot-operations/manage-mqtt-broker/howto-configure-tls-auto.md",
220+
"redirect_url": "/azure/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener",
221+
"redirect_document_id": false
212222
},
213223
{
214224
"source_path_from_root": "/articles/iot-operations/manage-mqtt-connectivity/howto-configure-brokerlistener.md",

0 commit comments

Comments
 (0)