You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/register-application.md
+16-19Lines changed: 16 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,37 +1,35 @@
1
1
---
2
2
title: Register a client application in Microsoft Entra ID for the Azure Health Data Services
3
-
description: How to register a client application in the Microsoft Entra ID and add a secret and API permissions to the Azure Health Data Services
3
+
description: "Learn how to register a client application in Microsoft Entra ID for Azure Health Data Services. Add secrets, certificates, and API permissions to enable secure access."
4
4
author: chachachachami
5
5
ms.service: azure-health-data-services
6
-
ms.subservice: fhir
7
6
ms.topic: tutorial
8
-
ms.date: 03/16/2026
7
+
ms.date: 03/24/2026
9
8
ms.author: chrupa
10
-
ms.reviewer: v-catheribun
11
9
ms.custom: sfi-image-blocked
12
10
---
13
11
14
-
# Register a client application in Microsoft Entra ID
12
+
# Register a client application in Microsoft Entra ID for Azure Health Data Services
15
13
16
-
In this article, you learn how to register a client application in Microsoft Entra ID to access Azure Health Data Services. For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
14
+
In this article, you learn how to register a client application in Microsoft Entra ID to access Azure Health Data Services. Registering a client application enables you to authenticate and securely connect to FHIR and DICOM services. For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
17
15
18
16
## Register a new application
19
17
20
18
1. In the [Azure portal](https://portal.azure.com), select **Microsoft Entra ID**.
21
19
2. Select **App registrations**.
22
-
:::image type="content" source="media/register-application-new-app-registration.png" alt-text="Screen shot of new app registration window." lightbox="media/register-application-new-app-registration.png":::
20
+
:::image type="content" source="media/register-application-new-app-registration.png" alt-text="Screenshot of the new app registration window in Microsoft Entra ID." lightbox="media/register-application-new-app-registration.png":::
23
21
24
22
3. Select **New registration**.
25
23
4. For Supported account types, select **Accounts in this organization directory only**. Don't change the other options.
26
-
:::image type="content" source="media/register-application-account-types.png" alt-text="Screenshot of new registration account options." lightbox="media/register-application-account-types.png":::
24
+
:::image type="content" source="media/register-application-account-types.png" alt-text="Screenshot of the new registration account options for supported account types." lightbox="media/register-application-account-types.png":::
27
25
28
26
5. Select **Register**.
29
27
30
28
## Application ID (client ID)
31
29
32
30
After registering a new application, you can find the application (client) ID and Directory (tenant) ID in the **Overview** menu option. Make a note of the values for use later.
33
31
34
-
:::image type="content" source="media/register-application-app-overview.png" alt-text="Screenshot of client ID overview panel." lightbox="media/register-application-app-overview.png":::
32
+
:::image type="content" source="media/register-application-app-overview.png" alt-text="Screenshot of the application client ID and tenant ID overview panel in Microsoft Entra ID." lightbox="media/register-application-app-overview.png":::
35
33
36
34
37
35
## Authentication setting: confidential vs. public
@@ -40,7 +38,7 @@ Select **Authentication** and the **Settings** tab to review the settings. The d
40
38
41
39
If you keep this default value, the application registration is a **confidential client application** and requires a certificate or secret.
42
40
43
-
:::image type="content" source="media/register-application-allow-public-client-flows.png" alt-text="Screenshot of confidential client application."::: ](media/register-application-allow-public-client-flows.png#lightbox)
41
+
:::image type="content" source="media/register-application-allow-public-client-flows.png" alt-text="Screenshot of the authentication settings for a confidential client application."::: ](media/register-application-allow-public-client-flows.png#lightbox)
44
42
45
43
46
44
If you enable the **Allow public client flows** option, the application registration is a public client application and doesn't require a certificate or secret. Public client applications are useful when you want to use the OAuth 2.0 authorization protocol or features as described in [Public client and confidential client applications](/entra/identity-platform/msal-client-applications#when-should-you-enable-a-public-client-flow-in-your-app-registration).
@@ -57,7 +55,7 @@ For example, when you choose **Mobile and desktop applications**, you select the
57
55
58
56
59
57
60
-
## Certificates and secrets
58
+
## Certificates and client secrets
61
59
62
60
To create a new client secret, use the following steps.
63
61
@@ -66,10 +64,10 @@ To create a new client secret, use the following steps.
66
64
1. In **Add a client secret**, enter a **Description**.
67
65
1. Accept the recommended 180-day value in the **Expires** field, or select a different value from the list.
68
66
1. Select **Add**.
69
-
:::image type="content" source="media/register-application-new-client-secret.png" alt-text="Screenshot of certificates and secrets." lightbox="media/register-application-new-client-secret.png":::
67
+
:::image type="content" source="media/register-application-new-client-secret.png" alt-text="Screenshot of the certificates and client secrets page with new client secret options." lightbox="media/register-application-new-client-secret.png":::
70
68
71
69
1. Copy the secret value by selecting the copy button next to the **Value**.
72
-
:::image type="content" source="media/register-application-copy-client-secret.png" alt-text="Screenshot of copy client secret." lightbox="media/register-application-copy-client-secret.png":::
70
+
:::image type="content" source="media/register-application-copy-client-secret.png" alt-text="Screenshot of the client secret value with the copy button highlighted." lightbox="media/register-application-copy-client-secret.png":::
73
71
74
72
75
73
>[!NOTE]
@@ -78,9 +76,9 @@ To create a new client secret, use the following steps.
78
76
79
77
Optionally, you can upload a certificate (public key) and use the Certificate ID, a GUID value associated with the certificate. For testing purposes, you can create a self-signed certificate by using tools such as the PowerShell command `New-SelfSignedCertificate`, and then export the certificate from the certificate store. For more information, see [Create a self-signed public certificate to authenticate your application](/entra/identity-platform/howto-create-self-signed-certificate)
80
78
81
-
## API permissions
79
+
## API permissions for DICOM and FHIR services
82
80
83
-
The following steps are required for the DICOM service, but optional for the FHIR service. In addition, you manage user access permissions or role assignments for Azure Health Data Services through RBAC. For more information, see [Configure Azure RBAC for Azure Health Data Services](configure-azure-rbac.md).
81
+
The following steps are required for the DICOM service, but optional for the FHIR service.
84
82
85
83
1. Select **API permissions**.
86
84
@@ -104,8 +102,7 @@ The following steps are required for the DICOM service, but optional for the FHI
104
102
>Use `grant_type` of `client_credentials` when getting an access token for the FHIR service by using tools such as REST Client. For more information, see [Accessing Azure Health Data Services using the REST Client Extension in Visual Studio Code](./fhir/using-rest-client.md).
105
103
>>Use `grant_type` of `client_credentials` or `authentication_code` when getting an access token for the DICOM service. For more information, see [Using DICOM with cURL](dicom/dicomweb-standard-apis-curl.md).
106
104
107
-
## Next steps
105
+
## Next step
108
106
109
-
>[!NEXT STEPS]
110
-
> -[Grant permissions to the client application](configure-azure-rbac.md)
111
-
> -[Access Azure Health Data Services](access-healthcare-apis.md)
107
+
> [!div class="nextstepaction"]
108
+
> [Configure Azure RBAC for Azure Health Data Services](configure-azure-rbac.md)
0 commit comments