Skip to content

Commit d52d6d8

Browse files
committed
SEO imptovements per content mentor
1 parent ebb340e commit d52d6d8

1 file changed

Lines changed: 16 additions & 19 deletions

File tree

articles/healthcare-apis/register-application.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,35 @@
11
---
22
title: Register a client application in Microsoft Entra ID for the Azure Health Data Services
3-
description: How to register a client application in the Microsoft Entra ID and add a secret and API permissions to the Azure Health Data Services
3+
description: "Learn how to register a client application in Microsoft Entra ID for Azure Health Data Services. Add secrets, certificates, and API permissions to enable secure access."
44
author: chachachachami
55
ms.service: azure-health-data-services
6-
ms.subservice: fhir
76
ms.topic: tutorial
8-
ms.date: 03/16/2026
7+
ms.date: 03/24/2026
98
ms.author: chrupa
10-
ms.reviewer: v-catheribun
119
ms.custom: sfi-image-blocked
1210
---
1311

14-
# Register a client application in Microsoft Entra ID
12+
# Register a client application in Microsoft Entra ID for Azure Health Data Services
1513

16-
In this article, you learn how to register a client application in Microsoft Entra ID to access Azure Health Data Services. For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
14+
In this article, you learn how to register a client application in Microsoft Entra ID to access Azure Health Data Services. Registering a client application enables you to authenticate and securely connect to FHIR and DICOM services. For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
1715

1816
## Register a new application
1917

2018
1. In the [Azure portal](https://portal.azure.com), select **Microsoft Entra ID**.
2119
2. Select **App registrations**.
22-
:::image type="content" source="media/register-application-new-app-registration.png" alt-text="Screen shot of new app registration window." lightbox="media/register-application-new-app-registration.png":::
20+
:::image type="content" source="media/register-application-new-app-registration.png" alt-text="Screenshot of the new app registration window in Microsoft Entra ID." lightbox="media/register-application-new-app-registration.png":::
2321

2422
3. Select **New registration**.
2523
4. For Supported account types, select **Accounts in this organization directory only**. Don't change the other options.
26-
:::image type="content" source="media/register-application-account-types.png" alt-text="Screenshot of new registration account options." lightbox="media/register-application-account-types.png":::
24+
:::image type="content" source="media/register-application-account-types.png" alt-text="Screenshot of the new registration account options for supported account types." lightbox="media/register-application-account-types.png":::
2725

2826
5. Select **Register**.
2927

3028
## Application ID (client ID)
3129

3230
After registering a new application, you can find the application (client) ID and Directory (tenant) ID in the **Overview** menu option. Make a note of the values for use later.
3331

34-
:::image type="content" source="media/register-application-app-overview.png" alt-text="Screenshot of client ID overview panel." lightbox="media/register-application-app-overview.png":::
32+
:::image type="content" source="media/register-application-app-overview.png" alt-text="Screenshot of the application client ID and tenant ID overview panel in Microsoft Entra ID." lightbox="media/register-application-app-overview.png":::
3533

3634

3735
## Authentication setting: confidential vs. public
@@ -40,7 +38,7 @@ Select **Authentication** and the **Settings** tab to review the settings. The d
4038

4139
If you keep this default value, the application registration is a **confidential client application** and requires a certificate or secret.
4240

43-
:::image type="content" source="media/register-application-allow-public-client-flows.png" alt-text="Screenshot of confidential client application."::: ](media/register-application-allow-public-client-flows.png#lightbox)
41+
:::image type="content" source="media/register-application-allow-public-client-flows.png" alt-text="Screenshot of the authentication settings for a confidential client application."::: ](media/register-application-allow-public-client-flows.png#lightbox)
4442

4543

4644
If you enable the **Allow public client flows** option, the application registration is a public client application and doesn't require a certificate or secret. Public client applications are useful when you want to use the OAuth 2.0 authorization protocol or features as described in [Public client and confidential client applications](/entra/identity-platform/msal-client-applications#when-should-you-enable-a-public-client-flow-in-your-app-registration).
@@ -57,7 +55,7 @@ For example, when you choose **Mobile and desktop applications**, you select the
5755

5856

5957

60-
## Certificates and secrets
58+
## Certificates and client secrets
6159

6260
To create a new client secret, use the following steps.
6361

@@ -66,10 +64,10 @@ To create a new client secret, use the following steps.
6664
1. In **Add a client secret**, enter a **Description**.
6765
1. Accept the recommended 180-day value in the **Expires** field, or select a different value from the list.
6866
1. Select **Add**.
69-
:::image type="content" source="media/register-application-new-client-secret.png" alt-text="Screenshot of certificates and secrets." lightbox="media/register-application-new-client-secret.png":::
67+
:::image type="content" source="media/register-application-new-client-secret.png" alt-text="Screenshot of the certificates and client secrets page with new client secret options." lightbox="media/register-application-new-client-secret.png":::
7068

7169
1. Copy the secret value by selecting the copy button next to the **Value**.
72-
:::image type="content" source="media/register-application-copy-client-secret.png" alt-text="Screenshot of copy client secret." lightbox="media/register-application-copy-client-secret.png":::
70+
:::image type="content" source="media/register-application-copy-client-secret.png" alt-text="Screenshot of the client secret value with the copy button highlighted." lightbox="media/register-application-copy-client-secret.png":::
7371

7472

7573
>[!NOTE]
@@ -78,9 +76,9 @@ To create a new client secret, use the following steps.
7876

7977
Optionally, you can upload a certificate (public key) and use the Certificate ID, a GUID value associated with the certificate. For testing purposes, you can create a self-signed certificate by using tools such as the PowerShell command `New-SelfSignedCertificate`, and then export the certificate from the certificate store. For more information, see [Create a self-signed public certificate to authenticate your application](/entra/identity-platform/howto-create-self-signed-certificate)
8078

81-
## API permissions
79+
## API permissions for DICOM and FHIR services
8280

83-
The following steps are required for the DICOM service, but optional for the FHIR service. In addition, you manage user access permissions or role assignments for Azure Health Data Services through RBAC. For more information, see [Configure Azure RBAC for Azure Health Data Services](configure-azure-rbac.md).
81+
The following steps are required for the DICOM service, but optional for the FHIR service.
8482

8583
1. Select **API permissions**.
8684

@@ -104,8 +102,7 @@ The following steps are required for the DICOM service, but optional for the FHI
104102
>Use `grant_type` of `client_credentials` when getting an access token for the FHIR service by using tools such as REST Client. For more information, see [Accessing Azure Health Data Services using the REST Client Extension in Visual Studio Code](./fhir/using-rest-client.md).
105103
>>Use `grant_type` of `client_credentials` or `authentication_code` when getting an access token for the DICOM service. For more information, see [Using DICOM with cURL](dicom/dicomweb-standard-apis-curl.md).
106104
107-
## Next steps
105+
## Next step
108106

109-
>[!NEXT STEPS]
110-
> - [Grant permissions to the client application](configure-azure-rbac.md)
111-
> - [Access Azure Health Data Services](access-healthcare-apis.md)
107+
> [!div class="nextstepaction"]
108+
> [Configure Azure RBAC for Azure Health Data Services](configure-azure-rbac.md)

0 commit comments

Comments
 (0)