Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This package contains a client library for the de-identification service in Azure Health Data Services which enables users to tag, redact, or surrogate health data containing Protected Health Information (PHI). For more on service functionality and important usage considerations, see the de-identification service overview.
Source code | Package (NuGet) | API reference documentation | Product documentation | Samples
Getting started
Prerequisites
- Have an Azure Subscription.
- Deploy the de-identification service.
- Configure Azure role-based access control (RBAC) for the operations you will perform.
Install the package
Install the .NET client library NuGet package:
dotnet add package Azure.Health.Deidentification
Authenticate the client
You will need a service URL to instantiate a client. You can find the service URL for a particular resource
in the Azure portal:
You can also find the service URL with Azure CLI:
# Get the service URL for the resource
az deidservice show --name "<resource-name>" --resource-group "<resource-group-name>" --query "properties.serviceUrl"
The Azure Identity package provides the default implementation for authenticating the client.
You can use DefaultAzureCredential
to automatically find the best credential to use at runtime.
const string serviceEndpoint = "https://example.api.cac001.deid.azure.com";
TokenCredential credential = new DefaultAzureCredential();
DeidentificationClient client = new(
new Uri(serviceEndpoint),
credential,
new DeidentificationClientOptions()
);
Key concepts
Operation Types
Given an input text, the de-identification service can perform three main operations:
Tag
returns the category and location within the text of detected PHI entities.Redact
returns output text where detected PHI entities are replaced with placeholder text. For exampleJohn
replaced with[name]
.Surrogate
returns output text where detected PHI entities are replaced with realistic replacement values. For example,My name is John Smith
could becomeMy name is Tom Jones
.
For more information about customizing the redaction format, see Tutorial: Use a custom redaction format with the de-identification service.
De-identification Methods
There are two methods of interacting with the de-identification service. You can send text directly, or you can create jobs to de-identify documents in Azure Storage.
You can de-identify text directly using the DeidentificationClient
:
DeidentificationContent content = new("Hello, John!");
Response<DeidentificationResult> result = client.DeidentifyText(content);
string outputString = result.Value.OutputText;
Console.WriteLine(outputString); // Hello, Tom!
To learn about prerequisites and configuration options for de-identifying documents in Azure Storage, see Tutorial: Configure Azure Storage to de-identify documents. Once you have configured your storage account, you can create a job to de-identify documents in a container.
DeidentificationJob job = new()
{
SourceLocation = new SourceStorageLocation(new Uri(storageAccountUrl), "folder1/"),
TargetLocation = new TargetStorageLocation(new Uri(storageAccountUrl), "output_folder1/"),
OperationType = DeidentificationOperationType.Redact,
};
job = client.DeidentifyDocuments(WaitUntil.Started, "my-job-1", job).Value;
Console.WriteLine($"Job status: {job.Status}"); // Job status: NotStarted
Thread safety
All client instance methods are thread-safe and independent of each other (guideline). This ensures that the recommendation of reusing client instances is always safe, even across threads.
Additional concepts
Client options | Accessing the response | Long-running operations | Handling failures | Diagnostics | Mocking | Client lifetime
Examples
For sample code snippets illustrating common patterns used in the de-identification service, see the samples.
Next steps
- Find a bug, or have feedback? Raise an issue with the Health Deidentification label.
Troubleshooting
- Unable to Access Source or Target Storage
- Ensure you assign a managed identity to your de-identification service
- Ensure you assign appropriate permissions to the managed identity to access the storage account
Contributing
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.
When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information, see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.
Azure SDK for .NET