Azure FHIR Proxy - cannot access through Postman

LooFunk 96 Reputation points
2021-02-18T13:07:52.74+00:00

Hi,

I have created an instance of Azure API for FHIR with an Azure FHIR proxy following this tutorial:

https://github.com/microsoft/health-architectures/tree/master/FHIR/FHIRProxy##configuration

I am able to browse to the proxy URL through a browser after being prompted to log in to view the metadata as shown below:

69573-image.png

However, when trying to access it through the Postman API tool I keep getting the same error:

You do not have permission to view this directory or page.

I have tried generating an authorization Bearer token using the following:

69548-image.png

The authorization token looks fine, but when adding it to my API call it errors as shown below:

![69537-image.png]3

Does anyone have any idea how I can successfully call my API with a proper authorization token that works or know a tutorial that actually explains this part of the process?
The tutorial does not give much information.

Thanks

Azure API Management
Azure API Management
An Azure service that provides a hybrid, multi-cloud management platform for APIs.
2,168 questions
Azure Health Data Services
Azure Health Data Services
An Azure offering that provides a suite of purpose-built technologies for protected health information in the cloud.
166 questions
0 comments No comments
{count} votes

Accepted answer
  1. LooFunk 96 Reputation points
    2021-02-24T14:59:07.437+00:00

    Hi, I managed to fix the issue. I found that the resource ID was needed in the auth URL:

    71646-image.png

    This can be obtained from Enterprise Applications:

    71616-image.png

    Also, creating two separate app registrations:

    71648-image.png

    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Pramod Valavala 20,636 Reputation points Microsoft Employee
    2021-02-19T08:24:14.907+00:00

    Looks like the FHIR Proxy is deployed with WebApp Authentication/Authorization (also called Easy Auth) enabled. If you have deployed as is too, the authentication flow is slightly different and is documented.

    To quote the docs for reference, after getting the access token from Azure AD, you need to validate the token against easy auth which returns another authentication token that needs to be set in the X-ZUMO-AUTH header to make the actual request.

    From the browser directly, a cookie is set with the required authentication token as mentioned in the same doc.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.