Companies like Simbo AI are changing how medical offices handle patient communication, especially using automated phone answering services.
These tools use AI and are managed through platforms like Microsoft’s Azure Portal.
User permissions need to be controlled carefully to keep data safe, follow rules, and run smoothly.
These roles are Admin, Editor, and Reader.
They decide what each user can do and help keep patient information private and system settings secure.
Starting July 1, 2025, Microsoft will require all new Healthcare Agent Service systems to use Microsoft Entra ID via Azure Portal for managing access.
Existing systems will switch over gradually.
This means healthcare managers and IT staff must learn what each role does.
Healthcare Agent Service is a cloud-based AI bot system worked through Microsoft’s Azure platform.
It helps healthcare providers by automating tasks like answering calls, sending appointment reminders, and sorting patient questions.
User permissions control what people can do and help meet HIPAA rules.
The three main roles are Healthcare Agent Admin, Editor, and Reader.
Each has different levels of access and responsibility.
The Admin role has the highest access level in the Healthcare Agent Service.
People with this role can control the entire system, including security settings and managing users.
This role is key for keeping the system safe and following healthcare laws.
Key Responsibilities and Permissions:
Because the Admin role deals with sensitive info and critical system parts, it is usually given to IT managers or senior healthcare leaders who know both healthcare privacy and technology.
The Editor role allows users to work on bot functions but not change security settings.
Editors help design and improve how the bot works but cannot control access or handle sensitive data.
Primary Capabilities and Restrictions:
This role fits healthcare staff who improve patient communication, call center supervisors, and office managers who do not need full admin access but can update how the system works.
The Reader role is the most basic.
It allows users to view but not change anything.
Features:
The Reader role helps keep watch on the system without risking unwanted changes.
From July 1, 2025, Microsoft will require all new Healthcare Agent Service systems to use Microsoft Entra ID with the Azure Portal to manage user access.
Existing systems will move over slowly, and there will be an option for early users to switch sooner.
This centralized system brings several benefits for U.S. healthcare groups:
Healthcare admins need to learn this system well to keep everything running and protect sensitive info.
The Healthcare Agent Service uses AI bots to automate front-office tasks that usually need a lot of human work.
These bots lower work pressure, shorten patient wait times, and better manage appointment scheduling while keeping data safe.
Key AI Workflow Functions:
In the U.S., where rules are strict and patient satisfaction matters, this automated system helps frontline workers and keeps compliance with laws like HIPAA.
Because of HIPAA rules, patient privacy, and system uptime needs, role assignments should match the organization’s structure and expertise.
In many healthcare offices, IT staff, medical managers, and sometimes outside experts work together to manage these roles.
To assign user roles using Microsoft Entra in the Azure Portal, Healthcare Agent Admins should:
Using Microsoft Entra ID groups helps healthcare offices manage many users at once by grouping them by department or role instead of assigning roles one by one.
The change to Microsoft Entra access control fits with the healthcare sector’s move toward more digital systems.
It helps AI phone systems work with secure and flexible user management, improving patient communication and following laws like HIPAA and others.
Medical practice owners and managers in the U.S. need to:
If roles are set up poorly, the practice could face risks like data breaches, system problems, or legal troubles.
Managing roles and access in AI-driven healthcare services shows how the U.S. healthcare system is becoming more secure and private.
This helps automate important front-office work while keeping patient data safe and meeting laws.
User permissions for Healthcare agent services will be managed using Microsoft Entra ID via the Azure Portal to streamline and secure access control.
Only users with the Healthcare Agent Admin role within the Azure Access Control (IAM) pane can enable or disable the Microsoft Entra Access Management toggle.
There are three main roles: Healthcare Agent Admin (full access including user management and bot keys), Healthcare Agent Editor (can edit bot resources excluding keys and user inputs), and Healthcare Agent Reader (read-only access excluding keys and sensitive inputs).
Healthcare Agent Admins can fully manage bot resources, configuration settings, instance keys, and user access, including assigning roles through the Azure Portal, making them the primary authority for access control.
All previously assigned users in the Healthcare Agent Service Management page will no longer control access; they remain visible for reference only. Users must be reassigned via the Azure IAM pane.
Admins sign in to the Azure Portal, navigate to the Healthcare Agent Service, go to the Access control (IAM) pane, add a role assignment, select the Healthcare Agent role, add members, and confirm with Review + assign.
Editors cannot access bot instance keys, end-user inputs like feedback or conversation logs, and have only read-only access to skills, channels, and user management, restricting critical configuration and sensitive data access.
Microsoft Entra ID assigned groups help organize and manage collections of users efficiently in the Azure Portal, supporting scalable and secure role assignments for Healthcare AI Agents.
Yes, starting July 1st, 2025, all new Healthcare agent service instances will automatically use Microsoft Entra Access Management for user permissions.
No, users without the Healthcare Agent Admin role will see the toggle greyed out and cannot enable or disable the Microsoft Entra Access Management feature.