HL7 FHIR Implementation Guide: Data Access Policies, published by HL7 International / Security. This guide is not an authorized publication; it is the continuous build for version 1.0.0-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/data-access-policies/ and changes regularly. See the Directory of published versions
Official URL: http://hl7.org/fhir/uv/dap/ImplementationGuide/hl7.fhir.uv.dap | Version: 1.0.0-current | |||
IG Standards status: Informative | Maturity Level: 0 | Computable Name: DataAccessPolicies |
This is the Security WG, FHIR data-access-policy sandbox Implementation Guide.
This documentation and set of artifacts are still undergoing development. This content is only for informative purposes.
The top menu allows quick navigation to the different sections, and a Table of Contents is provided with the entire content of this Implementation Guide. (Be aware that some pages have multiple tabs).
This IG purpose is to include use-case analysis to enable the FHIR Permission resource to mature. These use-cases will confirm where the Permission resource is properly constructed, where updates are needed, and where core extensions and vocabulary are needed.
The use-cases and analysis are found on these pages:
Permission is a portion of an Access Control environment. It is provided in FHIR form to enable Access Control rules to more naturally utilize the FHIR model.