National Directory of Healthcare Providers & Services (NDH) Implementation Guide, published by HL7 International / Patient Administration. This guide is not an authorized publication; it is the continuous build for version 1.0.0-ballot built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/fhir-us-ndh/ and changes regularly. See the Directory of published versions
Official URL: http://hl7.org/fhir/us/ndh/ValueSet/EndpointAccessControlMechanismVS | Version: 1.0.0-ballot | |||
Active as of 2024-11-25 | Computable Name: EndpointAccessControlMechanismVS |
Codes for documenting access control mechanism
References
Generated Narrative: ValueSet EndpointAccessControlMechanismVS
http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS
Generated Narrative: ValueSet
Expansion based on codesystem Endpoint Access Control Mechanism Code System v1.0.0-ballot (CodeSystem)
This value set contains 9 concepts
Code | System | Display | Definition |
public | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | Public | Public access without any specific access control. |
opaque-access-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | Opaque Access Token | Uses an opaque token for access control, which is a token whose structure is not visible or meaningful to the client. |
jwt-access-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | JWT Access Token | Uses a JSON Web Token (JWT) for access control, which is a compact, URL-safe means of representing claims to be transferred between two parties. |
mutual-tls | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | Mutual TLS | Uses mutual Transport Layer Security (TLS) where both client and server authenticate each other using certificates. |
wss-saml-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | WSS SAML Token | Uses a Security Assertion Markup Language (SAML) token within the Web Services Security (WSS) framework for access control. |
wss-username-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | WSS User Name Token | Uses a username token within the WSS framework for access control. |
wss-kerberos-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | WSS Kerberos Token | Uses a Kerberos token within the WSS framework for access control. |
wss-x509-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | WSS X509 Token | Uses an X.509 certificate token within the WSS framework for access control. |
wss-custom-token | http://hl7.org/fhir/us/ndh/CodeSystem/EndpointAccessControlMechanismCS | WSS Custom Token | Uses a custom token within the WSS framework for access control. |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |