National Directory of Healthcare Providers & Services (NDH) Implementation Guide, published by HL7 International / Patient Administration. This guide is not an authorized publication; it is the continuous build for version 2.0.0-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/fhir-us-ndh/ and changes regularly. See the Directory of published versions
| Official URL: http://hl7.org/fhir/us/ndh/ValueSet/EndpointAccessControlMechanismVS | Version: 2.0.0-current | |||
| Standards status: Trial-use | Maturity Level: 4 | Computable Name: EndpointAccessControlMechanismVS | ||
Codes for documenting access control mechanism
References
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS version 📦2.0.0-current
Expansion performed internally based on codesystem Endpoint Access Control Mechanism Code System v2.0.0-current (CodeSystem)
This value set contains 15 concepts
| System | Code | Display (en) | Definition | JSON | XML |
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | public | Public | Public access without any specific access control. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | OAuth | OAuth | OAuth (unspecified version see oauth.net). | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | SMART-on-FHIR | SMART-on-FHIR | OAuth2 using SMART-on-FHIR profile (see http://docs.smarthealthit.org/). | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | NTLM | NTLM | Microsoft NTLM Authentication. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | basic | Basic | Basic authentication defined in HTTP specification. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | Kerberos | Kerberos | see http://www.ietf.org/rfc/rfc4120.txt. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | Certificates | Certificates | SSL where client must have a certificate registered with the server. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | opaque-access-token | Opaque Access Token | Uses an opaque token for access control, which is a token whose structure is not visible or meaningful to the client. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | jwt-access-token | JWT Access Token | Uses a JSON Web Token (JWT) for access control, which is a compact, URL-safe means of representing claims to be transferred between two parties. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | mutual-tls | Mutual TLS | Uses mutual Transport Layer Security (TLS) where both client and server authenticate each other using certificates. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | wss-saml-token | WSS SAML Token | Uses a Security Assertion Markup Language (SAML) token within the Web Services Security (WSS) framework for access control. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | wss-username-token | WSS User Name Token | Uses a username token within the WSS framework for access control. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | wss-kerberos-token | WSS Kerberos Token | Uses a Kerberos token within the WSS framework for access control. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | wss-x509-token | WSS X509 Token | Uses an X.509 certificate token within the WSS framework for access control. | ||
http://hl7.org/fhir/us/ndh/CodeSystem/NdhEndpointAccessControlMechanismCS | wss-custom-token | WSS Custom Token | Uses a custom token within the WSS framework for access control. |
Explanation of the columns that may appear on this page:
| Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
| System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
| Code | The code (used as the code in the resource instance) |
| Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
| Definition | An explanation of the meaning of the concept |
| Comments | Additional notes about how to use the code |