Basic Audit Log Patterns (BALP)
1.1.4-current - ci-build International flag

Basic Audit Log Patterns (BALP), published by IHE IT Infrastructure Technical Committee. This guide is not an authorized publication; it is the continuous build for version 1.1.4-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/IHE/ITI.BasicAudit/ and changes regularly. See the Directory of published versions

: Audit Example of a basic SAML access token of comprehensive from QDI sample - XML Representation

Raw xml | Download



<AuditEvent xmlns="http://hl7.org/fhir">
  <id value="ex-auditPoke-SAML-QDI-Comp"/>
  <meta>
    <profile
             value="https://profiles.ihe.net/ITI/BALP/StructureDefinition/IHE.BasicAudit.SAMLaccessTokenUse.Comprehensive"/>
    <security>
      <system value="http://terminology.hl7.org/CodeSystem/v3-ActReason"/>
      <code value="HTEST"/>
    </security>
  </meta>
  <text>
    <status value="generated"/>
    <div xmlns="http://www.w3.org/1999/xhtml"><p class="res-header-id"><b>Generated Narrative: AuditEvent ex-auditPoke-SAML-QDI-Comp</b></p><a name="ex-auditPoke-SAML-QDI-Comp"> </a><a name="hcex-auditPoke-SAML-QDI-Comp"> </a><a name="ex-auditPoke-SAML-QDI-Comp-en-US"> </a><p><b>type</b>: <a href="http://hl7.org/fhir/R4/codesystem-dicom-dcim.html#dicom-dcim-110100">DICOM Controlled Terminology Definitions</a> 110100: Application Activity</p><p><b>subtype</b>: unknown poke: Boredom poke</p><p><b>action</b>: Read/View/Print</p><p><b>recorded</b>: 2021-12-03 09:49:00+0000</p><p><b>outcome</b>: Success</p><blockquote><p><b>agent</b></p><p><b>type</b>: <span title="Codes:{http://terminology.hl7.org/CodeSystem/v3-ParticipationType IRCP}, {https://profiles.ihe.net/ITI/BALP/CodeSystem/UserAgentTypes UserSamlAgent}">information recipient</span></p><p><b>role</b>: <span title="Codes:{urn:oid:2.16.840.1.113883.6.96 307969004}">Public health officier</span></p><p><b>who</b>: Identifier: <code>ldap:///CN%3DSAML%20User%2COU%3DHarris%2CO%3DHITS%2CL%3DMelbourne%2CST%3DFL%2CC%3DUS</code>/UID=kskagerb</p><p><b>requestor</b>: true</p><p><b>policy</b>: _d87f8adf-711a-4545-bf77-ff8517b498e4</p><p><b>purposeOfUse</b>: <span title="Codes:{urn:oid:2.16.840.1.113883.3.18.7.1 PUBLICHEALTH}">Uses and disclosures for public health activities.</span></p></blockquote><blockquote><p><b>agent</b></p><p><b>type</b>: <span title="Codes:{http://terminology.hl7.org/CodeSystem/v3-RoleClass PROV}">healthcare provider</span></p><p><b>who</b>: connectred5.fedsconnect.org (Identifier: urn:oid:2.16.840.1.113883.3.333)</p><p><b>requestor</b>: false</p></blockquote><h3>Sources</h3><table class="grid"><tr><td style="display: none">-</td><td><b>Site</b></td><td><b>Observer</b></td><td><b>Type</b></td></tr><tr><td style="display: none">*</td><td>server.example.com</td><td><a href="Device-ex-device.html">Device</a></td><td><a href="http://terminology.hl7.org/6.0.0/CodeSystem-security-source-type.html#security-source-type-4">Audit Event Source Type</a> 4: Application Server</td></tr></table><blockquote><p><b>entity</b></p><p><b>what</b>: Identifier: urn:oid:1.2.3.4.123456789</p><p><b>type</b>: <a href="http://hl7.org/fhir/R4/codesystem-resource-types.html#resource-types-Consent">ResourceType</a> Consent: Consent</p><blockquote><p><b>detail</b></p><p><b>type</b>: urn:ihe:iti:xua:2012:acp</p><p><b>value</b>: urn:oid:1.2.3.4</p></blockquote><blockquote><p><b>detail</b></p><p><b>type</b>: urn:oasis:names:tc:xacml:2.0:resource:resource-id</p><p><b>value</b>: 500000000^^^&amp;2.16.840.1.113883.3.333&amp;ISO</p></blockquote></blockquote></div>
  </text>
  <type>
    <system value="http://dicom.nema.org/resources/ontology/DCM"/>
    <code value="110100"/>
    <display value="Application Activity"/>
  </type>
  <subtype>
    <system value="urn:ietf:rfc:1438"/>
    <code value="poke"/>
    <display value="Boredom poke"/>
  </subtype>
  <action value="R"/>
  <recorded value="2021-12-03T09:49:00.000Z"/>
  <outcome value="0"/>
  <agent>
    <extension
               url="https://profiles.ihe.net/ITI/BALP/StructureDefinition/ihe-assuranceLevel">
      <valueCodeableConcept>
        <coding>
          <system value="urn:oasis:names:tc:SAML:2.0:ac:classes"/>
          <code value="X509"/>
        </coding>
      </valueCodeableConcept>
    </extension>
    <extension
               url="https://profiles.ihe.net/ITI/BALP/StructureDefinition/ihe-otherId">
      <valueIdentifier>
        <type>
          <coding>
            <system
                    value="https://profiles.ihe.net/ITI/BALP/CodeSystem/OtherIdentifierTypes"/>
            <code value="SAML-subject-id"/>
          </coding>
        </type>
        <value value="Karl S Skagerberg"/>
      </valueIdentifier>
    </extension>
    <type>
      <coding>
        <system
                value="http://terminology.hl7.org/CodeSystem/v3-ParticipationType"/>
        <code value="IRCP"/>
        <display value="information recipient"/>
      </coding>
      <coding>
        <system
                value="https://profiles.ihe.net/ITI/BALP/CodeSystem/UserAgentTypes"/>
        <code value="UserSamlAgent"/>
      </coding>
    </type>
    <role>
      <coding>
        <system value="urn:oid:2.16.840.1.113883.6.96"/>
        <code value="307969004"/>
        <display value="Public health officier"/>
      </coding>
    </role>
    <who>
      <identifier>
        <system
                value="ldap:///CN%3DSAML%20User%2COU%3DHarris%2CO%3DHITS%2CL%3DMelbourne%2CST%3DFL%2CC%3DUS"/>
        <value value="UID=kskagerb"/>
      </identifier>
    </who>
    <requestor value="true"/>
    <policy value="_d87f8adf-711a-4545-bf77-ff8517b498e4"/>
    <purposeOfUse>
      <coding>
        <system value="urn:oid:2.16.840.1.113883.3.18.7.1"/>
        <code value="PUBLICHEALTH"/>
        <display value="Uses and disclosures for public health activities."/>
      </coding>
    </purposeOfUse>
  </agent>
  <agent>
    <type>
      <coding>
        <system value="http://terminology.hl7.org/CodeSystem/v3-RoleClass"/>
        <code value="PROV"/>
        <display value="healthcare provider"/>
      </coding>
    </type>
    <who>
      <identifier>
        <value value="urn:oid:2.16.840.1.113883.3.333"/>
      </identifier>
      <display value="connectred5.fedsconnect.org"/>
    </who>
    <requestor value="false"/>
  </agent>
  <source>
    <site value="server.example.com"/>
    <observer>🔗 
      <reference value="Device/ex-device"/>
    </observer>
    <type>
      <system
              value="http://terminology.hl7.org/CodeSystem/security-source-type"/>
      <code value="4"/>
      <display value="Application Server"/>
    </type>
  </source>
  <entity>
    <what>
      <identifier>
        <value value="urn:oid:1.2.3.4.123456789"/>
      </identifier>
    </what>
    <type>
      <system value="http://hl7.org/fhir/resource-types"/>
      <code value="Consent"/>
      <display value="Consent"/>
    </type>
    <detail>
      <type value="urn:ihe:iti:xua:2012:acp"/>
      <valueString value="urn:oid:1.2.3.4"/>
    </detail>
    <detail>
      <type value="urn:oasis:names:tc:xacml:2.0:resource:resource-id"/>
      <valueString value="500000000^^^&amp;2.16.840.1.113883.3.333&amp;ISO"/>
    </detail>
  </entity>
</AuditEvent>