Verifiable Health Link
0.0.2-current - ci-build
Verifiable Health Link, published by IHE IT Infrastructure Technical Committee. This guide is not an authorized publication; it is the continuous build for version 0.0.2-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/IHE/ITI.VHL/ and changes regularly. See the Directory of published versions
Contents:
This page provides a list of the FHIR artifacts defined as part of this implementation guide.
The following artifacts define the types of individuals and/or systems that will interact as part of the use cases covered by this implementation guide.
| Trust Anchor |
An authorized organization in the trust framework that manages and distributes PKI material—such as public key certificates and revocation lists—to participants in the network. It ensures that this material is trustworthy and available, enabling VHL Sharers and VHL Receivers to verify digital signatures and authenticate the origin of shared data. |
| VHL Holder |
An individual—typically the patient or their delegate—who possesses a Verified Health Link (VHL), a signed data artifact that enables a VHL Receiver to verify its authenticity and access one or more health documents made available by a VHL Sharer. |
| VHL Receiver |
A system or organization that receives a Verified Health Link (VHL) from a VHL Holder and uses it to retrieve health documents from a VHL Sharer, after verifying the authenticity and integrity of the VHL. |
| VHL Sharer |
The VHL Sharer generates a VHL, provides the VHL to a VHL Holder, and responds to requests from a VHL Sharer to utilize the VHL. |
The following artifacts describe the specific requirements to be met by systems compliant with the implementation guide.
| Audit Event - Accessed Health Data |
Purpose: Description:
|
| Audit Event - Received Health Data |
Purpose: Description:
|
| Create Secure Channel |
The VHL Sharer and VHL Receiver SHALL jointly establish a secure connection prior to executing any Verified Health Link (VHL) transactions involving the exchange of sensitive data. This requirement is satisfied by implementing secure channel establishment as defined in the Audit Trail and Node Authentication (ATNA) Profile, specifically through the Authenticate Node [ITI-19] transaction. This requirement entails:
Establishing this secure channel ensures confidentiality, integrity, and bilateral authentication of all subsequent communications, and fulfills the trust obligations defined in the Establish Trust requirement. |
| Establish Trust |
Before participating in any Verified Health Link (VHL) transactions, the VHL Sharer and VHL Receiver SHALL establish a trust relationship based on shared acceptance of a designated Trust Anchor. Trust is established by referencing and accepting public key material published and distributed in accordance with this specification ( via Retrieve Trust List Response). All participants MUST validate digital signatures using keys that are anchored in the agreed trust framework. |
| Generate a VHL Authorization Mechanism Based on Query Parameters |
The VHL Sharer SHALL generate a Verified Health Link (VHL) to be issued to a VHL Holder. The Sharer SHALL conduct all necessary tasks to prepare the content referenced by the VHL. These tasks MAY be further defined by applicable content profiles or implementation guides, and MAY include:
Once content preparation is complete, the Sharer SHALL construct the VHL payload and sign it to produce a cryptographically verifiable authorization mechanism. Optional behaviors:
|
| Initiate Retrieve Trust List Request |
A VHL Sharer or VHL Receiver, as a participant in the trust network, SHALL be capable of retrieving public key infrastructure (PKI) material from a designated Trust Anchor. The retrieved material MAY include:
Participants SHOULD cache the received trust list to reduce network and server load. Preconditions:
|
| Initiate Submit PKI Material Request |
When a VHL Sharer or VHL Receiver generates a new public-private key pair for use within the VHL trust network, they SHALL submit the corresponding public key material to the Trust Anchor for validation and inclusion in the trust list. The submission MAY include metadata to support categorization of key usage (e.g., digital signatures, encryption, secure channels) and business or operational context. |
| Provide VHL |
The Provide VHL transaction enables a VHL Holder to transmit a Verified Health Link (VHL) to a VHL Receiver. The VHL serves as a signed authorization mechanism that allows the Receiver to subsequently retrieve one or more health documents from a VHL Sharer. Depending on the use case, the VHL MAY be rendered or transmitted using formats such as QR code or deep link (HTTPS URL). |
| Receive Trust List |
A VHL Sharer or VHL Receiver, after receiving PKI material from a Trust Anchor, SHALL validate and process the trust information for subsequent cryptographic operations. Participants SHOULD:
|
| Receive VHL authorization mechanism |
The VHL Receiver SHALL be capable of receiving a Verified Health Link (VHL) from a VHL Holder through a supported transport mechanism (e.g., QR code scan, direct URL, or digital message). Upon receipt, the Receiver SHALL:
Receipt of the VHL may occur through direct user interaction (e.g., scanning a QR code) or automated channels, depending on the implementation context. |
| Record Access to Health Data |
The VHL Sharer MAY record audit events when health data is accessed through a Verified Health Link (VHL). These events support accountability, traceability, and compliance with applicable security and privacy regulations. Audit records MAY include the following metadata:
Audit events SHALL be represented using the FHIR |
| Record Consent |
The VHL Sharer SHALL record the consent granted by a VHL Holder to authorize the sharing of their health data via a Verified Health Link (VHL). This consent confirms that the Holder agrees to the creation of a VHL and its use by authorized VHL Receivers to access specific health documents. In this requirement, the VHL Sharer acts as a Consent Recorder, as defined in the Privacy Consent on FHIR (PCF) profile. Specifically, the Sharer SHALL initiate the Access Consent - ITI-108 transaction to formally capture the Holder's consent. The ITI-108 transaction SHOULD be invoked as part of the actions triggered by a Generate VHL request, particularly when legal, jurisdictional, or organizational policy requires explicit, recorded consent prior to enabling document sharing. This requirement enables lawful, transparent sharing of personal health information across organizations and trust domains. |
| Request VHL Document |
The VHL Receiver SHALL initiate a request to retrieve a single health document from a VHL Sharer, using a previously received and validated Verified Health Link (VHL). This transaction SHALL be conducted over a secure channel. Both the Receiver and Sharer SHALL validate each other's participation in the trust network using PKI material published by the Trust Anchor. Optional behaviors:
|
| Request VHL Documents |
The VHL Receiver SHALL initiate a request to retrieve a set of health documents from a VHL Sharer, using a previously received and validated Verified Health Link (VHL). Both the Receiver and Sharer SHALL validate each other's participation in the trust network using PKI material published by the Trust Anchor. Optional behaviors:
|
| Request that a VHL authorization mechanism be issued |
A VHL Holder initiates a request to a VHL Sharer to generate a Verified Health Link (VHL) that references one or more health documents. The resulting VHL allows the Holder to subsequently share access to those documents with a VHL Receiver. The Holder MAY include optional parameters to constrain or protect the issued VHL-such as defining an expiration period, scoping which documents are included, or requiring a passcode for retrieval. These parameters guide the Sharer's issuance of the VHL and influence the conditions under which the associated documents may be accessed. Preconditions:
|
| Respond to Submit PKI Material Request |
Upon receipt of public key material from a VHL Sharer or VHL Receiver, the Trust Anchor SHALL validate, organize, sign, and expose the PKI material as part of a trusted, canonical trust list. |
| Retrieve Trust List Response |
Upon receipt of Retrieve Trust List Request from a VHL Sharer or VHL Receiver, the Trust Anchor SHALL organize, sign, and expose the PKI material as part of a trusted, canonical trust list. This MAY include:
The Trust Anchor SHALL only respond with validated and trustworthy material in accordance with the governance policies of the VHL trust framework. This signed trust list enables all participants in the VHL trust network to verify digital signatures and establish secure connections in accordance with the governance policies of the Trust Anchor. Upon receipt of this response, participants SHALL process the trust list as described in Receive Trust List. |
| Verify Document Signature |
The VHL Receiver, upon receiving a digitally signed health document from a VHL Sharer, MAY verify the document's digital signature using previously retrieved PKI material. This verification process confirms the authenticity, integrity, and provenance of the document independently of the Verified Health Link (VHL) itself. The public key used for this verification MAY:
Implementers SHOULD consult cross-profile guidance regarding interoperability with the IHE Document Digital Signature (DSG) profile, particularly in cases where additional attestation, long-term non-repudiation, or multi-party signatures are involved. |
The following artifacts define the specific capabilities that different types of systems are expected to have in order to comply with this implementation guide. Systems conforming to this implementation guide are expected to declare conformance to one or more of the following capability statements.
| Trust Anchor |
CapabilityStatement for Trust Anchor Actor in the IHE IT Infrastructure Technical Framework Supplement IHE VHL. An authorized organization in the trust framework that manages and distributes PKI material—such as public key certificates and revocation lists—to participants in the network. It ensures that this material is trustworthy and available, enabling VHL Sharers and VHL Receivers to verify digital signatures and authenticate the origin of shared data. |
| VHL Receiver Client Capability Statement |
Capability Statement for a VHL Receiver implementing the Retrieve Manifest [ITI-YY5] transaction as a client. This client searches for List resources using VHL-authorized manifest URLs and can request inclusion of DocumentReference resources via the _include parameter. |
| VHL Sharer Server Capability Statement |
Capability Statement for a VHL Sharer implementing the Retrieve Manifest [ITI-YY5] transaction as a server. This server supports FHIR search on List resources with _include parameter to retrieve document manifests authorized by Verified Health Links. |
These are custom operations that can be supported by and/or invoked by systems conforming to this implementation guide.
| Generate VHL |
This operation generates a QR code containing a Verifiable Health Link (VHL) for transmission or display. Input Parameters:
Output Generation:
|
These test plans are available to verify test coverage for this implementation guide
| Integration Test Plan – QR Code Generation and Validation Flow |
Integration test plan for the QR Code Generation and Validation Flow of the IHE ITI Verifiable Health Links (VHL) profile. Scope: validates multi-actor, cross-transaction scenarios that span ITI-YY3 (Generate VHL), ITI-YY4 (Provide VHL), and ITI-YY5 (Retrieve Manifest). Tests verify that the QR code generated in YY3 can be decoded in YY4, that the decoded SHL payload's manifest URL is used correctly in YY5, and that the full end-to-end pipeline including passcode handling, signature verification, and VHL authorization succeeds. Actors exercised: VHL Holder, VHL Sharer, VHL Receiver. |
| Integration Test Plan – Trust Establishment |
Integration test plan for the Trust Establishment workflow of the IHE ITI Verifiable Health Links (VHL) profile. Scope: validates multi-actor, cross-transaction scenarios that span ITI-YY1 (Submit PKI Material) and ITI-YY2 (Retrieve Trust List) and cannot be covered by unit tests. Tests verify that a DID Document submitted in YY1 is subsequently retrievable via YY2 in the same session, that both the VHL Sharer and VHL Receiver can retrieve peer keys, that a full round-trip signature verification succeeds, and that revocation propagates correctly across actors. Actors exercised: VHL Sharer, Trust Anchor, VHL Receiver. |
| Test Plan – Trust Anchor |
Unit test plan for the Trust Anchor actor of the IHE ITI Verifiable Health Links (VHL) profile. Scope: validates all behaviour expected of a Trust Anchor as described in ITI-YY1 (responder) and ITI-YY2 (responder). Each test suite (testCase) corresponds to one transaction and exercises three atomic feature files: message semantics (shared), responder expected actions, and security considerations. |
| Test Plan – VHL Receiver |
Unit test plan for the VHL Receiver actor of the IHE ITI Verifiable Health Links (VHL) profile. Scope: validates all behaviour expected of a VHL Receiver across its four transactions: submitting its own PKI material (ITI-YY1 initiator), retrieving the trust list (ITI-YY2 initiator), decoding and validating a VHL QR code (ITI-YY4 responder), and requesting the document manifest (ITI-YY5 initiator). Each test suite exercises three atomic feature files. |
| Test Plan – VHL Sharer |
Unit test plan for the VHL Sharer actor of the IHE ITI Verifiable Health Links (VHL) profile. Scope: validates all behaviour expected of a VHL Sharer across its four transactions: submitting its own PKI material (ITI-YY1 initiator), retrieving the trust list to obtain peer keys (ITI-YY2 initiator), generating VHLs on demand (ITI-YY3 responder), and serving document manifests to authorised VHL Receivers (ITI-YY5 responder). Each test suite corresponds to one transaction and exercises three atomic feature files. |
These define groups of interrelated examples that demonstrate one or more of the workflows supported by this implementation guide.
| UseCaseEVAC |
| UseCaseGDHCN |
| UseCaseHajjPilgrimage |
| UseCasePH4H |
| UseCaseTEFCA |