Verifiable Health Link
0.0.2-current - ci-build
Verifiable Health Link, published by IHE IT Infrastructure Technical Committee. This guide is not an authorized publication; it is the continuous build for version 0.0.2-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/IHE/ITI.VHL/ and changes regularly. See the Directory of published versions
The Publish PKI Material transaction enables entities within a trust network—specifically, VHL Sharers and VHL Receivers—to submit their public key material to a designated Trust Anchor. This process facilitates the Trust Anchor’s role in aggregating, validating, and distributing a trusted list of public keys (Trust List) essential for verifying digital signatures and establishing secure communications within the VHL ecosystem.
Actor | Role |
---|---|
VHL Receiver, VHL Sharer | Submit PKI Material |
Trust Anchor | Distribute PKI Material |
When a VHL Sharer or VHL Receiver generates a new public-private key pair for use within the VHL trust network, they SHALL submit the corresponding public key material to the Trust Anchor for validation and inclusion in the trust list.
The submission MAY include metadata to support categorization of key usage (e.g., digital signatures, encryption, mTLS) and business or operational context.
The message semantics and transport mechanism for the submission of public key material to the Trust Anchor SHALL be defined by the implementing jurisdiction of the trust network. The Trust Anchor is responsible for validating, cataloging, and securely redistributing key material as part of the canonical Trust List.
Different submission pathways MAY be defined based on the sensitivity, intended use, or organizational classification of the key material. For example:
All submission mechanisms SHOULD be accompanied by sufficient provenance metadata to support validation by the Trust Anchor. At minimum, this SHOULD include:
Jurisdictions MAY further constrain the permitted submission methods based on policy, threat models, or operational constraints. The Trust Anchor SHOULD reject submissions that do not meet the validation criteria defined within the trust framework.
Upon receipt of public key material from a VHL Sharer or VHL Receiver, the Trust Anchor SHALL validate, organize, sign, and expose the PKI material as part of a trusted, canonical trust list.
This signed trust list enables all participants in the VHL trust network to verify digital signatures and establish secure connections in accordance with the governance policies of the Trust Anchor.
There is no Publish PKI Material Repsonse Message defined in this profile. This is up to the implementing jurisidiction of the Trust Anchor
The secure and verifiable exchange of public key infrastructure (PKI) material is foundational to the operation of a Verified Health Link (VHL) trust network. Any compromise in the integrity, authenticity, or provenance of this material undermines the ability of network participants to verify digital signatures, authenticate service endpoints, or enforce trust relationships.
Accordingly, implementers SHOULD ensure that:
Jurisdictions MAY define additional security controls, such as key size requirements, certificate chaining policies, Certificate Revocation List (CRL) or OCSP usage, offline verification workflows, or restrictions on submission endpoints.
The Trust Anchor SHOULD reject key material that fails to meet the validation requirements established by the trust framework or the implementing jurisdiction.
The Retrieve PKI Material transaction allows both VHL Sharers and VHL Receivers to retrieve trusted cryptographic material from the Trust Anchor. This material includes:
Retrieved material SHALL be used to determine the trustworthiness of VHL artifacts and service endpoints in accordance with the governing trust framework.
Actor | Role |
---|---|
VHL Receiver, VHL Sharer | Request PKI material |
Receive PKI material | |
Trust Anchor | Provide PKI material |
A VHL Sharer or VHL Receiver, as a participant in the trust network, SHALL be capable of requesting public key infrastructure (PKI) material from a designated Trust Anchor.
The retrieved material MAY include:
Participants SHOULD cache the received trust list to reduce network and server load.
Preconditions:
OPTIONS TO DISCUSS:
A Trust Anchor initiates an Retrieve PKI Material Response Message once it has completed, to the extent possible, the expected actions upon receipt of a Retrieve PKI Material Request message.
The Retrieve PKI Material request MAY take one of several forms, depending on the transport and representation models adopted by the content profile. Potential representations include:
The payload SHOULD include sufficient metadata to identify the submitting entity and bind the key material to its intended usage context (e.g., use: "sig", keyOps, x5c chain).
Content profiles SHALL define exact payload constraints, validation rules, and error behaviors.
A VHL Sharer or VHL Receiver, after receiving PKI material from a Trust Anchor, SHALL validate and process the trust information for subsequent cryptographic operations.
Participants SHOULD:
All Retrieve PKI Material interactions SHOULD occur over secure channels using TLS 1.2 or higher, with mTLS recommended for enhanced endpoint authentication. The Trust Anchor SHOULD validate the authenticity, scope, and expiration of all retrieved key material before publishing or caching.
Clients (e.g., VHL Receivers and VHL Sharers) SHOULD verify the signature chain or integrity envelope of the material prior to using it for signature verification or secure session establishment.
Implementers SHOULD ensure that any out-of-band trust anchors or directory sources (e.g., .well-known/ endpoints) are tamper-resistant and publicly resolvable.
Content profiles MAY define additional constraints, such as:
The Issue Verifiable Health Link transaction returns a Verifiable Health Link authorization mechanism which can be used to provide access to one or more documents. A VHL Holder initiates the Issue VHL transaction against a VHL Sharer.
Actor | Role |
---|---|
VHL Holder | Request that a VHL authorization mechanism be issued |
Receive VHL authorization mechanism | |
VHL Sharer | Generate a VHL Authorization Mechanism Based on Query Parameters |
A VHL Holder initiates a request to a VHL Sharer to generate a Verified Health Link (VHL) that references one or more health documents. The resulting VHL allows the Holder to subsequently share access to those documents with a VHL Receiver. The Holder MAY include optional parameters to constrain or protect the issued VHL-such as defining an expiration period, scoping which documents are included, or requiring a passcode for retrieval. These parameters guide the Sharer's issuance of the VHL and influence the conditions under which the associated documents may be accessed.
Preconditions:
None defined. Up to a content profile to define.
The VHL Sharer SHALL generate a Verified Health Link (VHL) to be issued to a VHL Holder.
The Sharer SHALL conduct all necessary tasks to prepare the content referenced by the VHL. These tasks MAY be further defined by applicable content profiles or implementation guides, and MAY include:
Once content preparation is complete, the Sharer SHALL construct the VHL payload and sign it to produce a cryptographically verifiable authorization mechanism.
Optional behaviors:
A VHL Sharer initiates an Issue Verifiable Health Link Response Message once it has completed, to the extent possible, the expected actions upon receipt of a Issue Verifiable Health Link Request message, as specified by an appropriate content profile.
None defined. Up to a content profile to define.
The VHL Receiver SHALL be capable of receiving a Verified Health Link (VHL) from a VHL Holder through a supported transport mechanism (e.g., QR code scan, direct URL, or digital message).
Upon receipt, the Receiver SHALL:
Receipt of the VHL may occur through direct user interaction (e.g., scanning a QR code) or automated channels, depending on the implementation context.
Depends on the content profile.