|
Type
|
Reference
|
Content
|
|
web
|
github.com
|
SMART Permission Tickets, published by . This guide is not an authorized publication; it is the continuous build for version 0.1.0 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/jmandel/smart-permission-tickets-wip/
and changes regularly. See the Directory of published versions
|
|
web
|
www.rfc-editor.org
|
A Permission Ticket is an issuer-signed, sender-constrained JWT presented to a Data Holder's token endpoint via OAuth 2.0 Token Exchange (RFC 8693)
. It allows a client to redeem a portable authorization grant at any eligible Data Holder within the ticket's audience, without requiring the issuer to know where the subject has received care.
|
|
web
|
www.rfc-editor.org
|
A trusted issuer mints a Permission Ticket and delivers it to the client. The client presents the ticket as a subject_token
in an RFC 8693
token exchange request, authenticating itself with a separate client_assertion
. The Data Holder authenticates the client (standard SMART Backend Services), then validates the ticket: signature, issuer trust, audience, key binding, and access constraints. If valid, it issues an access token scoped to the intersection of requested and ticket-authorized access.
|
|
web
|
www.rfc-editor.org
|
Permission Tickets are presented via OAuth 2.0 Token Exchange (RFC 8693)
. The client authenticates using
SMART Backend Services
conventions (JWT client_assertion
per RFC 7523
) and presents the Permission Ticket as a separate subject_token
parameter. This cleanly separates client authentication
from the authorization grant
: the client_assertion
proves client identity; the subject_token
carries the Permission Ticket.
|
|
web
|
openid.net
|
OpenID Federation 1.0
|
|
web
|
www.udap.org
|
UDAP
|
|
web
|
www.rfc-editor.org
|
A Permission Ticket MAY bind redemption to a specific client key using the cnf
(Confirmation, RFC 7800
) claim:
|
|
web
|
www.rfc-editor.org
|
cnf.jkt
: JWK Thumbprint ( RFC 7638
) of the authorized client's public key
|
|
web
|
www.rfc-editor.org
|
Binding:
When present, PermissionTicket.cnf.jkt
binds redemption to a specific client key via its JWK Thumbprint ( RFC 7638
). Data Holders compute the thumbprint of the client_assertion
signing key and verify it matches. When cnf
is absent, aud
+ client authentication provide the trust boundary.
|