EHMI Addressing Service (EAS)
1.0.0 - release
EHMI Addressing Service (EAS), published by MedCom. This guide is not an authorized publication; it is the continuous build for version 1.0.0 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/medcomdk/dk-ehmi-eas/ and changes regularly. See the Directory of published versions
Disclaimer:
The security architecture is described in Danish in this document:
"Sikkerhedsarkitektur EHMI services v 0.98"*
For developers, parts of the security architecture is described in english
and is outlined here on this page for EHMI Delivery Status (EDS).
However - if the true interpretation of the security architecture comes to discussion,
the Danish original is the true source of this interpretation.
In other words the Danish original and the meaning in Danish will
be the foundation of the interpretation.
Through the EHMI Addressing Service (EAS), sender systems can search for potential message recipients based on various search criteria.
In communication with EAS, personally identifiable information may be included, such as a citizen’s general practitioner (which can be looked up using the citizen’s CPR number). However, no sensitive personal data is involved. Consequently, it has been decided that access to EAS can occur at the system level and does not require the authenticated identity of the human user behind the call to be transmitted to EAS.
EAS does not store data itself but aggregates address information from various authoritative sources (including the EHMI Endpoint Register, EER). Thus, EAS solely provides an interface for performing searches and lookups.
Sender systems are enrolled as system clients using the elements described in section 3.3 (Client Enrollment) of the general ‘Sikkerhedsmodel’, where the following scope element is specified:
EAS system/Organization.rs |
Metadata for an EAS System Client
No additional metadata needs to be specified beyond what is described in section 3.3.1 (Metadata for Clients) of the general ‘Sikkerhedsmodel’.
Example metadata document for an EAS system client:
{
"token_endpoint_auth_method": "tls_client_auth",
"grant_types": [
"client_credentials"
],
"client_name": "Aarhus Kommunes EOJ",
"scope": "EAS system/Organization.rs",
"contacts": [
"eoj@aarhus-kommune.dk",
],
"tls_client_auth_subject_dn": "subject=CN=EOJ leverandør XYZ’s systemcertifikat, serialNumber=UI:DK-O:G: d6eef4ae-5c37-4206-be4c-5fac2cbca29d, O=EOJ leverandør XYZ, organizationIdentifier=NTRDK-56781234, C=DK"
}
To obtain an access token for accessing EAS, the following scopes are specified:
Scope | Description |
---|---|
EAS | Indicates that the client is requesting an access token for EAS. |
system/Organization.rs | Specifies that the token should enable reading/searching for health addressing resources (profiled FHIR Organization resources). |
Validation of Calls at the Authorization Server
The call to the Token Endpoint is validated by the Authorization Server, which verifies the client’s TLS client certificate and checks that the client is enrolled/whitelisted with the specified scopes.
Calls to EAS are made as described in the general security model, using REST calls over mutual TLS (two-way TLS), with the access token (which is sender-constrained) included in an HTTP header.
Below is an example of a system client calling an EAS operation that returns the general practitioner (‘egen læge’) for a patient (who is in health insurance group (sygesikringsgruppe) 1):
POST /base/$getSikrGrp1_getReceivingOrganizationByPatientId HTTP/1.1
Host: eas.sundhedsdatastyrlsen.dk
Accept: application/fhir+json
Content-Type: application/fhir+json
Content-Length: 9191
Authorization: Bearer eyJhb ... Dhi6g
{
"parameter": [
{
"name": "target",
"resource": {
"resourceType": "Patient",
// Patient resource
}
}
]
}
EAS Access Control
The EHMI Addressing Service (EAS) verifies that the access token is valid and validates the “sender-constrained” property. This means it checks that the TLS client certificate used by the client matches the certificate embedded in the access token.
Additionally, the service validates that the token: