Basic Audit Log Patterns (BALP)
1.1.4-current - ci-build
Basic Audit Log Patterns (BALP), published by IHE IT Infrastructure Technical Committee. This guide is not an authorized publication; it is the continuous build for version 1.1.4-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/qligier/ITI.BasicAudit/ and changes regularly. See the Directory of published versions
{
"resourceType" : "AuditEvent",
"id" : "ex-auditPoke-SAML-QDI-Comp",
"meta" : {
"profile" : [
🔗 "https://profiles.ihe.net/ITI/BALP/StructureDefinition/IHE.BasicAudit.SAMLaccessTokenUse.Comprehensive"
],
"security" : [
{
"system" : "http://terminology.hl7.org/CodeSystem/v3-ActReason",
"code" : "HTEST"
}
]
},
"text" : {
"status" : "extensions",
"div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: AuditEvent ex-auditPoke-SAML-QDI-Comp</b></p><a name=\"ex-auditPoke-SAML-QDI-Comp\"> </a><a name=\"hcex-auditPoke-SAML-QDI-Comp\"> </a><a name=\"ex-auditPoke-SAML-QDI-Comp-en-US\"> </a><p><b>type</b>: <a href=\"http://hl7.org/fhir/R4/codesystem-dicom-dcim.html#dicom-dcim-110100\">DICOM 110100</a>: Application Activity</p><p><b>subtype</b>: unknown poke: Boredom poke</p><p><b>action</b>: Read/View/Print</p><p><b>recorded</b>: 2021-12-03 09:49:00+0000</p><p><b>outcome</b>: Success</p><blockquote><p><b>agent</b></p><p><b>AuditEvent.agent Assurance Level</b>: <span title=\"Codes:{urn:oasis:names:tc:SAML:2.0:ac:classes X509}\">X509</span></p><p><b>AuditEvent.agent other identifiers</b>: SAML subject-id/Karl S Skagerberg</p><p><b>type</b>: <span title=\"Codes:{http://terminology.hl7.org/CodeSystem/v3-ParticipationType IRCP}, {https://profiles.ihe.net/ITI/BALP/CodeSystem/UserAgentTypes UserSamlAgent}\">information recipient</span></p><p><b>role</b>: <span title=\"Codes:{urn:oid:2.16.840.1.113883.6.96 307969004}\">Public health officier</span></p><p><b>who</b>: Identifier: <code>ldap:///CN%3DSAML%20User%2COU%3DHarris%2CO%3DHITS%2CL%3DMelbourne%2CST%3DFL%2CC%3DUS</code>/UID=kskagerb</p><p><b>requestor</b>: true</p><p><b>policy</b>: _d87f8adf-711a-4545-bf77-ff8517b498e4</p><p><b>purposeOfUse</b>: <span title=\"Codes:{urn:oid:2.16.840.1.113883.3.18.7.1 PUBLICHEALTH}\">Uses and disclosures for public health activities.</span></p></blockquote><blockquote><p><b>agent</b></p><p><b>type</b>: <span title=\"Codes:{http://terminology.hl7.org/CodeSystem/v3-RoleClass PROV}\">healthcare provider</span></p><p><b>who</b>: connectred5.fedsconnect.org (Identifier: urn:oid:2.16.840.1.113883.3.333)</p><p><b>requestor</b>: false</p></blockquote><h3>Sources</h3><table class=\"grid\"><tr><td style=\"display: none\">-</td><td><b>Site</b></td><td><b>Observer</b></td><td><b>Type</b></td></tr><tr><td style=\"display: none\">*</td><td>server.example.com</td><td><a href=\"Device-ex-device.html\">Device</a></td><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-security-source-type.html#security-source-type-4\">Audit Event Source Type 4</a>: Application Server</td></tr></table><blockquote><p><b>entity</b></p><p><b>what</b>: Identifier: urn:oid:1.2.3.4.123456789</p><p><b>type</b>: <a href=\"http://hl7.org/fhir/R4/codesystem-resource-types.html#resource-types-Consent\">ResourceType Consent</a>: Consent</p><blockquote><p><b>detail</b></p><p><b>type</b>: urn:ihe:iti:xua:2012:acp</p><p><b>value</b>: urn:oid:1.2.3.4</p></blockquote><blockquote><p><b>detail</b></p><p><b>type</b>: urn:oasis:names:tc:xacml:2.0:resource:resource-id</p><p><b>value</b>: 500000000^^^&amp;2.16.840.1.113883.3.333&amp;ISO</p></blockquote></blockquote></div>"
},
"type" : {
"system" : "http://dicom.nema.org/resources/ontology/DCM",
"code" : "110100",
"display" : "Application Activity"
},
"subtype" : [
{
"system" : "urn:ietf:rfc:1438",
"code" : "poke",
"display" : "Boredom poke"
}
],
"action" : "R",
"recorded" : "2021-12-03T09:49:00.000Z",
"outcome" : "0",
"agent" : [
{
"extension" : [
{
"url" : "https://profiles.ihe.net/ITI/BALP/StructureDefinition/ihe-assuranceLevel",
"valueCodeableConcept" : {
"coding" : [
{
"system" : "urn:oasis:names:tc:SAML:2.0:ac:classes",
"code" : "X509"
}
]
}
},
{
"url" : "https://profiles.ihe.net/ITI/BALP/StructureDefinition/ihe-otherId",
"valueIdentifier" : {
"type" : {
"coding" : [
{
"system" : "https://profiles.ihe.net/ITI/BALP/CodeSystem/OtherIdentifierTypes",
"code" : "SAML-subject-id"
}
]
},
"value" : "Karl S Skagerberg"
}
}
],
"type" : {
"coding" : [
{
"system" : "http://terminology.hl7.org/CodeSystem/v3-ParticipationType",
"code" : "IRCP",
"display" : "information recipient"
},
{
"system" : "https://profiles.ihe.net/ITI/BALP/CodeSystem/UserAgentTypes",
"code" : "UserSamlAgent"
}
]
},
"role" : [
{
"coding" : [
{
"system" : "urn:oid:2.16.840.1.113883.6.96",
"code" : "307969004",
"display" : "Public health officier"
}
]
}
],
"who" : {
"identifier" : {
"system" : "ldap:///CN%3DSAML%20User%2COU%3DHarris%2CO%3DHITS%2CL%3DMelbourne%2CST%3DFL%2CC%3DUS",
"value" : "UID=kskagerb"
}
},
"requestor" : true,
"policy" : [
"_d87f8adf-711a-4545-bf77-ff8517b498e4"
],
"purposeOfUse" : [
{
"coding" : [
{
"system" : "urn:oid:2.16.840.1.113883.3.18.7.1",
"code" : "PUBLICHEALTH",
"display" : "Uses and disclosures for public health activities."
}
]
}
]
},
{
"type" : {
"coding" : [
{
"system" : "http://terminology.hl7.org/CodeSystem/v3-RoleClass",
"code" : "PROV",
"display" : "healthcare provider"
}
]
},
"who" : {
"identifier" : {
"value" : "urn:oid:2.16.840.1.113883.3.333"
},
"display" : "connectred5.fedsconnect.org"
},
"requestor" : false
}
],
"source" : {
"site" : "server.example.com",
"observer" : {
🔗 "reference" : "Device/ex-device"
},
"type" : [
{
"system" : "http://terminology.hl7.org/CodeSystem/security-source-type",
"code" : "4",
"display" : "Application Server"
}
]
},
"entity" : [
{
"what" : {
"identifier" : {
"value" : "urn:oid:1.2.3.4.123456789"
}
},
"type" : {
"system" : "http://hl7.org/fhir/resource-types",
"code" : "Consent",
"display" : "Consent"
},
"detail" : [
{
"type" : "urn:ihe:iti:xua:2012:acp",
"valueString" : "urn:oid:1.2.3.4"
},
{
"type" : "urn:oasis:names:tc:xacml:2.0:resource:resource-id",
"valueString" : "500000000^^^&2.16.840.1.113883.3.333&ISO"
}
]
}
]
}