- Created by Sandy Vance, last modified by Julie Maas on Jul 21, 2021
Short Description | This track tests scalable ecosystem trust models used by FAST, Carequality, CARIN, and others. Focus is on security and privacy, including client app registration, authentication and authorization for cross-organization query, endpoint validation, and simple federated identity through reusable credentials. | ||||||||||||||||
Long Description |
| ||||||||||||||||
Type | Test a FHIR-associated specification | ||||||||||||||||
Submitting Work Group/Project/Accelerator/Affiliate/Implementer Group | Security Workgroup | ||||||||||||||||
Track Lead(s) | Julie Maas | ||||||||||||||||
Track Lead Email(s) | julie@emrdirect.com | ||||||||||||||||
Related Tracks |
| ||||||||||||||||
FHIR Version | This track is not FHIR version specific. | ||||||||||||||||
Specification(s) this track uses | Security for Scalable Registration, Authentication, and Authorization v0.9.0 UDAP Implementation Guide for Registration and Authorization of Business-to-Business Health Apps UDAP Implementation Guide for Registration and Authorization of Consumer Facing Health Apps
Related Implementation Guides:
| ||||||||||||||||
Artifacts of focus |
| ||||||||||||||||
Expected participants | Arcweb Technologies | ||||||||||||||||
Zulip stream | NOTE: These are both new streams for this connectathon & related IG work, that we'll use moving forward. | ||||||||||||||||
Track Details | System roles: UDAP-enabled client, UDAP-enabled server, UDAP-enabled identity provider ←This public "UDAP Implementers" Google sheet is continuously available and contains a tab for UDAP adoption "Beyond Sandbox Use" too; please add your own information there to encourage cross-testing! UDAP-enabled clients are capable of trusted dynamic registration and JWT-based authentication and optionally Tiered OAuth and Server Metadata UDAP-enabled servers are capable of trusted dynamic registration and JWT-based authentication and optionally Tiered OAuth and Server Metadata UDAP-enabled identity providers are capable of the IdP side of Tiered OAuth, including other client and server components as above Scenarios 1. Trusted Dynamic Registration & JWT-Based Authentication (Consumer Facing) This scenario tests the ONC FHIR at Scale Taskforce (FAST) Security solution for user-facing apps Precondition: Client has user-level credentials for FHIR server and client's UDAP certificate is trusted Action: Client app registers, authenticates user, and requests FHIR data Success Criteria: Client app successfully registers, authenticates user, and obtains FHIR data. Client should validate server metadata per UDAP Server Metadata profile. Bonus point: Client and server use Tiered OAuth to authenticate user with trusted OpenID account from a third party instead of credential provisioning native to FHIR server Bonus point: Include (on server side) and validate (within clients) signed endpoints Bonus point: Multi Factor Authentication 2. Trusted Dynamic Registration & JWT-Based Authentication (B2B) This scenario tests the ONC FHIR at Scale Taskforce (FAST) Security solution for business-to-business apps Precondition: Client's UDAP certificate is trusted Action: Client app registers, authenticates, and requests FHIR data Success Criteria: Client app successfully registers, authenticates, and obtains FHIR data leveraging a trusted certificate. Client should validate server metadata per UDAP Server Metadata profile. Bonus point: Client and server use Tiered OAuth to authenticate user Bonus point: Authenticated Client performs a $match request and server responds to the request Bonus point: Include the Carequality FHIR IG Authorization Extension Object in your requests (clients) and process these objects (servers) Bonus point: Include (on server side) and validate (within clients) signed endpoints Bonus point: Multi Factor Authentication 3. Authentication using third party Identity Provider (IdP) via OpenID Connect (OIDC) This scenario tests additional elements specific to ONC FAST Identity solution #3, Networked Identity Management Action:
Preconditions: OAuth server (securing FHIR resources) and client app support UDAP Tiered OAuth Client is registered with OAuth server for authorization_code flow OAuth server (data holder) is registered with IdP for authorization_code flow Success Criteria: Client app can access FHIR resources Bonus points: OAuth server registers dynamically with IdP using UDAP DCR Client app registers dynamically with OAuth server using UDAP DCR Multi Factor Authentication 4. Validation of FHIR endpoint managing organization in multi-tenant environment This scenario tests additional aspects of the ONC FAST Security and Identity solutions Action: Client app validates trust with server endpoint before proceeding to OAuth sign in page per UDAP Server Metadata profile. Server validates trust with client app Flow continues, using information from previous step (happy path: user authenticates and authorizes client app to access FHIR resources)/TBD Precondition: FHIR endpoint certificate advertisement, demonstrating control of key Success Criteria: Client app can access FHIR resources (happy path) Bonus point: Include and validate signed endpoints 5. Patient matching using OpenID Connect account This scenario tests additional aspects of the ONC FAST Security solution and is also related to ONC FAST Identity solution #3 For example, could store as identifier with: e.g. { Action: Search on OpenID subject identifier e.g. GET [base]/Patient?identifier=https://as.example.com/issuer1|1234567 Precondition: The data holder confirmed the binding of an OIDC subject identifier to the person named in a Patient (or equivalently to a Practitioner, Person, or RelatedPerson) resource using a suitable registration process before adding the identifier. Success Criteria: Client app can access FHIR resources for the correct patient linked to the OIDC subject identifier. Bonus point: Use OpenID Connect user profile information to match on patient 6. Vaccine credential trust validation and patient matching Signed vaccination encounter data including associated demographics can be trust validated and its demographic elements used in matching per UDAP Client Certifications & Endorsements. Today, attributes available for matching in this workflow are: name, DOB, identity assurance level (the latter informs what confidence is in the attributes per this SHC valueset). The VCI standard includes identity assurance level as a required meta security tag on an immunization. This workflow is a starting point for discussion of higher assurance matching events involving more required attributes or an interoperable identifier, stronger identity assurance and opportunity to involve the subject (patient) for consent and/or notification. Key questions for further discussion as the IG is written include: -Minimum required demographics for various use cases Security and Privacy Considerations: This track focuses on security and privacy. OAuth (client credentials, authorization code, and dynamic client registration), OpenID Connect, UDAP profiles, and PKI are all in scope. |