Difference between revisions of "SMART Usage"

From Hiasobi - FHIR
Jump to: navigation, search
(Parameters - id_token)
Line 1: Line 1:
 
  
  
  
 
==Parameters - '''id_token'''==
 
==Parameters - '''id_token'''==
* verified user claim
+
* user claim details
 
* id_token contains a JWT (JSON web token)
 
* id_token contains a JWT (JSON web token)
 
* See:  https://github.com/smart-on-fhir/smart-on-fhir.github.io/blob/master/authorization/smart-on-fhir-jwt-examples.ipynb
 
* See:  https://github.com/smart-on-fhir/smart-on-fhir.github.io/blob/master/authorization/smart-on-fhir-jwt-examples.ipynb
Line 24: Line 23:
 
</pre>
 
</pre>
  
decoded JWT example; this is a signed JWT
+
decoded JWT example; this is a signed JWT with Oridashi certificate
  
 
<pre>
 
<pre>
 
{
 
{
   "iss":"https://localhost:8102",
+
   "iss":"https://localhost.oridashi.com.au:8102",
   "sub":"verified\8003628233355286\1",
+
   "sub":"verified\bp.8003628233355286\1",
 
   "aud":"https://oridashi.com.au/site/apps/smart-index.html",
 
   "aud":"https://oridashi.com.au/site/apps/smart-index.html",
 
   "exp":"1460979592",
 
   "exp":"1460979592",
   "name":"1",
+
   "name":"Frederick Smith",
 
   "profile":"https://localhost:8102/Practitioner/1"
 
   "profile":"https://localhost:8102/Practitioner/1"
 
}
 
}
Line 39: Line 38:
 
"sub" is the subject of the claim globally unique user identifier
 
"sub" is the subject of the claim globally unique user identifier
 
<pre>
 
<pre>
   [verified|unverified|test]\<hpio>\<practitioner id>  
+
   [verified|unverified|test]\[md|bp|zedmed|genie|mt].<site identifer>\<practitioner id>  
 
</pre>
 
</pre>
 +
 +
* [verified|unverified|test] - 'test':samples/test mode; 'verified': by certificate check; 'unverified': asserted site id
 +
* [md|bp|zedmed|genie|mt] - system type identifier
 +
* <site identifier> - either
 +
a) HPIO as entered and validated against installed eHealth certificate
 +
b) Windows domain SID where present
 +
c) Ad-hoc uniquely generated site identifier

Revision as of 17:06, 10 November 2016


Parameters - id_token

 
{
  "access_token":"ZTQyNzVmOTctMGQxYy00NjZmLTgxM2MtNzk4Nzg0OTI0ODIx",
  "token_type":"Bearer",
 "expires_in":"86361",
 "scope":null,
  "state":"28564762",
  "patient":"36",
  "encounter":null,
 "location":null,
  "resource":null,
  "id_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJodHRwczovL2xvY2FsaG9zdDo4MTAyIiwic3ViIjoidGVzdFxcODAwMzYxMDgzMzM0MDg1MFxcMSIsImF1ZCI6Imh0dHBzOi8vb3JpZGFzaGkuY29tLmF1L3NpdGUvYXBwcy9zbWFydC1pbmRleC5odG1sIiwiZXhwIjoiMTQ2MTIwODIyMCJ9.CJxYaBP5K0gJLVZaVhyIYhc1RSqDLrm8coWlNs0AbXOrDhCRWssd7FsBoNDZNwXg8E+uW6XtpTFKSysdqJe55Tb0GKUqlMu1a+EqiApW46tBe5b67j//JkH/qRrdhM7ywZxebVzwgtuIa7EOJ59fqT4DgA6XadRsUP1nzo7OB+tYKLZnXMXGAVwVnFM527Hu4MjWyBExBkF2kPlX5ggu42tNfS+zPM1w3tZKjvnskpCv67F08SzMK0kkjaFeuCdO8fM1gqJnQPjkN36QXA8rUn3z8HsDZ1LJevUwHfOqEKEOaL1/hjKn9rmbE7w3rJs3/S9jB43W3V4V0dacVufBbQ==",
  "refresh_token":null
}

decoded JWT example; this is a signed JWT with Oridashi certificate

{
  "iss":"https://localhost.oridashi.com.au:8102",
  "sub":"verified\bp.8003628233355286\1",
  "aud":"https://oridashi.com.au/site/apps/smart-index.html",
  "exp":"1460979592",
  "name":"Frederick Smith",
  "profile":"https://localhost:8102/Practitioner/1"
}

"sub" is the subject of the claim globally unique user identifier

  [verified|unverified|test]\[md|bp|zedmed|genie|mt].<site identifer>\<practitioner id> 
  • [verified|unverified|test] - 'test':samples/test mode; 'verified': by certificate check; 'unverified': asserted site id
  • [md|bp|zedmed|genie|mt] - system type identifier
  • <site identifier> - either
a) HPIO as entered and validated against installed eHealth certificate
b) Windows domain SID where present
c) Ad-hoc uniquely generated site identifier