|
·ÖÀർº½ |
 |
|
|
|
IHE_ITI_TF_White_Paper_CrossEnt_User_Authentication_PC |
|
×ÊÔ´´óС£º111.09 KB |
×ÊÔ´ÀàÐÍ£ºÎĵµ |
ÏÂÔØ»ý·Ö£º 0 |
|
|
|
×ÊÔ´½éÉÜ |
|
Contents
1 Introduction............................................................................................................................ 4
2 Background............................................................................................................................ 5
2.1 Identity Enabled Services ................................................................................................ 5
2.2 SAML Assertion.............................................................................................................. 6
30 3 Healthcare Use cases ............................................................................................................. 7
3.1 Assumptions .................................................................................................................... 7
3.2 Use Case Categories......................................................................................................... 8
3.2.1 User Authentication (0a/b/c)...............................................................................................................................8
3.2.2 HL7 Export/Import (1a).......................................................................................................................................8
35 3.2.3 HL7 Query (1b)..................................................................................................................................................... 9
3.2.4 DICOM Export/Import (2a) ................................................................................................................................9
3.2.5 DICOM Query (2b) ..............................................................................................................................................9
3.2.6 XDS ¨C Provide and Register (3).........................................................................................................................9
3.2.7 XDS ¨C Register (4) ..............................................................................................................................................9
40 3.2.8 XDS ¨C Query (5) ................................................................................................................................................. 10
3.2.9 XDS ¨C Retrieve (HTTP Get ¨C Application) (6)............................................................................................. 10
3.2.10 RID ¨C Display (HTTP Get ¨C Browser) (7) ................................................................................................ 10
3.2.11 Sue views note (XDS) (5, 6, 7).................................................................................................................... 10
4 Actors / Transactions ........................................................................................................... 11
45 4.1 Example EHR with XDS and XUA grouping................................................................. 11
4.2 XUA Integration Profile Process Flow........................................................................... 12
4.2.1 Post-Generated Assertion.................................................................................................................................. 13
4.2.2 Pre-Generated Assertion.................................................................................................................................... 14
4.2.3 XDS Provide and Register Delegation Model............................................................................................... 15
50 4.3 Access Controls.............................................................................................................. 15
4.4 Audit Logs ..................................................................................................................... 16
5 Guidance............................................................................................................................... 17
5.1 Trust Relationship......................................................................................................... 17
5.2 Assertion Content.......................................................................................................... 17
55 5.3 Enhanced Client or Proxy Profile .................................................................................. 18
5.4 Web SSO Profile............................................................................................................ 18
5.5 Web Services Profile ...................................................................................................... 18
5.6 HL7 Profile .................................................................................................................... 19
5.7 DICOM Profile .............................................................................................................. 19
60 6 Conclusion............................................................................................................................ 20
7 GLOSSARY.......................................................................................................................... 21
8 Referenced Standard............................................................................................................ 22
IHE ITI White Paper Cross-Enterprise User Authentication
______________________________________________________________________________
__________________________________________________________________________
Rev. 2.0: PC ¨C 2006-08-15 3 Copyright © 2006: ACC/HIMSS/RSNA
OPEN ISSUES:............................................................................................................................ 24 |
|
ÏÂÔØµØÖ· |
|
|
|
|
|