CH EPR mHealth (R4)
3.0.0-ballot - ballot
This page is part of the CH EPR mHealth (R4) (v3.0.0-ballot: Draft Ballot 1) based on FHIR R4. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions
This section describes the national extension for the Swiss EPR to the Get Access Token [ITI-71] transaction defined in the IUA profile published in the IHE IT Infrastructure Technical Framework Trial Implementation “Internet User Authorization”. In this transaction, the OAuth Authorization Code grant type option is enforced for security reasons.
The transaction is used by an mHealth App to pass claims to the IUA Authorization Server and to retrieve access token to be used for authorization of the apps access to write data to and retrieve data from the Swiss EPR.
Depending on the claims made by the mHealth App, two different flavors of access tokens are provided by the IUA Authorization Server:
An mHealth App in the SMART Standalone Launch sequence SHALL perform the transaction first to get basic access to the Swiss EPR. This requires user authentication as well as the user consent, allowing the mHealth App to access the Swiss EPR and perform transactions on behalf of the user. The IUA Authorization Server SHALL present a User Interface for the user to authenticate and provide user consent, or by validating against data stored at app registration time.
Once the mHealth App is authorized, it may launch other embedded mHealth Apps (or views) using the SMART EHR Launch Sequence. In this case, the embedded app inherits the basic access authorization from the launching app1 and may retrieve extended access token for EPR endpoints protected by the EPR role and attribute based authorization (e.g. to retrieve documents).
1By claiming a launch indicator, the launch is indicated as a SMART EHR Launch, initiated from an app, which has already been authorized before.
Actor: IUA Authorization Client
Role: Communicates launch information and claims to the IUA Authorization Server and receives JWT access token or XUA Authorization Assertion.
Actor: IUA Authorization Server
Role: Verifies claims and authentication information, retrieves and validates the user consent for the mHealth App to act on behalf of the user 2 and responds a JWT or XUA compliant access token to the IUA Authorization Client.
2E.g. by presenting a screen for the user to give consent.
This national extension does not reference additional standards to the standards referenced in the Get Access Token [ITI-71] transaction of the IUA Trial Implementation.
OAuth 2.1 authorization code grant flow of the of the IUA Get Access Token transaction:
Step | Parameter | Opt (Basic/ Extended). | Reference | Remark |
---|---|---|---|---|
The mHealth App sends a HTTP GET request to the IUA Authorization Server endpoint. | response_type | R | IUA | The value must be code. |
client_id | R | IUA | The ID, the client is registered at the IUA Authorization Server. | |
redirect_uri | R | IUA / SMART on FHIR | Used as callback URL, the IUA Authorization Server will send the authorization code to. The URL SHALL match one of the client’s pre-registered redirect URIs. | |
state | R | IUA | An unguessable value used by the client to track the state between the authorization request and the callback. | |
scope | R | IUA / SMART on FHIR | Attributes the app claims (see detailed description below). | |
aud | R | SMART on FHIR | The audience URL the token will be used for. | |
launch | O/R | SMART on FHIR | If present, the launch parameter indicates that the app (or the view) was launched from an EHR or mHealth App context which has already been authorized to access the Swiss EPR (e.g. SMART on FHIR based primary system). | |
code_challenge | R | IUA | Transformed version of code_verifier with code_challenge_method | |
code_challenge_method | R | IUA | SHALL be “S256”. | |
The Authorization Server performs a HTTP GET on the callback URL (redirect_uri) conveying the authorization code. | code | R | IUA | The authorization code generated by the Authorization Server. |
state | R | IUA | The unguessable value used by the client to track the state between the authorization request and the callback. | |
The app performs an HTTP POST with parameter | client_id | R | IUA | The ID the client is registered at the IUA Authorization Server. |
as a form-encoded HTTP entity body, passing its | redirect_uri | R | IUA | The URI to redirect the apps user agent to. |
client_id and client_secret as an HTTP Basic authorization header. | grant_type | R | IUA | Value shall be “authorization_code”. |
code | R | IUA | The authorization code. | |
code_verifier | R | IUA | The original code verifier string. | |
The Authorization Server responds with the access token in the HTML body element. | access_token | R | IUA | A string containing the access token which may either be a JWT or a XUA Authorization Assertion. |
token_type | R | IUA | The value of the parameter shall be Bearer. | |
scope | R | IUA | The scope granted by the Authorization Server. | |
expires_in | R | IUA | Maximum duration of 5 minutes. | |
refresh_token | O | IUA | how to handle refresh tokens #20 |
A user launches an mHealth App or a specific application view to access data and documents from the Swiss EPR.
The following table summarizes the requirements on the scope parameter used to convey the claims:
Scope | Optionality (Basic/ Extended) | Type | Reference | Remark |
---|---|---|---|---|
launch | O/R | SMART on FHIR | Permission to obtain launch context when the app is launched from an EHR. Required for apps or views launched from an EHR or a mHealth App which was authorized before. | |
purpose_of_use | O/R | token3 | See sections below. | Value taken from code system 2.16.756.5.30.1.127.3.10.5 of the CH: EPR value set. |
subject_role | O/R | token | See sections below. | Only the values for the Role of Healthcare Professionals, Assistants, Patients and Representatives are allowed. |
person_id | O/R | string, CX | See sections below. | EPR-SPID identifier of the patient’s record and the patient assigning authority formatted in CX syntax. |
principal | O/O | token | See sections below. | Name of the healthcare professional an assistant is acting on behalf of. |
principal_id | O/O | token | See sections below. | GLN of the healthcare professional an assistant is acting on behalf of. |
group | O/O | string | See sections below. | Name of the organization or group an assistant is acting on behalf of. |
group_id | O/O | string | See sections below. | OID of the organization or group an assistant is acting on behalf of. |
access_token_format | O/O | string | Either ihe-jwt or ihe-saml as value. Will return this token_flavor. If scope is not provided defaults to ihe-jwt. |
3Token format according FHIR token type.
The scope parameter of the request MAY claim the following attributes:
Depending on the value of the role scope additional scopes are required, as described in the following sections.
In the healthcare professional extension, the scope subject_role SHALL be the code HCP from code system 2.16.756.5.30.1.127.3.10.6 of the CH:EPR value set.
In the assistant extension, the scope subject_role SHALL be the code ASS from code system 2.16.756.5.30.1.127.3.10.6 of the CH:EPR value set. There SHALL be a scope with name principal_id=value. The value SHALL convey the GLN of the healthcare professional an assistant is acting on behalf of. There SHALL be a scope with name principal=value. The value SHALL convey the name of the healthcare professional an assistant is acting on behalf of. There MAY be one or more scopes with name group_id=value and corresponding group=value. If present each value SHALL convey the ID and name of the subject’s organization or group as registered in the EPR HPD. The ID MUST be an OID in the format of an URN.
In the patient extension, the scope subject_role SHALL be the code PAT from code system 2.16.756.5.30.1.127.3.10.6 of the CH:EPR value set. The value of the purpose of use scope SHALL be the code NORM from code system 2.16.756.5.30.1.127.3.10.5 of the CH:EPR value set.
In the representative extension, the scope subject_role SHALL be the code REP from code system 2.16.756.5.30.1.127.3.10.6 of the CH:EPR value set. The token of the purpose_of_use scope SHALL be the code NORM from code system 2.16.756.5.30.1.127.3.10.5 of the CH:EPR value set.
The response SHALL either convey a basic access token in JWT format, granting basic access to the EPR (i.e. to access patient data), or an extended access token to access resources protected by the role and attribute based EPR authorization (i.e. read and write documents).
The Authorization Server and Resource Server SHALL support the 3.71.4.2.2.1.1 JWT IUA extension with the following claims as defined in Table below.
The claim content for the JWT IUA extensions SHALL correspond to the content defined in the XUA specification (see 1.6.4.2 Get X-User Assertion, A5E1).
JWT Claim (Extension) | Optionality | XUA Attribute EPR | Remark |
---|---|---|---|
subject_name | O/R | urn:oasis:names:tc:xspa:1.0:subject:subject-id | Plain text’s user name. |
subject_role | O/R | urn:oasis:names:tc:xacml:2.0:subject:role | Code indicating the user role. In the Swiss EPR the value SHALL be taken from the EPR Role Code Value Set. |
purpose_of_use | O/R | urn:oasis:names:tc:xspa:1.0:subject:purposeofuse | Code indicating the purpose of use. In the Swiss EPR the value SHALL be taken from the EPR Purpose Of Use Value Set. |
person_id | O/R | urn:oasis:names:tc:xacml:2.0:resource:resource-id | SHALL be the EPR-SPID of the patients EPR. |
The Authorization Server and Resource Server SHALL support the following extensions to the JWT access token for an EPR user:
JWT Claim (Extension) | Optionality | XUA Attribute EPR | Remark |
---|---|---|---|
user_id | R | <NameID> child element of the <Subject> | Depending on the Annex 5 E1 Extension |
user_id_qualifier | R | Name qualifier attribute of <NameID> | Depending on the Annex 5 E1 Extension |
The Authorization Server and Resource Server SHALL support the following extensions to the JWT access token for a list of groups a subject is member of:
The ch_group extension claims shall be wrapped in an “extensions” object with key ‘ch_group’ and a JSON array containing the JSON objects with properties name and id. The id MUST be an OID in the format of an URN.
ch_group array element | Optionality | XUA Attribute EPR | Remark |
---|---|---|---|
name | O/R | urn:oasis:names:tc:xspa:1.0:subject:organization | In XUA it is an array of text description of the groups/organizations, in the JWT extension it is an array of groups with properties name, id. |
id | O/R | urn:oasis:names:tc:xspa:1.0:subject:organization-id | In XUA it is an array of ids of the groups/organizations, in the JWT extension it is an array of group name, group id. |
The Authorization Server and Resource Server shall support the following extensions to the JWT access token:
The ch_delegation extension claims shall be wrapped in an “extensions” object with key ‘ch_delegation’ and a JSON value object containing the claims. The claim content for the JWT CH:EPR extensions shall correspond to the content defined in the XUA specification (see 1.6.4.2 Get X-User Assertion, A5E1).
JWT Claim (Extension) | Optionality | XUA Attribute EPR | Remark |
---|---|---|---|
principal | O/R | urn:e-health-suisse:principal-name | Name of the healthcare professional an assistant is acting on behalf of. |
principal_id | O/R | urn:e-health-suisse:principal-id | GLN of the healthcare professional an assistant is acting on behalf of. |
The IUA Authorization Client SHALL support the HTTP conversation of the OAuth 2.1 Authorization Code grant as follows:
When launched, the IUA Authorization Client SHALL perform HTTP GET request with the URL query parameter as defined in Table and with the scope claims described in Table.
If the IUA Authorization Client receives the request from the IUA Authorization Server on the callback URL conveying the authorization code, it SHALL perform the HTTP POST request with the client_id and client_secret in the HTTP authorization header to resolve the authorization code to the access token.
The IUA Authorization Client SHALL use the access token as defined in IUA Incorporate Access Token transaction, when performing requests to resources of the Swiss EPR4.
The IUA Authorization Server SHALL support the HTTP conversation of the OAuth 2.1 Authorization Code grant as follows:
If the IUA Authorization Server receives a request, it SHALL authenticate the user by redirecting the request to a XUA Authentication Provider5. The XUA Authentication provider authenticates the user based on its internal session management (i.e. by checking the requests cookies or other methods) or by validating the user authentication means and returns the identity token to the IUA Authorization Server.
In case of authentication failure, the IUA Authorization Server must respond with HTTP error code 401 ‘Not authorized’.
The IUA Authorization Server SHALL verify the user consent for the mHealth App either by presenting the user a dialog to confirm the required consent, or by validating preregistered contracts.
If the app (or view) is launched as an SMART EHR Launch, the IUA Authorization Server SHALL validate the launch scope parameter, by verifying that the user consent is registered with this launch parameter value. In case of failure, it SHALL respond with HTTP error code 401 ‘Not authorized’.
Depending on the scope claimed, the IUA Authorization Server SHALL either build a basic access authorization token allowing basic access to the EPR (i.e. to access patient data), or an extended access to access resources protected by the role and attribute based EPR authorization (i.e. read and write documents).
The business rules for the IUA Authorization Server for the Healthcare Professional, Assistant, Patient and Representative Extension SHALL be the same as for Annex 5E1 1.6.4.2.4.4 Expected Actions X-Assertion Provider Extensions.
If successful the IUA Authorization Server SHALL generate an OAuth 2.1 authorization code and perform a callback to the URL defined in the request, using the OAuth authorization code as URL query parameter with key ‘code’.
The IUA Authorization Server SHALL store the access token and the assigned authorization code and respond the access token on request to the Authorization Client.
4This covers all possible EPR transaction, with the exception of the ITI-103
5The XUA Authentication Provider currently only supports SAML 2 based authentication as defined in Annex 8 of the EPDV-EDI, but will be extended to Open ID Connect in the future. Currently SMART on FHIR does not have a SAML 2 option.
The first step of the request conversion is a HTTP GET which may look like for a basic access token:
GET authorize?
response_type=code&
client_id=app-client-id&
http%3A%2F%2Flocalhost%3A9000%2Fcallback&
launch=xyz123&
scope=launch+user%2F%2A.%2A+openid+fhirUser&state=98wrghuwuogerg97&aud=https%3A%2F%2Fehr%2Ffhir&code_challenge=ZmVjMmIwMWYyYTNjZWJiNTgyNTgxYzlmOGYyMWM0MWI3YmZhMjQ4YjU5MDc3Mzk4MDBmYTk0OThlNzZiNjAwMw&code_challenge_method=S256 HTTP/1.1
Host: localhost:9001
for an extended access token where at least purpose_of_use (NORM), subject_role (HCP) and person_id are added to the scope:
GET authorize?
response_type=code&
client_id=app-client-id&
http%3A%2F%2Flocalhost%3A9000%2Fcallback&
launch=xyz123&
scope=launch+user%2F*.*+openid+fhirUser+purpose_of_use%3Durn%3Aoid%3A2.16.756.5.30.1.127.3.10.5%7CNORM+subject_role%3Durn%3Aoid%3A2.16.756.5.30.1.127.3.10.6%7CHCP+person_id%3D761337610411353650%5E%5E%5E%26amp%3B2.16.756.5.30.1.127.3.10.3%26amp%3BISO%0A&code_challenge=ZmVjMmIwMWYyYTNjZWJiNTgyNTgxYzlmOGYyMWM0MWI3YmZhMjQ4YjU5MDc3Mzk4MDBmYTk0OThlNzZiNjAwMw&code_challenge_method=S256 HTTP/1.1
Host: localhost:9001
The second step of the request conversion is a HTTP GET Callback conveying the authorization code and may look like:
GET /callback?code=8V1pr0rJ&state=98wrghuwuogerg97 HTTP/1.1
Host: localhost:9000
The third step of the request conversion is a HTTP POST sending the authorization code to retrieve the authorization token in the response which may look like:
POST /token HTTP/1.1
Host: localhost:9001
Accept: application/json
Content-type: application/x-www-form-encoded
Authorization: Basic bXktYXBwOm15LWFwcC1zZWNyZXQtMTIz
grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A9000%2Fcallback&code=98wrghuwuogerg97&code_verifier=qskt4342of74bkncmicdpv2qd143iqd822j41q2gupc5n3o6f1clxhpd2x11
A JWT access token returned by the IUA Authorization Server and to be used to retrieve patient data may look like:
{
"iss": "http://issuerAdress.ch",
"sub": "UserId-bfe8a208-b9d0-4012-b2f5-168b949fc3cb",
"aud": "http://pixmResourceServerURL.ch",
"exp": 1587294580000,
"nbf": 1587294460000,
"iat": 1587294460000,
"jti": "c5436729-3f26-4dbf-abd3-2790dc7771a",
"extensions" : {
"ihe_iua" : {
"subject_name": "Martina Musterarzt"
},
"ch_epr": {
"user_id": "2000000090092",
"user_id_qualifier": "urn:gs1:gln"
}
}
A extend JWT access token to be used to access patient documents SHALL have the additional attributes of the purpose of use, subject role, the EPR-SPID of the patient and may look like:
{
"iss": "http://issuerAdress.ch",
"sub": "UserId-bfe8a208-b9d0-4012-b2f5-168b949fc3cb",
"aud": "http://mhdResourceServerURL.ch",
"exp": 1587294580000,
"nbf": 1587294460000,
"iat": 1587294460000,
"jti": "c5436729-3f26-4dbf-abd3-2790dc7771a",
"extensions" : {
"ihe_iua" : {
"subject_name": "Martina Musterarzt",
"person_id": "761337610411353650^^^&2.16.756.5.30.1.127.3.10.3&ISO",
"subject_role": {
"system": "urn:oid:2.16.756.5.30.1.127.3.10.6",
"code": "HCP"
},
"purpose_of_use": {
"system": "urn:uuid:2.16.756.5.30.1.127.3.10.5",
"code": "NORM",
}
},
"ch_epr": {
"user_id": "2000000090092",
"user_id_qualifier": "urn:gs1:gln"
},
"ch_group" : [
{
"name": "Name of group with id urn:oid:2.2.2.1",
"id": "urn:oid:2.2.2.1"
},
{
"name": "Name of group with id urn:oid:2.2.2.2",
"id": "urn:oid:2.2.2.2"
},
{
"name": "Name of group with id urn:oid:2.2.2.2",
"id": "urn:oid:2.2.2.3"
}
]
}
}
A JWT access token to be used to access by an assistant acting behalf on a healthcare professional for a patient SHALL have the additional extension ch_delegation:
{
"iss": "http://issuerAdress.ch",
"sub": "UserId-bfe8a208-b9d0-4012-b2f5-168b949fc3cb",
"aud": "http://mhdResourceServerURL.ch",
"exp": 1587294580000,
"nbf": 1587294460000,
"iat": 1587294460000,
"jti": "c5436729-3f26-4dbf-abd3-2790dc7771a",
"extensions" : {
"ihe_iua" : {
"subject_name": "Dagmar Musterassistent",
"person_id": "761337610411353650^^^&2.16.756.5.30.1.127.3.10.3&ISO",
"subject_role": {
"system": "urn:oid:2.16.756.5.30.1.127.3.10.6",
"code": "HCP"
},
"purpose_of_use": {
"system": "urn:uuid:2.16.756.5.30.1.127.3.10.5",
"code": "NORM",
}
},
"ch_epr": {
"user_id": "2000000090108",
"user_id_qualifier": "urn:gs1:gln"
},
"ch_group" : [
{
"name": "Name of group with id urn:oid:2.2.2.1",
"id": "urn:oid:2.2.2.1"
},
{
"name": "Name of group with id urn:oid:2.2.2.2",
"id": "urn:oid:2.2.2.2"
},
{
"name": "Name of group with id urn:oid:2.2.2.2",
"id": "urn:oid:2.2.2.3"
}
],
"ch_delegation": {
"principal": "Martina Musterarzt",
"principal_id": "2000000090092"
}
}
}
As specified in the IUA profile, the IUA Authorization Client and Authorization Server actors SHALL support the JWS (signed) alternative of the JWT token. Any actor that supports this transaction MAY support the JWE (unsigned but encrypted) alternative of the JWT token.