This page is part of the FHIR Specification (v1.4.0: STU 3 Ballot 3). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2
This is a value set defined by the FHIR project.
Summary
Defining URL: | http://hl7.org/fhir/ValueSet/restful-security-service |
Name: | RestfulSecurityService |
Definition: | Types of security services used with FHIR. |
Committee: | FHIR Infrastructure Work Group |
OID: | 2.16.840.1.113883.4.642.2.82 (for OID based terminology systems) |
Source Resource | XML / JSON |
This value set is used in the following places:
This value set includes codes from the following code systems:
This expansion generated 31 Mar 2016
This value set contains 6 concepts
All codes from system http://hl7.org/fhir/restful-security-service
Code | Display | Definition |
OAuth | OAuth | Oauth (unspecified version see oauth.net). |
SMART-on-FHIR | SMART-on-FHIR | OAuth2 using SMART-on-FHIR profile (see http://docs.smarthealthit.org/). |
NTLM | NTLM | Microsoft NTLM Authentication. |
Basic | Basic | Basic authentication defined in HTTP specification. |
Kerberos | Kerberos | see http://www.ietf.org/rfc/rfc4120.txt. |
Certificates | Certificates | SSL where client must have a certificate registered with the server. |
This value set includes codes from the following code systems:
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |