FHIR Release 3 (STU)

This page is part of the FHIR Specification (v3.0.2: STU 3). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2 Value Set http://hl7.org/fhir/ValueSet/restful-security-service

FHIR Infrastructure Work Group Maturity Level: 3InformativeUse Context: Any

This is a value set defined by the FHIR project.


Defining URL:http://hl7.org/fhir/ValueSet/restful-security-service
Definition:Types of security services used with FHIR.
Committee:FHIR Infrastructure Work Group
OID:2.16.840.1.113883.4.642.3.168 (for OID based terminology systems)
Source ResourceXML / JSON

This value set is used in the following places:

This value set includes codes from the following code systems:


This expansion generated 19 Apr 2017

This value set contains 6 concepts

Expansion based on http://hl7.org/fhir/restful-security-service version 3.0.2

All codes from system http://hl7.org/fhir/restful-security-service

OAuthOAuthOauth (unspecified version see oauth.net).
SMART-on-FHIRSMART-on-FHIROAuth2 using SMART-on-FHIR profile (see http://docs.smarthealthit.org/).
NTLMNTLMMicrosoft NTLM Authentication.
BasicBasicBasic authentication defined in HTTP specification.
KerberosKerberossee http://www.ietf.org/rfc/rfc4120.txt.
CertificatesCertificatesSSL where client must have a certificate registered with the server.


See the full registry of value sets defined as part of FHIR.

Explanation of the columns that may appear on this page:

LevelA few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
SourceThe source of the definition of the code (when the value set draws in codes defined elsewhere)
CodeThe code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract')
DisplayThe display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
DefinitionAn explanation of the meaning of the concept
CommentsAdditional notes about how to use the code