This page is part of the Da Vinci Payer Data Exchange (v2.0.0: STU2) based on FHIR (HL7® FHIR® Standard) R4. This is the current published version. For a full list of available versions, see the Directory of published versions
Official URL: http://hl7.org/fhir/us/davinci-pdex/ValueSet/EndpointAccessControlMechanismVS | Version: 2.0.0 | |||
Active as of 2024-01-06 | Computable Name: EndpointAccessControlMechanismVS |
Codes for documenting access control mechanism
References
http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS
Expansion based on codesystem Endpoint Access Control Mechanism Code System v2.0.0 (CodeSystem)
This value set contains 9 concepts
Code | System | Display | Definition |
public | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | Public | Public |
opaque-access-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | Opaque Access Token | Opaque Access Token |
jwt-access-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | JWT Access Token | JWT Access Token |
mutual-tls | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | Mutual TLS | Mutual TLS |
wss-saml-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | WSS SAML Token | WSS SAML Token |
wss-username-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | WSS User Name Token | WSS User Name Token |
wss-kerberos-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | WSS Kerberos Token | WSS Kerberos Token |
wss-x509-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | WSS X509 Token | WSS X509 Token |
wss-custom-token | http://hl7.org/fhir/us/davinci-pdex/CodeSystem/EndpointAccessControlMechanismCS | WSS Custom Token | WSS Custom Token |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |