This page is part of the National Directory of Healthcare Providers and Services (NDH) Implementation Guide (v1.0.0: STU1) based on FHIR (HL7® FHIR® Standard) R4. This is the current published version. For a full list of available versions, see the Directory of published versions
Official URL: http://hl7.org/fhir/us/ndh/StructureDefinition/base-ext-endpointAccessControlMechanism | Version: 1.0.0 | |||
Standards status: Trial-use | Computable Name: EndpointAccessControlMechanism |
Endpoint access control mechanisms protect and manage access to healthcare endpoints, ensuring secure data exchange between systems.
They standardize methods to secure endpoints, ensuring interoperability and security.
In certain use cases requiring system scalability and flexibility, different profiles may be utilized based on the chosen access control mechanism. For example,
the Unified Data Access Profile (UDAP) uses JWT access tokens.
Context of Use
This extension may be used on the following element(s):
Endpoint
Usage info
Usage:
Description of Profiles, Differentials, Snapshots, and how the XML and JSON presentations work.
This structure is derived from Extension
Name | Flags | Card. | Type | Description & Constraints![]() |
---|---|---|---|---|
![]() ![]() |
0..* | Extension | NDH Endpoint Access Control Mechanism | |
![]() ![]() ![]() |
0..0 | |||
![]() ![]() ![]() |
1..1 | uri | "http://hl7.org/fhir/us/ndh/StructureDefinition/base-ext-endpointAccessControlMechanism" | |
![]() ![]() ![]() |
1..1 | CodeableConcept | Value of extension Binding: Endpoint Access Control Mechanism Value Set (extensible) | |
![]() |
Name | Flags | Card. | Type | Description & Constraints![]() |
---|---|---|---|---|
![]() ![]() |
0..* | Extension | NDH Endpoint Access Control Mechanism | |
![]() ![]() ![]() |
0..1 | string | Unique id for inter-element referencing | |
![]() ![]() ![]() |
0..0 | |||
![]() ![]() ![]() |
1..1 | uri | "http://hl7.org/fhir/us/ndh/StructureDefinition/base-ext-endpointAccessControlMechanism" | |
![]() ![]() ![]() |
1..1 | CodeableConcept | Value of extension Binding: Endpoint Access Control Mechanism Value Set (extensible) | |
![]() |
This structure is derived from Extension
Summary
Simple Extension of type CodeableConcept: Endpoint access control mechanisms protect and manage access to healthcare endpoints, ensuring secure data exchange between systems.
They standardize methods to secure endpoints, ensuring interoperability and security.
In certain use cases requiring system scalability and flexibility, different profiles may be utilized based on the chosen access control mechanism. For example,
the Unified Data Access Profile (UDAP) uses JWT access tokens.
Differential View
This structure is derived from Extension
Name | Flags | Card. | Type | Description & Constraints![]() |
---|---|---|---|---|
![]() ![]() |
0..* | Extension | NDH Endpoint Access Control Mechanism | |
![]() ![]() ![]() |
0..0 | |||
![]() ![]() ![]() |
1..1 | uri | "http://hl7.org/fhir/us/ndh/StructureDefinition/base-ext-endpointAccessControlMechanism" | |
![]() ![]() ![]() |
1..1 | CodeableConcept | Value of extension Binding: Endpoint Access Control Mechanism Value Set (extensible) | |
![]() |
Snapshot View
Name | Flags | Card. | Type | Description & Constraints![]() |
---|---|---|---|---|
![]() ![]() |
0..* | Extension | NDH Endpoint Access Control Mechanism | |
![]() ![]() ![]() |
0..1 | string | Unique id for inter-element referencing | |
![]() ![]() ![]() |
0..0 | |||
![]() ![]() ![]() |
1..1 | uri | "http://hl7.org/fhir/us/ndh/StructureDefinition/base-ext-endpointAccessControlMechanism" | |
![]() ![]() ![]() |
1..1 | CodeableConcept | Value of extension Binding: Endpoint Access Control Mechanism Value Set (extensible) | |
![]() |
This structure is derived from Extension
Summary
Simple Extension of type CodeableConcept: Endpoint access control mechanisms protect and manage access to healthcare endpoints, ensuring secure data exchange between systems.
They standardize methods to secure endpoints, ensuring interoperability and security.
In certain use cases requiring system scalability and flexibility, different profiles may be utilized based on the chosen access control mechanism. For example,
the Unified Data Access Profile (UDAP) uses JWT access tokens.
Other representations of profile: CSV, Excel, Schematron
Path | Conformance | ValueSet | URI |
Extension.value[x] | extensible | EndpointAccessControlMechanismVS (a valid code from Endpoint Access Control Mechanism Code System)http://hl7.org/fhir/us/ndh/ValueSet/EndpointAccessControlMechanismVS from this IG |