[Openid-specs-ab] 2024-02-08 Connect working group call notes
Tom Jones
thomasclinganjones at gmail.com
Thu Feb 8 23:18:49 UTC 2024
Certainly! *Azure* provides support for *SMART on FHIR*, which is a
healthcare standard enabling applications to access clinical information
through a data store. Here are the key points:
1.
*What Is SMART on FHIR?*
- *SMART on FHIR* combines open standards like *OAuth2* and *OpenID
Connect* with *FHIR interfaces*.
- It allows applications to securely integrate with *Electronic
Health Record (EHR) systems* and access clinical data.
- By adding a security layer, it ensures authentication and
authorization for FHIR repositories
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
1
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
2
<https://learn.microsoft.com/en-us/azure/healthcare-apis/azure-api-for-fhir/smart-on-fhir>
.
2.
*Benefits of Using SMART on FHIR*:
- *Authentication and Authorization*: Applications have a known method
for obtaining authentication and authorization to a FHIR repository.
- *Restricted Access*: Users accessing a FHIR repository via SMART on
FHIR are limited to resources associated with their user profile.
- *Granular Data Access*: Users can grant applications access to
specific subsets of their data using SMART clinical scopes
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
1
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
.
3.
*Setting Up SMART on FHIR with Azure*:
- *Prerequisites*:
- An instance of the *FHIR Service .NET SDK 6.0*.
- *Cross-Origin Resource Sharing (CORS)* enabled.
- A registered *public client application* in *Microsoft Entra ID*.
- Access to an *Azure Subscription* for creating resources and
role assignments.
- *Steps*:
- Set up the *FHIR SMART user role* to manage user access.
- Integrate the *FHIR server* with other Azure services using
*samples* (such as APIM, Azure Functions, etc.)
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
1
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
.
4.
*Note*:
- The *open-source FHIR Server for Azure* includes a simple *SMART on
FHIR app*
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
1
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
3
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/overview>
.
- These samples are not part of the *Azure Health Data Service* and
are not officially supported by Microsoft
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
1
<https://learn.microsoft.com/en-us/azure/healthcare-apis/fhir/smart-on-fhir>
.
In summary, Azure supports SMART on FHIR, allowing secure integration of
healthcare applications with FHIR data repositories.
FROM THE BING COPILOT!!!! ..tom
On Thu, Feb 8, 2024 at 3:15 PM Tom Jones <thomasclinganjones at gmail.com>
wrote:
> i guess i should have noted that I was the one to connect FHIR devs, one
> of whom works for Microsoft. ..tom
>
>
> On Thu, Feb 8, 2024 at 3:11 PM Tom Jones <thomasclinganjones at gmail.com>
> wrote:
>
>> Mike - the reason to go to oidc 1.1 is that we expect RSA to be
>> deprecated this year - and oidc requires it.
>>
>> ..tom
>>
>>
>> On Thu, Feb 8, 2024 at 7:47 AM Joseph Heenan via Openid-specs-ab <
>> openid-specs-ab at lists.openid.net> wrote:
>>
>>> Attendees:
>>>
>>> Joseph Heenan
>>> Michael Jones
>>> George Fletcher
>>> Bjorn Hjelm
>>> Brian Campbell
>>> David Waite
>>> Filip Skokan
>>> Pamela Dingle
>>>
>>>
>>> Only 3.5 weeks left to make submissions for IETF
>>>
>>> *Native SSO*
>>>
>>>
>>> https://bitbucket.org/openid/connect/issues/2101/native-app-sso-no-prescriptive-restriction -
>>> George to raise a PR
>>>
>>>
>>>
>>> https://lists.openid.net/pipermail/openid-specs-ab/2024-February/010226.html -
>>> George will respond on the list
>>>
>>> *Federation*
>>>
>>> https://bitbucket.org/openid/connect/pull-requests/695 - Conflicts
>>> resolved, Mike plans to merge.
>>>
>>> Mike & others spoke with Stefan Santesson about the federation issues he
>>> had raised, which seemed to come down to potentially not trusting RPs to do
>>> key management. A productive discussion was had and Mike plans to close
>>> many of the issues.
>>>
>>>
>>>
>>> *POST at authorization endpoint*
>>>
>>> Joseph noted there was further discussion on
>>> https://gitlab.com/openid/conformance-suite/-/issues/1293 that should
>>> be happening within the Connect working group instead.
>>>
>>> Mike asked Joseph to open an issue in the connect tracker, which Joseph
>>> did:
>>> https://bitbucket.org/openid/connect/issues/2115/post-to-authorization-endpoint
>>>
>>> Brian noted that Ping does accept POST on the Authorization Endpoint.
>>>
>>> There was general discussion about adding conformance tests vs
>>> discouraging this is the spec, and noted that FHIR spec requires the
>>> authorization server support this as per Aaron’s original message, that if
>>> we were encourage people to implement POST it’d be better to push them
>>> towards PAR.
>>>
>>> An errata can’t make a normative change to the current requirement in
>>> OpenID Connect to support POST at Authorization Endpoint.
>>>
>>> Mike said a 1.1 for this would be overkill. Pam asked if there’s
>>> anything else that would go into 1.1. Filip suggesting returning access
>>> tokens from the Authorization Endpoint could also be removed. Mike said he
>>> wouldn’t want to start 1.1 while the ISO PAS submission was ongoing, which
>>> may take 9 months.
>>>
>>> George suggested adding a conformance test that only issues a warning if
>>> it fails, and also creating a new conformance profile that requires it be
>>> supported as per FHIR.
>>>
>>> Joseph asked if FHIR intend to use our certification tests. No one knew.
>>> Mike J suggested it would be worth discussing again on a call where Aaron
>>> was present.
>>>
>>>
>>> *Moving to github*
>>>
>>> Pam asked if everything is moving to GitHub. MikeJ said it’s been
>>> handled on a case by case basis, and e.g. the Federation authors would like
>>> to move to GitHub once they have some existing issues & PRs closed (as the
>>> PRs/issues do not transfer over well).
>>>
>>>
>>> _______________________________________________
>>> Openid-specs-ab mailing list
>>> Openid-specs-ab at lists.openid.net
>>> https://lists.openid.net/mailman/listinfo/openid-specs-ab
>>>
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20240208/db8038c8/attachment.html>
More information about the Openid-specs-ab
mailing list