Difference between revisions of "Secure Node"

From MgmtWiki
Jump to: navigation, search
(Solutions)
Line 10: Line 10:
 
==Solutions==
 
==Solutions==
 
*After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes.
 
*After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes.
*In addition, the Secure Node authenticates the identity of the [[Subject]] who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the [[Subject]] could be a secure location or a machine as well as a [[User]].
+
*In addition, the Secure Node authenticates the [[Identifier]] of the [[Subject]] who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the [[Subject]] could be a secure location or a machine as well as a [[User]].
 +
 
 
==References==
 
==References==
  

Revision as of 10:57, 14 September 2018

Full Title or Meme

In the FHIR Authenticate Node transaction, the local Node (Web Site) presents its Identifier to a remote Secure Node, and authenticates the Identifier of the remote node (another Web Site).

Context

Problems

Solutions

  • After mutual authentication,other FHIR secure transactions may take place through this secure pipe between the two nodes.
  • In addition, the Secure Node authenticates the Identifier of the Subject who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the Subject could be a secure location or a machine as well as a User.

References