Difference between revisions of "Secure Node"
From MgmtWiki
(→Solutions) |
|||
Line 10: | Line 10: | ||
==Solutions== | ==Solutions== | ||
*After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes. | *After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes. | ||
− | *In addition, the Secure Node authenticates the | + | *In addition, the Secure Node authenticates the [[Identifier]] of the [[Subject]] who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the [[Subject]] could be a secure location or a machine as well as a [[User]]. |
+ | |||
==References== | ==References== | ||
Revision as of 10:57, 14 September 2018
Full Title or Meme
In the FHIR Authenticate Node transaction, the local Node (Web Site) presents its Identifier to a remote Secure Node, and authenticates the Identifier of the remote node (another Web Site).
Context
Problems
Solutions
- After mutual authentication,other FHIR secure transactions may take place through this secure pipe between the two nodes.
- In addition, the Secure Node authenticates the Identifier of the Subject who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the Subject could be a secure location or a machine as well as a User.