Difference between revisions of "Secure Node"

From MgmtWiki
Jump to: navigation, search
(Context)
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
  
 
==Context==
 
==Context==
 
+
The context of an [[FHIR]] interaction is the transfer of [[PHI]] although other transaction could occur of the interchange so established.
  
 
==Problems==
 
==Problems==
Line 10: Line 10:
 
==Solutions==
 
==Solutions==
 
*After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes.
 
*After mutual authentication,other [[FHIR]] secure transactions may take place through this secure pipe between the two nodes.
*In addition, the Secure Node authenticates the identity of the [[Subject]] who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the [[Subject]] could be a secure location or a machine as well as a [[User]].
+
*In addition, the Secure Node authenticates the [[Identifier]] of the [[Subject]] who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the [[Subject]] could be a secure location or a machine as well as a [[User]].
 +
 
 
==References==
 
==References==
  

Latest revision as of 10:58, 14 September 2018

Full Title or Meme

In the FHIR Authenticate Node transaction, the local Node (Web Site) presents its Identifier to a remote Secure Node, and authenticates the Identifier of the remote node (another Web Site).

Context

The context of an FHIR interaction is the transfer of PHI although other transaction could occur of the interchange so established.

Problems

Solutions

  • After mutual authentication,other FHIR secure transactions may take place through this secure pipe between the two nodes.
  • In addition, the Secure Node authenticates the Identifier of the Subject who requests access to the node. This user authentication is a local operation that does not involve communication with a remote node. Note that the Subject could be a secure location or a machine as well as a User.

References