The initial use-cases that drove the creation of XUA is the Health Information Exchange built on the XDS and XCA profiles; A Health Information Exchange model using a Discover and Retrieve exchange model needs the user identity inside the query or retrieve transaction to assure that the organization holding the data can get a detailed audit log and could enforce policies through access controls.
This diagram shows a typical implementation of an EHR (in white) accessing an HIE based XDS Registry (in black). The XUA Profile provides the orange functionality: X-Identity Provider creates the SAML Assertion given the User Authentication identity and EHR security context, the X-Service User inserts this SAML Assertion into the normal XDS Query Transaction, and on the XDS Registry the X-Service User (not shown) uses the SAML identity and includes that identity in the Audit log.
The XUA profile is not limited to clinical users, it includes use-cases where the patient is participating in a Health Information Exchange, for example this diagram is identical for a PHR as a peer on the HIE. The XUA profile is also not limited to XDS profile, but is generic to Web-Services and thus can enable any Web-Services transaction.
The XUA profile is a very thin profile that simply indicates that the SAML 2.0 standard includes a specification for an identity Assertion. These SAML Assertions are self-contained XML objects that can contain claims about the identity, attributes about the identity, and claims about the context.
The XUA Profile explains how to add a SAML identity assertion to a Web-Services (SOAP) transaction, in this way the XUA profile can be used to enable any Web-Services transaction. The method of adding SAML assertions to Web-Services is well known and already profiled by the WS-I, a general IT industry consortium that do profiling. The SAML protocol does include transactions for retrieving and validating SAML assertions, but IHE recognized that these protocols are not the only legitimate way to obtain a SAML assertion for example the WS-Trust standard is more commonly used.
The XUA profile has had a few additional use-cases added to it as named options.
- User Role -- To support Role Based Access Control
- Consent / Authorization -- To support use-cases where the requesting party has explicit consent that they want to point at to assist the service
- Purpose Of Use -- Carry an indicator of what the reason for the transaction is and what will be done with the result
Resources
- Status: Final Text
- IHE ITI Technical Framework
- Vol 1: Section 13
- Vol 2b: Section 3.40
- Standards Used
XUA - Very thin profile that simply says to use SAML Identity Assertions for authenticating users on Cross-Enterprise transactions
- This is the solution for the space where Kerberos doesn't work well, yet WS-Trust can be used to create a SAML assertion based on a Kerberos authentication
- SAML is both a standard for an XML way to describe a user and provide trust mechanisms of that data; and also a protocol. The protocol is not part of the XUA profile. It is ok, but not as important as the assertion
- WS-Trust is more commonly used to get and manipulate SAML Assertions.
- There is also good reason for a product that does its own user authentication to simply create SAML assertions w/o protocol
- See - Federated ID is not a universal IDand IHE ITI XUA++ - Trial Implementation and Separation of Layers: Security Error Codes and Healthcare Access Controls standards landscape
Back links
This is part of a blog presentation of the IHE Privacy and Security Profiles Overview:
- Introduction to IHE impact on Meaningful Use
- IHE - Privacy and Security Profiles - Introduction
- IHE - Privacy and Security Profiles - Consistent Time
- IHE - Privacy and Security Profiles - Audit Trail and Node Authentication
- IHE - Privacy and Security Profiles - Enterprise User Authentication
- This Page
- IHE - Privacy and Security Profiles - Document Digital Signature
- IHE - Privacy and Security Profiles - Basic Patient Privacy Consents
- IHE - Privacy and Security Profiles - Document Encryption
- IHE - Privacy and Security Profiles - Access Control
- IHE - Privacy and Security Profiles - Miscellaneous
- IHE - Privacy and Security Profiles - Conclusion
No comments:
Post a Comment