This page is part of the IHE Basic Audit Log Patterns (BALP) (v1.1.3: Publication) based on FHIR (HL7® FHIR® Standard) R4. This is the current published version. For a full list of available versions, see the Directory of published versions
@prefix fhir: <http://hl7.org/fhir/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
# - resource -------------------------------------------------------------------
a fhir:AuditEvent ;
fhir:nodeRole fhir:treeRoot ;
fhir:id [ fhir:v "ex-auditPoke-SAML-Min"] ; #
fhir:meta [
( fhir:profile [
fhir:v "https://profiles.ihe.net/ITI/BALP/StructureDefinition/IHE.BasicAudit.SAMLaccessTokenUse.Minimal"^^xsd:anyURI ;
fhir:link <https://profiles.ihe.net/ITI/BALP/StructureDefinition/IHE.BasicAudit.SAMLaccessTokenUse.Minimal> ] ) ;
( fhir:security [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/v3-ActReason"^^xsd:anyURI ] ;
fhir:code [ fhir:v "HTEST" ] ] )
] ; #
fhir:text [
fhir:status [ fhir:v "generated" ] ;
fhir:div "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p><b>Generated Narrative: AuditEvent</b><a name=\"ex-auditPoke-SAML-Min\"> </a></p><div style=\"display: inline-block; background-color: #d9e0e7; padding: 6px; margin: 4px; border: 1px solid #8da1b4; border-radius: 5px; line-height: 60%\"><p style=\"margin-bottom: 0px\">Resource AuditEvent "ex-auditPoke-SAML-Min" </p><p style=\"margin-bottom: 0px\">Profile: <a href=\"StructureDefinition-IHE.BasicAudit.SAMLaccessTokenUse.Minimal.html\">Basic AuditEvent pattern for when an activity was authorized by an SAML access token Minimal</a></p><p style=\"margin-bottom: 0px\">Security Labels: <span title=\"{http://terminology.hl7.org/CodeSystem/v3-ActReason http://terminology.hl7.org/CodeSystem/v3-ActReason}\">http://terminology.hl7.org/CodeSystem/v3-ActReason</span></p></div><p><b>type</b>: Application Activity (Details: DICOM code 110100 = 'Application Activity', stated as 'Application Activity')</p><p><b>subtype</b>: Boredom poke (Details: urn:ietf:rfc:1438 code poke = 'poke', stated as 'Boredom poke')</p><p><b>action</b>: R</p><p><b>recorded</b>: Dec 3, 2021, 3:49:00 AM</p><p><b>outcome</b>: 0</p><h3>Agents</h3><table class=\"grid\"><tr><td style=\"display: none\">-</td><td><b>Type</b></td><td><b>Who</b></td><td><b>Requestor</b></td><td><b>Policy</b></td></tr><tr><td style=\"display: none\">*</td><td>information recipient <span style=\"background: LightGoldenRodYellow; margin: 4px; border: 1px solid khaki\"> (<a href=\"http://terminology.hl7.org/5.3.0/CodeSystem-v3-ParticipationType.html\">ParticipationType</a>#IRCP; <a href=\"CodeSystem-UserAgentTypes.html\">The code used to identifiy a User Agent</a>#UserSamlAgent)</span></td><td><span><code>https://sts.sykehuspartner.no</code>/05086900124</span></td><td>true</td><td><code>XC4WdYS0W5bjsMGc5Ue6tClD_5U</code></td></tr></table><h3>Sources</h3><table class=\"grid\"><tr><td style=\"display: none\">-</td><td><b>Site</b></td><td><b>Observer</b></td><td><b>Type</b></td></tr><tr><td style=\"display: none\">*</td><td>server.example.com</td><td><a href=\"Device-ex-device.html\">Device/ex-device</a></td><td>Application Server (Details: http://terminology.hl7.org/CodeSystem/security-source-type code 4 = 'Application Server', stated as 'Application Server')</td></tr></table></div>"
] ; #
fhir:type [
fhir:system [ fhir:v "http://dicom.nema.org/resources/ontology/DCM"^^xsd:anyURI ] ;
fhir:code [ fhir:v "110100" ] ;
fhir:display [ fhir:v "Application Activity" ]
] ; #
fhir:subtype ( [
fhir:system [ fhir:v "urn:ietf:rfc:1438"^^xsd:anyURI ] ;
fhir:code [ fhir:v "poke" ] ;
fhir:display [ fhir:v "Boredom poke" ]
] ) ; #
fhir:action [ fhir:v "R"] ; #
fhir:recorded [ fhir:v "2021-12-03T09:49:00.000Z"^^xsd:dateTime] ; #
fhir:outcome [ fhir:v "0"] ; #
fhir:agent ( [
fhir:type [
( fhir:coding [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/v3-ParticipationType"^^xsd:anyURI ] ;
fhir:code [ fhir:v "IRCP" ] ] [
fhir:system [ fhir:v "https://profiles.ihe.net/ITI/BALP/CodeSystem/UserAgentTypes"^^xsd:anyURI ] ;
fhir:code [ fhir:v "UserSamlAgent" ] ] ) ] ;
fhir:who [
fhir:identifier [
fhir:system [ fhir:v "https://sts.sykehuspartner.no"^^xsd:anyURI ] ;
fhir:value [ fhir:v "05086900124" ] ] ] ;
fhir:requestor [ fhir:v "true"^^xsd:boolean ] ;
( fhir:policy [ fhir:v "XC4WdYS0W5bjsMGc5Ue6tClD_5U"^^xsd:anyURI ] )
] ) ; #
fhir:source [
fhir:site [ fhir:v "server.example.com" ] ;
fhir:observer [
fhir:reference [ fhir:v "Device/ex-device" ] ] ;
( fhir:type [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/security-source-type"^^xsd:anyURI ] ;
fhir:code [ fhir:v "4" ] ;
fhir:display [ fhir:v "Application Server" ] ] )
] . #
IG © 2022+ IHE IT Infrastructure Technical Committee. Package ihe.iti.balp#1.1.3 based on FHIR 4.0.1. Generated 2024-02-14
Links: Table of Contents |
QA Report
| New Issue | Issues
Version History |
|
Propose a change