Basic Audit Log Patterns (BALP)
1.1.0 - Trial-Implementation International flag

This page is part of the IHE Basic Audit Log Patterns (BALP) (v1.1.0: Trial Implementation) based on FHIR R4. This is the current published version. For a full list of available versions, see the Directory of published versions

Example AuditEvent: Audit Example of a basic SAML access token of minimal with multiple PurposeOfUse

Generated Narrative

Resource "ex-auditPoke-SAML-Min2"

Profile: Basic AuditEvent pattern for when an activity was authorized by an SAML access token Minimal

Security Labels: http://terminology.hl7.org/CodeSystem/v3-ActReason

type: Application Activity (Details: DICOM code 110100 = 'Application Activity', stated as 'Application Activity')

subtype: Boredom poke (Details: urn:ietf:rfc:1438 code poke = 'poke', stated as 'Boredom poke')

action: R

recorded: Dec 3, 2021 3:49:00 AM

outcome: 0

Agents

-TypeWhoRequestorPolicyPurposeOfUse
*information recipient (ParticipationType#IRCP; The code used to identifiy a User Agent#UserSamlAgent)true_5a6b51b7-cd3e-4629-aac8-9846cbc3cf84treatment (ActReason#TREAT), Emergency Treatment (ActReason#ETREAT), healthcare payment (ActReason#HPAYMT), healthcare operations (ActReason#HOPERAT)

Sources

-SiteObserverType
*server.example.comDevice/ex-deviceApplication Server (Details: http://terminology.hl7.org/CodeSystem/security-source-type code 4 = 'Application Server', stated as 'Application Server')