IHE ITI Technical Framework
The Final Text ITI Technical Framework is published here in HTML format and is no longer published as PDF. Trial Implementation supplements are available from the Volume 1 Table of Contents.

Appendix Z – FHIR Implementation Material (Trial Implementation)

There is a set of IHE profiles using the HL7® FHIR® standard. These IHE profiles define a lightweight RESTful interface using technologies readily available to mobile applications and lightweight browser-based applications. This appendix contains explanation and profiling common to these profiles.

The HL7 FHIR standard has several overarching concepts which should be profiled consistently throughout any mobile/lightweight IHE transactions using FHIR. IHE profiles FHIR, like any other standard, in ways that narrow the standard for specific use-cases. IHE profiles are intended to be proper subsets of the standard and are not intended to be incompatible.

All systems and deployments should consider the impact of "Clinical Safety" on interoperability using FHIR and system architecture. For guidance and checklist see the FHIR Clinical Safety page http://hl7.org/fhir/R4/safety.html.

We discuss here how IHE profiles the FHIR standard such as Resources, Datatypes, Valuesets, Extensions, Transactions, Query Parameters, CapabilityStatement, etc.

References

HL7 FHIR HL7 FHIR standard R4 http://hl7.org/fhir/R4/index.html
RFC2616 Hypertext Transfer Protocol – HTTP/1.1
RFC7540 Hypertext Transfer Protocol – HTTP/2
RFC3986 Uniform Resource Identifier (URI): Generic Syntax
RFC4627 The application/json Media Type for JavaScript Object Notation (JSON)
RFC6585 Additional HTTP Status Codes

Z.1 Resource Bundles

Any operation that results in, or requires submission of, a collection of resources is done via a Resource Bundle mechanism. A FHIR Bundle Resource is a collection of resources that are related, for example, the result of a search operation, or a collection of historical versions of a resource.

Bundles are described at FHIR http://hl7.org/fhir/R4/bundle.html.

This section has no specific constraints.

Z.2 Query Parameters

FHIR http://hl7.org/fhir/R4/search.html specifies a series of query parameter types which may be used when querying for a resource on a server. The representation of these query parameters within the HTTP request URL are intended to support a broad set of use cases and in some cases the behavior is unclear.

In this section, we discuss query parameters in the context of RESTful HTTP queries represented in the request URL within IHE profiles.

Query parameters not mentioned here are not constrained by this appendix.

Z.2.1 Query Parameter Modifiers

This section has no specific constraints.

Z.2.2 Token Parameters

A token type is a parameter that provides an exact match search, either on a string of characters, potentially scoped by a URI. It is mostly used against a code or identifier data type where the value may have a URI that scopes its meaning, where the search is performed against the pair from a Coding or an Identifier. Tokens are also used against other fields where exact matches are required. (See FHIR http://hl7.org/fhir/R4/search.html#token.)

This section has no specific constraints.

Z.2.3 String Parameters

For a simple string search, a string parameter serves as the input for a case- and accent-insensitive search against sequences of characters. By default, a field matches a string query if the value of the field equals or starts with the supplied parameter value, after both have been normalized by case and accent. (See FHIR http://hl7.org/fhir/R4/search.html#string.)

IHE profiles may choose to require support for the string search modifiers.

This section has no specific constraints.

Z.3 CapabilityStatement Resource

HL7 FHIR defines how a service can declare a CapabilityStatement Resource describing the resources, transport, formats, and operations that can be performed on a series of resources for the service instance. The CapabilityStatement Resource is described in FHIR http://hl7.org/fhir/R4/CapabilityStatement.html.

Actors providing http server functionality shall publish a CapabilityStatement on the metadata endpoint as described in FHIR http://hl7.org/fhir/R4/http.html#capabilities.

Z.4 StructureDefinition Resource

HL7 FHIR allows service implementers to publish a StructureDefinition Resource describing the constraints, terminology bindings, extensions and search parameters supported for a resource type. This StructureDefinition Resource allows consumers to determine the capabilities and data requirements of a particular FHIR-based service. The StructureDefinition Resource is described in FHIR http://hl7.org/fhir/R4/structuredefinition.html.

This section has no specific constraints.

Z.5 Resource Reference URIs in FHIR

Many of the defined elements in a resource are references to other resources. Using these references, the resources combine to build relationships between information. Resource References are described in FHIR http://hl7.org/fhir/R4/references.html.

This section has no specific constraints.

Z.6 Populating the Expected Response Format

The FHIR standard provides for response message content encoded as either XML or JSON. The server actor shall support both message encodings, whilst the client actors shall support one and may optionally support both.

There are two methods for the client to indicate preference for encoding:

  • the use of HTTP content negotiation and

  • the _format query parameter

This is described in FHIR http://hl7.org/fhir/R4/http.html#mime-type. The server actor shall support both methods. Note that the value of the _format parameter must be a subset of the HTTP content negotiation.

A client actor shall indicate preference for response format, using at least one method, with at least one of the following values. A server actor may support other encodings. To enable simpler query encoding, the value of _format may be the short “json” or “xml”.

Table Z.6-1: Desired response encoding

Desired Encoding mime-type Value
json application/fhir+json
xml application/fhir+xml

Z.7 Guidance on Access Denied Results

The server must choose the response carefully when an Access Denied condition exists. Returning too much information may expose details that should not be communicated. The Access Denied condition might be because of missing required Authentication, because the user is not authorized to access the endpoint, because the user is not authorized to access specific data, or because of other policy reasons.

To balance usability of the response against appropriate disclosure, the actual result method used needs to be controlled by policy and context.

Typical methods used are:

  • Return a Success with Bundle containing zero results – This result is indistinguishable from the case where no data is known. When consistently returned on Access Denied, this approach will not expose which patients exist, or what data might be blinded. This method is also consistent with cases where some results are authorized while other results are excluded from the results. This can only be used when returning a Bundle is a valid result.

  • Return a 404 “Not Found” – This approach also protects from data leakage, as it is indistinguishable from a query against a resource that does not exist. It does however leak that the user is authenticated.

  • Return a 403 “Forbidden” – This approach communicates that the reason for the failure is an Authorization failure. It should only be used when the client and/or user is trusted to be given this information. Thus, this method is used mostly when the user is allowed to know that access is forbidden. It does not explain how the user might change things to become authorized. This approach may leak that content exists.

  • Return a 401 “Unauthorized” – This communicates that user authentication was attempted and failed to be authenticated. This approach may leak that content exists.

When the server needs to report an error, it shall use HTTP error response codes and should include a FHIR OperationOutcome with more details on the failure. See FHIR http://hl7.org/fhir/R4/security.html#AccessDenied and http://hl7.org/fhir/R4/operationoutcome.html.

Z.8 Mobile Security Considerations

There are many security and privacy concerns with mobile devices, including lack of physical control. Many common information technologies use of HTTP, including REST, access far less sensitive information than health information. These factors present an especially difficult challenge for the security model. Application developers should perform a Risk Assessment during design of their applications, and organizations responsible for the operational environment should perform Risk Assessments on the design and deployment of the operational environment. See FHIR Security and Privacy Module http://hl7.org/fhir/R4/secpriv-module.html.

Actors should not communicate any patient information unless proper authentication, authorization, and communications security have been performed.

There are many reasonable methods of securing interoperability transactions. These security models can be layered in without modifying the characteristics of the transaction. The use of TLS is encouraged, specifically the use of the Audit Trail and Node Authentication (ATNA) Profile. User authentication on mobile devices is encouraged using the Internet User Authorization (IUA) Profile. The IUA Profile is a profile of the OAuth protocol. IUA enables external Authorization providers, which can leverage pluggable authentication providers, such as OpenID Connect. The network communication security and user authentication are layered in at the HTTP transport layer and do not modify the interoperability characteristics defined in the transaction.

The Privacy Consent on FHIR (PCF) builds upon a basic Identity and Authorization model of Internet User Authorization (IUA) to provide consent-based access control. The Privacy Consent on FHIR is thus focused only on Access Control decisions regarding the parameters of the data subject (patient) privacy consent. The Privacy Consent on FHIR leverages these basic Identity and Authorization decisions as context setting for the authorization decision and enforcement. For example, a user that would never be allowed access would be denied access at the IUA level without invoking PCF, and where PCF will further evaluate authorization based on Privacy Consents.

Security audit logging (e.g., ATNA, BALP) is recommended. Support for ATNA-based audit logging on the mobile health device may be beyond the ability of the client-constrained environment. For example, the client actor may only support HTTP interactions using JSON encoding, while the Record Audit Event [ITI-20] transaction requires the SYSLOG protocol and XML encoding. For this reason, the use of ATNA Audit Logging is not mandated. This means that the organization responsible for the operational environment must choose how to mitigate the risk of relying only on the service side audit logging. There is a Supplement to ATNA - Add RESTful ATNA (Query and Feed) that allows the use of FHIR AuditEvent and RESTful recording. The Basic Audit Log Patterns (BALP) Profile is available with general and reusable AuditEvent patterns for all of the FHIR RESTful actions.

Many transactions using HTTP REST will include query parameters that would be identifiers, quasi-identifiers, or sensitive health topics. For example, it is common for patient identifier to be a query parameter. With this URL pattern, the query parameters are typically visible in the server audit log or browser history. The risk from this visibility should be mitigated in system or operational design, by protecting the logs as sensitive data, or by designing other measures into the system to prevent inappropriate exposure. The Basic Audit Log Patterns (BALP) Profile includes further and specific guidance.

Z.8.1 Auditing Considerations

Z.8.1.1 Authorization Activity

IHE actors using FHIR will often use the OAuth 2 to authorize access to patient data. When an actor performs a transaction that includes an OAuth 2 authorization step and is grouped with an ATNA Secure Node or Secure Application Actor, it shall generate Audit events as specified in the IUA Profile in ITI TF-2: 3.71.5.1 Security Audit Considerations.

Z.8.1.2 Auditing Application Launch Activity (Start and Stop)

An application will often launch other applications (e.g., such as in the SMART on FHIR EHR Launch or Standalone Launch flows).

An application that is grouped with the ATNA Secure Node or Secure Application Actor shall generate audit events as specified in the following sections:

  • Section Z.8.1.2.1 - When an actor launches an application.

  • Section Z.8.1.2.2 - When the application itself has detected it is being launched.

  • Section Z.8.1.2.3 - When an actor detects that an application has stopped.

  • Section Z.8.1.2.4 - When the application itself has detected it is going to stop.

  • Basic Audit Log Patterns (BALP) Profile - all of the FHIR RESTful actions.

Z.8.1.2.1 Audit requirements for an actor launching an application

When an actor launches an application, it shall generate an “Application Start” audit event that complies with the following pattern:

  • Event

  • EventID = EV(110100, Application Activity, “Audit event: Application Activity has taken place.”)

  • EventTypeCode = EV(110120, Application Start, “Audit event: Application Entity has started.”)

  • EventActionCode = “X” (Execute)

  • Application Launcher (1..1)

  • UserID = The launching actor’s system identity

  • RoleIDCode = EV(110151, DCM, “Application Launcher”)

  • Patient (0..1)

  • The identity of the affected patient (when relevant).

  • Human Requestor (0..n)  one for each known User

  • UserID = Identity of the human that initiated the transaction.

  • RoleIDCode = Access Control role(s) the user holds that allows this transaction

  • Application (1..1)

  • The launched actor’s system identity

  • RoleIDCode = EV(110150, DCM, “Application”)

  • Audit Source (1..1)

  • not specialized

Z.8.1.2.2 Audit Requirements for an application being launched

When an application itself has detected that it is being launched, it shall generate an “Application Start” audit event that complies with the following pattern:

  • Event

  • EventID = EV(110100, Application Activity, “Audit event: Application Activity has taken place.”)

  • EventTypeCode = EV(110120, Application Start, “Audit event: Application Entity has started.”)

  • EventActionCode = “X” (Execute)

  • Application Launcher (1..1)

  • UserID = The launching actor’s system identity

  • RoleIDCode = EV(110151, DCM, “Application Launcher”)

  • Patient (0..1)

  • The identity of the affected patient (when relevant).

  • Human Requestor (0..n)  one for each known User

  • UserID = Identity of the human that initiated the transaction.

  • RoleIDCode = Access Control role(s) the user holds that allows this transaction

  • Application (1..1)

  • The launched actor’s system identity

  • RoleIDCode = EV(110150, DCM, “Application”)

  • Audit Source (1..1)

  • not specialized

Z.8.1.2.3 Audit Requirements for an actor that detects application stop

When an actor detects that a launched application has stopped, it shall generate an “Application Stop” audit event that complies with the following pattern:

  • Event

  • EventID = EV(110100, Application Activity, “Audit event: Application Activity has taken place.”)

  • EventTypeCode = EV(110121, Application Stop, “Audit event: Application Entity has stopped.”)

  • EventActionCode = “X” (Execute)

  • Application Launcher (0..1)

  • UserID = The launching application’s system identity

  • RoleIDCode = EV(110151, DCM, “Application Launcher”)

  • Patient (0..1)

  • The identity of the patient affected (when relevant).

  • Human Requestor (0..n)  one for each known User

  • UserID = Identity of the human that initiated the transaction.

  • RoleIDCode = Access Control role(s) the user holds that allows this transaction

  • Application (1..1)

  • The launched actor’s system identity

  • RoleIDCode = EV(110150, DCM, “Application”)

  • Audit Source (1..1)

  • not specialized

Z.8.1.2.4 Audit requirements for an application that is going to stop

When the launched application itself has detected it is going to stop has finished, it shall generate an “Application Stop” audit event that complies with the following pattern:

  • Event

  • EventID = EV(110100, Application Activity, “Audit event: Application Activity has taken place.”)

  • EventTypeCode = EV(110121, Application Stop, “Audit event: Application Entity has stopped.”)

  • EventActionCode = “X” (Execute)

  • Application Launcher (0..1)

  • UserID = The launching application’s system identity

  • RoleIDCode = EV(110151, DCM, “Application Launcher”)

  • Patient (0..1)

  • The identity of the patient affected (when relevant).

  • Human Requestor (0..n)  one for each known User

  • UserID = Identity of the human that initiated the transaction.

  • RoleIDCode = Access Control role(s) the user holds that allows this transaction

  • Application (1..1)

  • The launched actor’s system identity

  • RoleIDCode = EV(110150, DCM, “Application”)

  • Audit Source (1..1)

  • not specialized

Z.9 FHIR Data Types

This section includes specific guidance and constraints that are common to use of FHIR Data types.

Z.9.1 Identifier Type

The HL7 FHIR standard uses the data type Identifier to express a business identifier that uniquely identifies a thing or object (see FHIR http://hl7.org/fhir/R4/datatypes.html#identifier) including document uniqueIds, medical record numbers or patient identifiers. This concept is different than the resource identifier, known as “logical id” or “id” in FHIR, which identifies a particular resource. (A resource identifier may also be represented as an Identifier instance however.)

The FHIR Identifier type introduces a new mechanism for conveying the originating system of a particular identifier. Whereas HL7 Version 2 and Version 3 messages identify an assigning organization as an HD (Hierarchical Descriptor) or an OID in the “root” attribute respectively, HL7 FHIR requires the use of a URI. This may necessitate some configuration on the part of actors in IHE profiles to correctly map between a URI and an OID or HD to maintain consistency with other actors which are not implementing the FHIR specification.

Both the value and system shall be populated.

When the value is a globally unique value, the system value shall be “urn:ietf:rfc:3986”.

A value that is an OID shall be represented as a URI with scheme “urn:oid:”, for example:

{

"system": "urn:ietf:rfc:3986",

"value": "urn:oid:1.2.826.0.1.3680043.2.1611.1.2.32884.10619.27943.27629.41504"

}

A value that is a UUID shall be represented as a URI with a scheme “urn:uuid:”, for example:

{

"system": "urn:ietf:rfc:3986",

"value": "urn:uuid:13cc6fc6-55ef-4dbc-a426-e0e82dffbe42"

}

Z.9.1.1 Identifier and HL7 version 3 "root plus extension"

In HL7 version 3, uniqueId can be expressed as a root, or as a root plus extension.

When converting an HL7 version 3 uniqueId to FHIR, if no extension is provided, the root shall be placed into the Identifier.value, and the Identifier.system shall be set to “urn:ietf:rfc:3986”. For example, the HL7 version 3 value

<identifier root="1.2.826.0.1.3680043.2.1611.1.2.32884.10619.27943.27629.41504" />

would be expressed in FHIR as

{

"system": "urn:ietf:rfc:3986",

"value": "urn:oid:1.2.826.0.1.3680043.2.1611.1.2.32884.10619.27943.27629.41504"

}

When an extension is provided, the extension shall be placed into the Identifier.value, and the Identifier.system shall be set to the root. For example, the HL7 version 3 value

<identifier root="1.2.826.0.1.3680043.2.1611.1.2.32884.10619.27943.27629.41504" extension="84566" />

would be expressed in FHIR as

{

"system": "urn:oid:1.2.826.0.1.3680043.2.1611.1.2.32884.10619.27943.27629.41504"

“value”:”84566”

}

Z.9.1.2 XDS CXi mapped to FHIR Identifier Type

In XDS, a subset of CX is defined as CXi.

The following mapping shall be used unless otherwise specified:

CXi.1 (id) = Identifier.value

CXi.4 (assigning authority) = Identifier.system

CXi.5 (identifier type code) = Identifier.type

CXi.6 (homeCommunityId) = <not mapped>

Thus, a CXi value such as

2013001^^^&1.2.3.4.5.6&ISO^urn:ihe:iti:xds:2013:accession

would be expressed in FHIR as:

<identifier>

<type>

<coding>

<system value="urn:ietf:rfc:3986"/>

<code value="urn:ihe:iti:xds:2013:accession"/>

</coding>

</type>

<system value="urn:oid:1.2.3.4.5.6"/>

<value value="2013001"/>

</identifier>

Z.10 Profiling conventions for constraints on FHIR

Constraints in IHE Implementation Guide (Profiles) are intended to be consistent with IHE General constraints mechanisms outlined in General Introduction Appendix E: Standards Profiling and Documentation Conventions.

Constraints on FHIR are mostly specified in a FHIR StructureDocument profile, or one of the other FHIR Conformance resources. The constraints defined in the Implementation Guide within FHIR Conformance resources convey constraints more precisely and in a way that enables testing and real-time validation. Sometimes a constraint is less definitive, such as "Required if known", also indicated with "R2". Required if known may be invoked in an Implementation Guide with the FHIR StructureDefinition "Must Support" element.

The following terms refer to the values used in the ITI Technical Framework Volumes 2, 3, and 4 that define constraints being profiled (often as OPT column of tables):

R Required. This element is required by FHIR. A sending application shall populate the element with a non-empty value. A receiving application may ignore the information conveyed by the element. A receiving application shall not raise an error solely due to the presence of the element but may raise an error due to the absence of the element.

R+ Required. This element is required by IHE profiling but is not a required element by FHIR. This element shall be treated as "R", above.

R2 Required if known. If the sending application has data for the element, it is required to populate the element with a non-empty value. If the value is not known, the element may be omitted. A receiving application may ignore the information conveyed by the element. A receiving application shall not raise an error solely due to the presence or absence of the element.

O Optional. At its discretion, a sending application may populate the element with a non-empty value. A receiving application may ignore the information conveyed by the element. A receiving application shall not raise an error solely due to the presence or absence of the element.

C Conditional. There is a stated condition associated with the element. When the condition is true, a sending application shall send the element.

X Not supported. A sending application shall not populate the element. A receiving application may, if the element is received, ignore the information conveyed by the element, or may raise an error due to the presence of the element.

Z.11 Location of Conformance Resources

See ITI TF-2: Appendix W for guidance on finding conformance resources (e.g., StructureDefinition, CapabilityStatement, ValueSet, etc) for IHE profiles based on the HL7 FHIR standard.