Don't insecurely expose DTR app's payer-granted OAuth2 access_token to EHR. - DTR #53

XMLWordPrintableJSON

    • Type: Change Request
    • Resolution: Persuasive with Modification
    • Priority: Medium
    • US Da Vinci DTR (FHIR)
    • STU3
    • Clinical Decision Support
    • (profiles) [deprecated]
    • Retrieval of Payer R
    • Hide

      Update the specification to remove passing the fhirAuthorization structure, including the payer's OAuth2's access_token.

      Specifically this sentence:

      • fhirAuthorizationOPTIONAL_object_A structure holding an OAuth 2.0 bearer access token granting the DTR Application access to payer FHIR resources, along with supplemental information relating to the token

      http://hl7.org/fhir/us/davinci-dtr/2019May/specification__behaviors__retrieval_of_payer_resources.html

      Show
      Update the specification to remove passing the fhirAuthorization structure, including the payer's OAuth2's access_token. Specifically this sentence: fhirAuthorizationOPTIONAL_object_A structure holding an OAuth 2.0 bearer access token granting the DTR Application access to payer FHIR resources, along with supplemental information relating to the token http://hl7.org/fhir/us/davinci-dtr/2019May/specification__behaviors__retrieval_of_payer_resources.html
    • Bob Dieterle / Floyd Eisenberg: 9-0-3
    • Correction
    • Non-compatible

      Existing Wording: The information needed to obtain the needed resources will be provided as escaped JSON in the appContext property of the CDS Hooks Card Link object, as described in Section 4.2.1. That object will have the following properties:

      Field Optionality Type Description

      fhirAuthorization OPTIONAL object A structure holding an OAuth 2.0 bearer access token granting the DTR Application access to payer FHIR resources, along with supplemental information relating to the token.

      Comment:

      The appContext CDS Hooks field is intended to allow a CDS Hooks service pass information to SMART app. The profiled template and request parameters are an appropriate use of this field. The proposed fhirAuthorization element is not appropriate because it gives the CDS client (EHR) access to the OAuth bearer token intended for the SMART app. This is a security violation. The SMART app must authenticate to the payer's resource server in some other way. A creative solution would be permitting the existing, EHR-generated access_token to be used to authenticate against the payer's resource server by having the payer validate the EHR access_token against an EHR introspection endpoint (aka Josh's imaging access for consumers proposal). A more mundane and easier solution would backend service/client_credentials app-level access to the payer's resource server.

      Summary:

      Don't insecurely expose DTR app's payer-granted OAuth2 access_token to EHR.

            Assignee:
            Unassigned
            Reporter:
            Michael Clifton
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: