Search loading...

API Hub

Explore and Make use of Nationally Defined Messaging APIs

 

Security

The security page shows how to establish initial security credentials (where necessary) with the a ITK3 Messaging Solution

What is ITK3 Messaging Solution Security?

ITK3 Messaging Solution Security often encapsulates authentication and encryption. However, various concepts requiring diverse expertise and approaches need to be considered especially concerning testing and quality:

  • Authentication: reliably identify end user
  • Authorisation: identified user access to correct resources/data
  • Encryption: hide information from unauthorized access
  • Signatures: ensure information integrity

Two common ways of accessing and managing ITK3 Messaging Solution security based on the need to balance access to ITK3 Messaging Solutions with the permissions to access the information contained within the ITK3 FHIR Documents and messages include:

  • Federation: reusing Credentials & Spreading Resources
  • Delegation: access and rights can be given to authorized users

Authentication and Authorisation

Authentication and authorisation are commonly used together:

  • Authentication: reliably identify end user
  • Authorisation: identified user access to correct resources/data

Authentication is most often implemented with a user-name and password. To increase the security this can be supplemented by adding

  • software certificates,
  • hardware keys and
  • external devices.

Authorisation occurs once the user is authenticated, the system decides which resources or data to allow access to.

Security and ITK3 Messaging Solutions

Security is a key consideration when establishing ITK3 Messaging Solution projects and should be considered within the design from the start of any project. The four key principles to consider are:

  • Authentication
  • Authorisation
  • Encryption
  • Signatures

For more information on the wider design decisions involved in providing safe access to information please see:

  • Safe, legal and secure guide from developer.nhs.uk provides an overview of some design decisions and considerations to consider when implementing APIs.

ITK3 Messaging Solution Considerations

Other ITK3 Messaging Solution consideration are shown below. Please click on the parts of the ITK3 Messaging Solution process to continue your ITK3 Messaging Solution creation journey.

Page-1 Sheet.10 Circle.3 Circle.2 Rectangle Key: Key: Circle.16 Circle.17 Circle.18 Rectangle.19 Provided Provided Rectangle.20 Explained Explained Rectangle.21 Local Decision Local Decision ITK3 Messaging Solution ITK3 Messaging Solution MessagingSolution Endpoint Endpoint Endpoint Transform Transform Transform Traffic Management Traffic Management TrafficManagement Versioning Versioning Versioning Engage Engage Engage ITK3 Messaging Solution Documentation ITK3 Messaging Solution Documentation MessagingSolutionDocumentation Report & Monitor Report & Monitor Report & Monitor Patterns / Topology Patterns / Topology Patterns / Topology Access Access Access Security Security Security
Tags: design

All content is available under the Open Government Licence v3.0, except where otherwise stated