Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May
Electronic Submission of Medical Documentation (esMD) Face to Face Informational Session esMD Requirements, Priorities and Potential Workgroups – 2:00pm.
© 2014 The MITRE Corporation. All rights reserved. Mark Russell OAuth and OpenID Connect Risks and Vulnerabilities 12/3/2014 Approved for Public Release;
Direct Implementation Perspective 0 Mark Bamberg, Vice President Research & Development MEDfx.
Hannes Tschofenig, Blaine Cook (IETF#79, Beijing).
A View into the Mi$t 1 RL "Bob" Morgan University of Washington Co-chair, InCommon Technical Advisory Committee.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1-2.1 Grid computing infrastructure software Brief introduction to Globus © 2010 B. Wilkinson/Clayton Ferner. Spring 2010 Grid computing course. Modification.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
EsMD Background Phase I of esMD was implemented in September of It enabled Providers to send Medical Documentation electronically Review Contractor.
TATRC and MITRE to NwHIN Power Team 12 June 2013 RESTful Health Exchange (RHEx)
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
OAuth-as-a-service using ASP.NET Web API and Windows Azure Access Control Maarten
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
Digital Object Architecture
HIT Standards Committee HIT Standards Committee Privacy and Security Workgroup Discussion of NwHIN Power Team Recommendations August 6,
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Enforcement mechanisms for distributed authorization across domains in UMA – aka “UMA trust” Eve Maler | 22 Aug 2012 draft.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Identity Management Hannes Tschofenig. Motivation OAuth was created to allow secure and privacy friendly sharing of data. OAuth is not an authentication.
IETF #91 OAuth Meeting Derek Atkins Hannes Tschofenig.
Automate Blue Button Initiative Pull Workgroup Meeting September 25, 2012.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
20 Oct 2014.
Observations from the OAuth Feature Survey Mike Jones March 14, 2013 IETF 86.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Security, Privacy Access openPASS Open Privacy, Access and Security Services Project Status Report July 1, 2008.
Health IT Standards Committee Update November 13, 2012 Doug Fridsma, MD, PhD, FACP, FACMI Chief Science Officer & Director, Office of Science & Technology.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Automate Blue Button Initiative Pull Workgroup Meeting December 13, 2012.
Secure Mobile Development with NetIQ Access Manager
#SummitNow Consuming OAuth Services in Alfresco Share Alfresco Summit 2013 Will Abson
OpenID Connect: An Overview Pat Patterson Developer Evangelist Architect
GEOSS Federated Single Sign-On
4/18/2018 1:15 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Consuming OAuth Services in Alfresco Share
Open Platforms for Innovation
Identity Federations - Overview
S/MIME T ANANDHAN.
FHIR BULK DATA API April 2018
Microsoft Graph- Permissions and Consent
A few recent days in the news…
SMART on FHIR for managed authorised access to medical records
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST

 “Download my data” –Patient right of access  Digital files made available to patients through a portal  No real specification of formats –Could be human-readable text of PDF  Generally a one-off –Not live access to data The original Blue Button

 “Connect my data” –Provide machine-addressable APIs to data –Access to data over time  Multiple transport and access mechanisms –S/MIME (DIRECT) –REST  Common security models –Software knows what to expect Moving to Blue Button +

 Standard RESTful API –Subset of FHIR  OAuth 2.0 for access delegation  Service discovery and trust roots –BB+ Registry component  Dynamic and trusted client registration –Profiles for different classes of client software depending on what the client is capable of at runtime  Standardized scopes for resource access  Developed in the open on GitHub Blue Button + REST

 Technology has gone a little stale –FHIR has moved forward –OAuth 2.0 Dynamic Client registration has adopted and altered BB+ “trusted registration” model  No successful bilateral pilots to date –Lots of interest from the consumer application side, little from the EHR vendor side  Some aspects should be factored out of BB+  Doesn’t focus on discrete structured data Status of Blue Button + REST

Underlying protocols

 Rights delegation and authorization protocol –A resource owner uses an authorization server to authorize a client to access a protected resource on their behalf  Open standard –Anybody can implement and use –IETF RFC 6749, 6750  In wide use across the internet –Hundreds of thousands of APIs and growing daily OAuth 2.0

The OAuth 2.0 process

 Federated identity protocol built on top of OAuth 2.0 –Open standard –In use by several large and many small players  Single-sign-on at internet scale  Key technology for solving the “multiple portals” problem  Fundamental to several major NSTIC initiatives OpenID Connect

 Consent management application built on OAuth 2.0 and OpenID Connect –Draft open standard  Allows “Alice to Bob” sharing  More on this next time from Eve Maler User Managed Access (UMA)

 Core components –OAuth 2.0: authorization and delegation –OpenID Connect: authentication and identity federation –FHIR: data access and formats  Fit-for-use applications –RHEx: provider-to-provider sharing –Blue Button + REST: provider-to-patient access Building blocks of digital health

How does this relate? Consent Management

 Current notions and laws around “consent” are biased to paper processing –HIPAA: “Must be presented in writing and signed”  Misapplication and re-use of terminology –e.g.: We have a thing called “digital signatures” that must mean the same thing as “signed” above Consent management legacy

 Conscious action –Single point of decision –Opportunity to inform –Requires some amount of effort and intent  Verifiable audit trail –When a decision was made –Who made the decision –What context the decision was made in The spirit of the law

 Explicit decision point(s) –Resource owner granting access at the authorization endpoint –Client being granted a token at the token endpoint  End user is authenticated at decision point –Appropriate rights to make the authorization decision, such as strong binding to the underlying data  Stored in a central location –Authorization server can track and provide audit  Why are we not considering this to be a record of consent? OAuth authorization decisions

 Emerging standard for detailing consent and notice decisions  Could be made available as part of the authorization server’s function  API could be queryable and aggregatable Consent receipts

Thank you