Healthcare Provider Directories 2011-Jan-24 Eric Heflin Dir of Standards and Interoperability/Medicity.

Slides:



Advertisements
Similar presentations
Integrating the Healthcare Enterprise
Advertisements

PRESENTATION TITLE Name of Presenter Company Affiliation IHE Affiliation.
Care Services Discovery
UDDI v3.0 (Universal Description, Discovery and Integration)
Cross-Enterprise Document Sharing Cross-Enterprise Document Sharing Bill Majurski National Institute of Standards and Technology IT Infrastructure Co-Chair.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
Cross Domain Patient Identity Management Eric Heflin Dir of Standards and Interoperability/Medicity.
Organizing IHE Integration Profiles related to the Electronic Health Record Input to the IHE ITI Tech Committee November 2002 Charles Parisot, GE Medical.
Understanding Active Directory
Integrating the Healthcare Enterprise IHE Technical Committee Status IHE ITI Plan Committee - February 2004.
Cross Domain Patient Identity Management Eric Heflin Dir of Standards and Interoperability/Medicity.
What IHE Delivers Healthcare Provider Directories IHE IT Infrastructure Planning Committee Eric Heflin – Medicity/THSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Initial slides for Layered Service Architecture
Cross-Enterprise Document Sharing Cross-Enterprise Document Sharing Bill Majurski National Institute of Standards and Technology IT Infrastructure Co-Chair.
Integrating the Healthcare Enterprise
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Audit Trail and Node Authentication Robert Horn Agfa Healthcare.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Identity Management Report By Jean Carreon and Marlon Gonzales.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
What IHE Delivers Security and Privacy Overview & BPPC September 23, Chris Lindop – IHE Australia July 2011.
Integrating the Healthcare Enterprise Enterprise User Authentication and Consistent Time Glen Marshall Co-Chair, IHE IT Infrastructure Planning Committee.
XDS Security ITI Technical Committee May 26, 2006.
IHE Profile – SOA Analysis: In Progress Update Brian McIndoe December 6, 2010.
Cross-Enterprise User Assertion IHE Educational Workshop 2007 Cross-Enterprise User Assertion IHE Educational Workshop 2007 John F. Moehrke GE Healthcare.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
September, 2005What IHE Delivers 1 Cross-Enterprise Document Point-to-point Interchange (XDP) IHE Vendors Workshop 2006 IHE IT Infrastructure Education.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Sharing Value Sets (SVS Profile) Ana Estelrich GIP-DMP.
Document Digital Signature (DSG) Document Digital Signature (DSG) Gila Pyke / Lori Reed-Fourquet Smart Systems for Health Agency / Identrus IHE ITI Technical.
Review and update of IHE The Future & XDS–I. Overview - IHE Updates IHE Organisational Changes The Infrastructure Domain Radiology Update XDS-I.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Dynamic Document Sharing Detailed Profile Proposal for 2010 presented to the IT Infrastructure Technical Committee Karen Witting November 10, 2009.
An XML based Security Assertion Markup Language
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
IHE IT Infrastructure Domain Update Karen Witting – IBM IT Infrastructure Planning Committee co- chair.
Integrating the Healthcare Enterprise Personnel White Pages Profile Name of Presenter IHE affiliation.
Cross-Enterprise User Authentication John F. Moehrke GE Healthcare IT Infrastructure Technical Committee.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Patient Identity Management Eric Heflin Dir of Standards and Interoperability/Medicity.
November 10, 2009 SOCIAL SECURITY ADMINISTRATION-HIT SUPPORT Health IT Provider Registry IHE Proposal Overview Proposed Editor: Shanks Kande, Nitin Jain.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Patient Identifier Cross-referencing Charles PARISOT GE Healthcare.
October 7, 2009 SOCIAL SECURITY ADMINISTRATION-HIT SUPPORT Health IT Provider Registry IHE Proposal Overview Proposed Editor: Shanks Kande, Marty Prahl.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
IHE IT Infrastructure Domain Update Karen Witting – IBM IT Infrastructure Technical Committee co-chair.
Dynamic/Deferred Document Sharing (D3S) Profile for 2010 presented to the IT Infrastructure Technical Committee Karen Witting February 1, 2010.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Cross-Enterprise User Authentication Year 2 March 16, 2006 Cross-Enterprise User Authentication Year 2 March 16, 2006 John F. Moehrke GE Healthcare IT.
Integrating the Healthcare Enterprise Improving Clinical Care: Enterprise User Authentication For IT Infrastructure Robert Horn Agfa Healthcare.
Integrating the Healthcare Enterprise The IHE Process: Developing Standards-based Solutions Kevin O’Donnell Co-chair, IHE Radiology Planning Committee.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
XDS Security ITI Technical Committee May, XDS Security Use Cases Prevent Indiscriminate attacks (worms, DOS) Normal Patient that accepts XDS participation.
Integrating the Healthcare Enterprise Title of Presentation Name of Presenter IHE affiliation.
Integrating the Healthcare Enterprise Retrieve Information for Display (RID) Integration Profile Ellie Avraham Kodak Health Imaging IHE IT Infrastructure.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
What IHE Delivers Healthcare Provider Directories IHE IT Infrastructure Planning Committee Eric Heflin - Medicity.
Healthcare Provider Directory Eric Heflin Dir of Standards and Interoperability/Medicity.
IHE IT Infrastructure Integration Profiles: Adaptation to Cardiology Harry Solomon.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
IT Infrastructure Plans
Patient Identifier Cross-Referencing for MPI (PIX)
Radiology Option for Audit Trail and Node Authentication Robert Horn
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Integrating the Healthcare Enterprise
IHE: Integrating the Healthcare Enterprise
Presentation transcript:

Healthcare Provider Directories 2011-Jan-24 Eric Heflin Dir of Standards and Interoperability/Medicity

Audience/Scope Agenda –Introduction –Terms Used –Personnel White Pages (PWP) –Healthcare Provider Directories (HPD) –Cross-Enterprise User Assertions (XUA) –Relationships Between HPD and PWP –For More Information

Audience/Scope Audience –Senior healthcare IT technical executives –Architects –Implementers seeking a broad overview Scope –Broad context and guidance about the use of two IHE standard profiles for provider directories –Personnel White Pages and Healthcare Provider Directory Purpose –Provide reusable educational content

Introduction IHE has created two standards (profiles) for healthcare-related directories One profile targets people inside an enterprise The second profile targets people and organizations across enterprises This presentation introduces and compares both profiles

HPD / PWP Relationship Internet Organization A PWP Directory HPD Directory Organization B Local person lookup Cross organization person or organization lookup No local directory; Uses cross organizational directory lookup

HPD/PWP Terms Used Directory: A type of database, typically with a hierarchal structure, supporting queries to determine a list of matching subjects, or determining attributes about a subject. Healthcare Provider: Medical information entities such as physicians, medical laboratories, hospitals, dentists, pharmacists, nurses, diagnostic imaging professionals etc. This includes both individuals as well as organizations. LDAP (Lightweight Directory Access Protocol): A type of directory that is widely deployed, multi-vendor, and mature. HPD (Healthcare Provider Directory): An IHE profile and a specific instance of a directory with defined attributes and service interfaces. Defined in more detail in this presentation. PWP (Personnel White Pages): An IHE profile and a specific instance of a directory with defined attributes and service interfaces. Defined in more detail in this presentation. DSML (Directory Services Markup Language): An XML grammar for accessing LDAP directories. XUA: A method of expressing identity attributes across domains.

XUA Terms Used Assertion: A piece of data produced by a SAML authority regarding either an act of authentication performed on a subject, attribute information about the subject, or authorization data applying to the subject with respect to a specified resource. This Assertion is used in access control and audit trails. Federated Identity: A user’s identity is said to be federated between a set of Providers when there is an agreement between the providers on a set of identifiers and/or attributes to use to refer to the user. Identity Provider : A type of service provider that creates, maintains, and manages identity information for users and provides user authentication to other service providers within a federation, such as with web browser profiles. Security Assertion Markup Language (SAML): The set of specifications describing security assertions that are encoded in XML, profiles for attaching the assertions to various protocols and frameworks, the request/response protocol used to obtain the assertions, and bindings of this protocol to various transfer protocols (for example, SOAP and HTTP). Security Domain: An environment defined by a single set of security policies, including a set of people, equipment, facilities, procedures. A Security Domain may be a single enterprise or a collection of enterprises (e.g. IHE-XDS Affinity Domain). Principal: A person or system who makes use of a system and its resources for any purpose.

PWP – PERSONNEL WHITE PAGES

What Problem is Being Solved? PWP Problem Statement: The industry needs a standards-based method access to basic directory information on human workforce members to other workforce members within the enterprise.

PWP Definition Personnel White Pages Profile (PWP) provides access to basic human workforce user directory information. This information has broad use among many clinical and non-clinical applications across the healthcare enterprise. The information can be used to enhance the clinical workflow (contact information), enhance the user interface (user friendly names and titles), and ensure identity (digital certificates).

PWP Selected Use Cases Username query to determine user’s full name Determine a user’s organization identification Determine a user’s address Determine a user’s name given his/her initials Determine a user’s name given his/her provider ID

PWP Scope Provide access to basic information about the human workforce members –Does not include Patients Defines method for finding the PWP Defines query/access method Defines attributes of interest Leverages an ISO standard

PWP Value Single Authoritative Knowledge Base –Reduce duplicate and unconnected user info database –Single place to update Name Changes New Phone Number Additional Addresses Enhance Workflow and Communications –Providing information necessary to make connections Phone Number Address Postal Address

PWP Actor Diagram Personnel White Pages Consumer DNS ServerPersonnel White Pages Directory Find Personnel White Pages [ITI-23] Query Personnel White Pages [ITI-24]

PWP Actors Three Actors –Personnel White Pages Consumer –DNS Server –Personnel White Pages Directory Two Transactions –Find Personnel White Pages [ITI-23] –Query Personnel White Pages [ITI-24] No Options

PWP Process Flow

PWP Security and Privacy Security and privacy for and PWP is established via other mechanisms –ATNA for node authentication and secure logging –EUA to authenticate users –XUA for access control –IT best practices Regional-specific legal, regulatory, policy, privacy, and security analysis is suggested See the HPD profile for an analysis X.509 keys can be stored in HPD or PWP directories

PWP References For more information on PWP, please see: –IHE ITI Technical Framework Profile 10.pdfhttp:// 10.pdf –IHE ITI Technical Framework Transactions 10.pdfhttp:// 10.pdf –Wiki Page –John’s 2004 PWP slide deck (URL??)

HPD – HEALTHCARE PROVIDER DIRECTORY

What Problem is Being Solved? HPD Problem Statement: The industry needs a standards-based method to support queries against, and management of, healthcare provider information that may be publicly shared in a directory structure.

HPD Definition HPD supports queries against, and management of, healthcare provider information that may be publicly shared in a directory structure. HPD directory structure is a listing of the following two categories of healthcare providers that are classified by provider type, specialties, credentials, demographics and service locations. –Individual Provider: A person who provides healthcare services, such as a physician, nurse, or pharmacist. –Organizational Provider: Organization that provides or supports healthcare services, such as a hospital, Healthcare Information Exchange (HIE), Managed Care, Integrated Delivery Network (IDN), and Association.

HPD Selected Use Cases Yellow pages lookup Query providers and their associations for Social Services Disability Determination Emergency Responders Identification in planning for an emergency event Provider Authorization and lookup during an emergency event Forwarding of Referral Documents to a Specialist Certificate Retrieval Language Retrieval

HPD Scope Designed to maintain a structured list of attributes for both organizations (such as clinics) and people (such as physicians) Allows extensibility Largely semantically interoperable Leverages ISO standard (21091) Designed to enable cross organizational directory access

HPD Value Single Authoritative Knowledge Base –Reduce duplicate and unconnected user info database –Single place to update Name Changes New Phone Number Additional Addresses Enhance Workflow and Communications –Providing information necessary to make connections Phone Number Address Postal Address

HPD Value Enhance User Interactions –Provide user friendly identities and lists List of members Displayable name of a user Initials query Contributes to Identity Management –Additional methods of identity cross verification Name, address, phone number, Cross reference with Enterprise User Authentication identity –Future expansion likely will contain certificates

HPD Actor Diagram Provider Information Source Provider Information Directory Provider Information Consumer Provider Information Feed [ITI-59] Provider Information Query [ITI-58]

HPD Actors Three Actors –Provider Information Directory –Provider Information Consumer –Provider Information Source Two Transactions –Provider Information Query [ITI-58] –Provider Information Feed [ITI-59] One Option –Provider Information Feed [ITI-59]

HPD Options Provider Information Feed Option When the Provider Information Feed Option is declared the Provider Information Directory shall support the Provider Information Feed [ITI-59] transaction

HPD Relationships

HPD Process Flow

HPD Organizational Provider

HPD Individual Provider

HPD Security and Privacy Security and privacy for HPD is established via other mechanisms –ATNA for node authentication and secure logging –EUA to authenticate users –XUA for access control –PWP for system users identification –IT best practices –LDAP authentication for attribute protection Regional-specific legal, regulatory, policy, privacy, and security analysis is suggested See the HPD profile for an analysis X.509 keys can be stored in HPD or PWP directories

HPD Standards Used LDAP DSML ISO/TS 21091

HPD References For more information on HPD, please see: –IHE Technical Framework –ISO TS 21091:2005 – Requires purchase

XUA – CROSS-ENTERPRISE USER ASSERTION

XUA Definition XUA specifies the use of an existing standard (SAML 2.0) to carry cross-enterprise attributes identifying a person or system making a request Cross-Enterprise User Assertion provides a means to communicate claims about the identity of an authenticated principal (user, application, system...) in transactions that cross- enterprise boundaries. The XUA Profile supports enterprises that have chosen to have their own user directory with their own unique method of authenticating the users, as well as others that may have chosen to use a third party to perform the authentication.

XUA Introduction XUA based on SAML 2.0 XUA++ enhances XUA to indicate several key SAML attributes A complete discussion of XUA can be found in other IHE documents (see references section) Here we primarily discuss the relationships between XUA and HPD/PWP

XUA PWP/HPD Relationship Organizations are responsible for identity proofing, authenticating, authorizing and managing end-users credentials compliant with local policy XUA / XUA++ attributes can be maintained in PWP and HPD directories Selected PWP and HPD attributes can be subsequently expressed in XUA Implies that users should never be removed from PWP or HPD directories; only depreciated to preserve log integrity

SUMMARY

HPD/PWP Comparisons AttributeHPDPWP IHE Profile DependencyNone Other DependenciesLDAP, DSMLLDAP Service InterfacesWeb ServicesLDAP API Secured ByChannel (TLS, VPN, ATNA) VLAN, LDAP authentication, TLS, ATNA Cross EnterpriseYesNo Contains human informationYes Contains organization informationYesNo Contains patient informationNo LDAP basedYes Directory location determinationPre-ConfiguredDNS Query for LDAP Dirs

Other IHE References General information about IHE can be found at: – Information about the IHE IT Infrastructure domain can be found at: – Information about the structure of IHE Technical Frameworks and Supplements can be found at: – and

Credits: –Selected content copied from other IHE sources including the ITI Framework Profiles, Transactions, Supplements, and educational materials Reviewers: –John, Karen, Rob, Geoff, will list all

What Problem is Being Solved? XUA Problem Statement: The industry needs a standards-based method to provide the initiating user’s identity in cross-enterprise transactions in a way that the responder can make access decisions and proper audit entries.

XUA Motivation The IHE profiles available today provided for distributed accountability that is tied together through the use of node-to- node authentication between systems that agree to handle access controls and audit trails. Access control policies are becoming more complex. Systems are often built on architectures that are loosely coupled such as n-tier web-services. The result is that the user is further away from the data. While an enterprise can impose a single authentication technology and a single personnel directory, multiple enterprises that participate in an affinity domain may not be able to impose a single authentication technology or personnel directory.

XUA Selected Use Cases 1 2 3

XUA Scope Designed to enable cross organizational user identification Supports federated as well as centralized identity management Decouples authentication implementation (Kerberos, PKI, biometrics, etc.) while allowing awareness of core attributes and context The context is essential for complex policy enforcement Supports requesters such as: IT systems, direct end-users, proxy end-users, medical devices, and health information exchange gateways Only provides identity attributes; doesn’t specific how access control decisions are to be made by the service provider XUA can be used by many different cross-enterprise transactions

XUA Trust Model A SAML Security Token Server (STS) is the primary trusted entity The receiver can validate a token issued by the STS

Why SAML 2.0? Open standard Supports homogenous and heterogeneous environments Can carry multiple user authentication assertions Identities are marked with the assurance level each provides Can carry additional attributes about the user such as , role, address, preferences (from PWP or HPD) The identity information can be a pseudonym when appropriate to limit user exposure across enterprise boundries The assertion content can be defined by the service that will consume them A SAML Assertion to carry security tokens from one or more Authentication system including Kerberos and X.509 Assertion provides a unique identifier suited for audit trails. The system allows for each enterprise to manage their users independent of the transactions. The information necessary to build a SAML Assertion is only communicated at the time the transaction happens, not when the user is provisioned.

XUA Value Contributes to Identity Management

HPD Actor Diagram Provider Information Source Provider Information Directory Provider Information Consumer Provider Information Feed [ITI-59] Provider Information Query [ITI-58]

XUA Actors

EHR / XUA Profile Actor Diagram

HPD Actors Three Actors Two Transactions One Option

HPD Options Provider Information Feed Option When the Provider Information Feed Option is declared the Provider Information Directory shall support the Provider Information Feed [ITI-59] transaction

HPD Process Flow

XUA Security and Privacy Security and privacy for XUA is established via other mechanisms –ATNA for node authentication and secure logging (no new ATNA audit events are defined by XUA) –EUA to authenticate users –PWP for system users identification –IT best practices Regional-specific legal, regulatory, policy, privacy, and security analysis is suggested X.509 keys can be stored in HPD or PWP directories