You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our current sample access-checkers, i.e., patient and list are intended for app facing scenarios. Another common scenario is when a backend service needs to interact with the FHIR server (e.g., pipelines in fhir-data-pipes). We are going to adopt SMART Backend Services spec as the standard way for such scenarios and implement a sample AccessChecker based on that.
The text was updated successfully, but these errors were encountered:
A large part of supporting SMART Backend spec lies inside the IDP/Authorization server, e.g., Keycloak. To close this issue, we need to do the following:
Implement a new SmartBackendAccessChecker similar to PatientAccessChecker to check SMART scopes when granting access. This should require fairly small amount of code and should heavily rely on SmartScopeChecker (which may require some refactoring).
The integration tests here should be updated to exercise both of these two authentication methods (to gain an access-token) and also the new SmartBackendAccessChecker.
Once this feature is implemented we should also update fhir-data-pipes and add support for client-confidential-asymmetric flow, but we will track that in that repo. Note the client-confidential-symmetric flow was implemented in this PR.
Our current sample access-checkers, i.e.,
patient
andlist
are intended for app facing scenarios. Another common scenario is when a backend service needs to interact with the FHIR server (e.g., pipelines in fhir-data-pipes). We are going to adopt SMART Backend Services spec as the standard way for such scenarios and implement a sampleAccessChecker
based on that.The text was updated successfully, but these errors were encountered: