Search results

Jump to navigation Jump to search
  • ...f comments was on the Transaction Intermediation operation, and one was on authorization versus access control. #*Also noted the Eligibility Verification should be changed to Eligibility Decision.
    2 KB (303 words) - 04:02, 28 June 2018
  • ...data from and EHR to the patient. The primary use case will focus on that decision by the EHR to allow downloads. ...e proofing complete on identity, authentication and federation for the EHR authorization process.
    7 KB (1,230 words) - 04:07, 19 May 2020
  • ...he ability for a healthcare consumer to delegate authority to a Substitute Decision Maker who may act on behalf of that individual. Alternatively, a consumer m ...ess (UMA) 2.0 Grant for OAuth 2.0 Authorization] provides consent to the [[Authorization Server]] to release user PHII.
    10 KB (1,599 words) - 22:38, 20 March 2021
  • ...e or more sources of appropriate credentials that do meet the criteria for authorization at the RP. ...hat may involve user acceptance or change the PET to meet those particular authorization requirements.
    11 KB (1,838 words) - 16:48, 19 January 2016
  • can make an informed decision. When a new user visits a relying party site, the user should be presented [[IDEF Functional Model AUTHORIZATION|AUTHORIZATION]],
    3 KB (500 words) - 22:51, 12 October 2018
  • ...mark_Evolving_Design_Pattern#Actors Users] need to be able to make a trust decision from the information on a publicly accessible internet site with an IDESG T ...e or more sources of appropriate credentials that do meet the criteria for authorization at the RP.
    24 KB (3,856 words) - 16:05, 16 December 2021
  • ...ases it is the guardian of the user that needs to be involved in the trust decision. ...ys_uri must not be confused with the keys that an OIDC entity is using for Authorization/AccessToken/RefreshToken/UserInfo requests and responses. Those keys are fo
    21 KB (3,285 words) - 23:37, 15 January 2020
  • [[Authorization]], [[Authorization Decision]], [[Authorization Decision Assertion]], [[Back Channel]], [[Binding]], [[Credentials]], [[End User]], ...Qualifier]], [[Namespace]], [[Party]], [[Persistent Pseudonym]], [[Policy Decision Point]], [[Policy Enforcement Point]],
    2 KB (226 words) - 04:02, 28 June 2018
  • ...s that we are covering in the IDEF registry in the self-attestation form - authorization, user interfaces and communications, for example was feedback Mary brought
    6 KB (928 words) - 04:02, 28 June 2018
  • #Use Case 4-party Authentication & Authorization Template (Excel), 3 tabs #*Authentication Decision
    5 KB (796 words) - 03:58, 28 June 2018
  • ...information that leads to an eligibility, authentication or authorization decision. If USERS seek redress, they must be provided with a mechanism to dispute o ...resented along with the source of any information that contributed to that decision.
    3 KB (447 words) - 04:01, 28 June 2018
  • *The intended audience of this page is for decision makers and so has limited technical details. Click on the [[Identity Model] ...own below with the three broad categories of entity. The separation of the Authorization from Identity and Attribute Providers ensures that identity tokens are neve
    5 KB (842 words) - 04:01, 28 June 2018
  • *Back-out or cancel a decision made by the user, including the choice of a governing Trustmark. ...ased Access]] shows the use of one web page to users with different access authorization attributes.
    12 KB (1,958 words) - 17:45, 25 May 2019
  • ...for the purposes of registration or [[IDEF Functional Model AUTHORIZATION|authorization]]. | Eligibility Decision || Decision that an entity does or does not meet the pre-determined eligibility require
    2 KB (246 words) - 04:00, 28 June 2018
  • =="Authorization"== "Authorization" is defined in the IDEF Functional Model in part as a '''"Process of granti
    2 KB (269 words) - 22:53, 12 April 2020
  • ...e or more sources of appropriate credentials that do meet the criteria for authorization at the RP. ...hat may involve user acceptance or change the PET to meet those particular authorization requirements.
    10 KB (1,596 words) - 20:11, 15 October 2019
  • The implementation of a decision that determines the Permissions of a Group, a Role or an identity whose acc ...rtions. See also attribute authority, authentication authority, and policy decision point (PDP).
    135 KB (15,051 words) - 04:00, 28 June 2018
  • ...d with specific on-line resources and/or services that together derive the decision about whether to allow a given individual to gain access to those resources ...ased on the implementation of an agreed-upon set of security controls. See Authorization.
    845 KB (86,833 words) - 04:00, 28 June 2018
  • Four Party Authentication and Authorization ...ider obtains information about a User sufficient to make an access control decision based on identity and attribute information gathered from the Identity Prov
    7 KB (1,007 words) - 03:58, 28 June 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)