Purpose & Requirements
...
We extract client access type from token, analyze `access_type` = BROKER, and require brokers (not own) API-key in WS request.
Clientclient_type | Purpose | access_type |
---|
Auth_FE | Auth frontEnd | DIRECT |
MSP | Medical service provider | BROKER |
MIS | Medical information system | DIRECT |
NHS_Admin | Admin console of the NHS | DIRECT |
MITHRIL ADMIN | Admin console of the Mithril itself | DIRECT |
PHARMACY | Pharmacy | BROKER |
UADDRESSES ADMIN | Admin of UA adresses | DIRECT |
Info |
---|
For create new clients need validate object `client.priv_settings` on mandatory attribute `access_type` & mapping values (client_type :: access_type) |
Send & Get API-key
Some clients (which `access_type` = BROKER) must be send (mandatory) API-key as a attribute `API-key` in HEADER all request.
Example:
Code Block |
---|
curl --include \
--request POST \
--header "Content-Type: application/json" \
--header "Authorization: Bearer mF_9.B5f-4.1JqM" \
--header "API-key: d09vQUFlWTZ6Q0RXRDJISldUOVQ3dz09" \
--data-binary "{
\"medication_request_request\": {
.... |
Manage MIS broker scope
For some clients (client_type = MIS) which provide transfer for call API - we need mandatory validate possibility access to API endpoints.
Proposed use new attribute `broker_scopes` in JSON object in column `client.priv_settings`.
If attribute `broker_scopes` not exist in `client.priv_settings` - we don`t need validate access over broker!
Client_type | Purpose | validate_broker_scopesclient.priv_settings |
---|
Auth_FE | Auth frontEnd |
|
MSP | Medical service provider |
|
MIS | Medical information system | "broker_scopes": "legal_entity:read declaration:read employee:read" |
NHS_Admin | Admin console of the NHS |
|
MITHRIL ADMIN | Admin console of the Mithril itself |
|
PHARMACY | Pharmacy |
|
UADDRESSES ADMIN | Admin of UA adresses |
For clients (client_type = MIS) on which we will check access for call API endpoint - we need describe the list `broker_scopes`.
Proposed manage & store list `broker_scopes` in attribute `priv_settings` in table `clients`.
Example:
Code Block |
---|
|
{
"allowed_grant_types": [
"password",
"access_token"
],
"access_type": "direct",
"broker_scopes":
"legal_entity:read
declaration:read
employee:read"
} |
In case of need complex disconnect MIS for transfer of call API endpoints - we need full clear him `broker_scopes`.
Clear, but not delete!
Validate MIS transfer scope
When MSP call specific API endpoint over (transfer) MIS we need validate possibility to access.
- Get `client_id` from `token`
- Read `clients` for `client_id`. (further in the text - `REQUEST_CLIENT`)
- Extract `access_type` from `priv_settings`.
- If `access_type` = `BROKER`
- Read `API-key` from HEADER
- if API-key missing - return 401 error "API-KEY header required !"
- Validate `API-key`.
- Validate exists `secret` in table `clients`
- if invalid - return 401 error "Not found API-keyKEY header required !" (!!! text error - TBD)
- Read `clients` with `secret`(API-key) in header. (further in the text - `BROKER_CLIENT`)Extract `access_type` from `priv_settings`. If `access_type` = `BROKER` - return error "Incorrect API-key!" (!!! text error - TBD)
- Extract `broker_scopes` from `priv_settings` .
- if not found `broker_scopes` -
- return - return 401 error "Incorrect broker settings!"
(!!! text error --
TBD)
- Read needed scopes for call API Endpoint (read from GateWay configuration - "/gateway-config.yaml")
- Validate exist needed scopes in `broker_scopes` of `BROKER_CLIENT`.
- if invalid - return 403 error " Conflict !" (!!! text error - TBD)Scope is not allowed by broker"
- If `access_type` = `DIRECT`
- break validation.
Configuration examples
Comments | clients.priv_settings |
---|
MSP | { "allowed_grant_types": [ "password", "access_token" ], "access_type": "broker" } |
Normal MISIncorrect MSP | { "allowed_grant_types": [ "password", "access_token" ], "access_type": "direct |
", broker_scopes": "legal_entity:read declaration:read employee:read" Blocked Normal MIS | { "allowed_grant_types": [ "password", "access_token" ], "access_type": "direct", "broker_scopes": "legal_entity:read declaration:read employee:read" } |
Incorrect Full blocked MIS | { "allowed_grant_types": [ "password", "access_token" ], "access_type": "direct", "broker_scopes": "" } |
Incorrect 2 | { "allowed_grant_types": [ "password", "access_token" ], "access_type": " |
broker", "broker_scopes": "legal_entity:read declaration:read employee:read" }
Tests
MIS Authorization Test Page