ЕСОЗ - публічна документація
PIS. Confidant patient sign-up registration
Purpose
This WS is designed to register patient in the system based on data received from Patient Information System.
Key points
This method must be used only by Auth front-end
Validates session token (jwt) that was obtained as a result of signed content as well as patient data validation by PIS. Confidant patient sign-up validation and signed content, skips revalidation of patient data.
Creates user as well as patient in the system
Generates access token for further actions
Specification
Validate request
Authorization
Verify the validity of access token
in case of error - return 401 (“Invalid access token”)
Verify that token is not expired
in case of error - return 401 (“Invalid access token”)
Check user scopes in order to perform this action (scope =
confidant_person:sign_up
)return 403 (“Your scope does not allow to access this resource. Missing allowances: confidant_person:sign_up”) in case of invalid scope(s)
Validate signed content
Check
signed_content
andsigned_content_encoding
are submittedin case of error - return 422 ('required property signed_content was not present' or ‘required property signed_content_encoding was not present')
Check signed content is a valid base64
in case of error - return 422 ('Invalid signed content')
Check signed content encoding is a 'base64' value
in case of error - return 422 ('is invalid')
Check digital signature is valid
in case of error - return 400
Check that signer of the request relates to the authenticated person. Get person from MPI using
x-person-id
and ensure thatperson.tax_id
orperson.documents
is equal to signer drfo (from digital signature)if drfo value equals to tax_id regexp (
^[0-9]{10}$
) - compare with person.tax_idif drfo value equals to national_id number regexp (
^[0-9]{9}$
) - compare with document with type 'NATIONAL_ID'if drfo value contains at least one letter, perform reverse transliteration of field using existing algorithm (described here), then check that value equals to passport number regexp (
^((?![ЫЪЭЁ])([А-ЯҐЇІЄ])){2}[0-9]{6}$
) - compare with document with type 'PASSPORT'in case of error - return 401 ('Unable to authenticate signer')
Validate JWT
Ensure that token provided in payload (obtained from PIS. Confidant patient sign-up validation ) is valid
validate JWT signature
validate issuer (
iss
= Ehealth)validate aud (
aud
= pis-registration)validate expiration (
exp
in the future)validate
content_hash
equals to MD5 hash value ofsigned_content
fieldin case of any error - return 401 ('Unauthorized')
Validate person registration request
Validate person data according to Rules to validate patient data | Person with confidant
Check that
confidant_person.person_id
is the same person who signed request (confidant_person.person_id
=x-person-id
)in case of error - return 422 ('Confidant person and signer must be the same')
Check
patient_signed
field value equals to ‘true’in case of error - return 422 ('expected true but got false for attribute %{attribute}')
Check
process_disclosure_data_consent
field value equal to ‘true’in case of error - return 422 ('expected true but got false for attribute %{attribute}')
Service logic
Search person
Search for existing active person in mpi database with data from person registration request according to existing process, described here Create/Update person request | Search person
Calculate score of comparison between found active persons and person registration request using existing deduplication process, described here Deduplication process NEW
Compare found score with PIS_ONLINE_DEDUPLICATION_MATCH_SCORE config parameter, set to ‘0.95’:If one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - save its
person_id
and proceed to PIS. Confidant patient sign-up registration | Check confidant person relationshipIf more than one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - return 401 ('It is impossible to uniquely identify the person.')
If no active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - proceed to PIS. Confidant patient sign-up registration | Create person
Result | Actions |
---|---|
One active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found | |
More than one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found |
|
No active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found |
Create person
Create new person in mpi database, set values in following tables based on person registration request:
persons
tableperson_phones
tableperson_addresses
tableperson_documents
tableperson_authentication_methods
table
Save signed content to media storage
Submit person on verification - create record in person_verifications table for person_id, set values for each verification stream:
Manual NHS verifiation
if
$.person.confidant_person
exists in person registration request or$.person.documents
contains document with type = 'PERMANENT_RESIDENCE_PERMIT' or$.person.unzr
is not empty and first 8 digits of$.person.unzr
!=$.person.birth_date
set nhs_verification_status = NOT_VERIFIED
set nhs_verification_reason = DOCUMENTS_TRIGGERED
else - scan copies of persons documents are not needed, set verification status according to logic, described here: Sign person request | Manual NHS verification
DRFO registry verification - according to logic, described here: Sign person request | DRFO registry verification
DRACS death acts registry verification - according to logic, described here: Sign person request | DRACS death acts registry verification
Calculate cumulative person verifiation status according to logic, described here: Sign person request | Calculate cumulative verification status
Create confidant person relationship
Service must create unverified relationship between confidant person and related person for further verification by responsible person on NHS side
Call Create confidant person relationship. Set values:
confidant_person_id = $request.confidant_person.person_id
person_id = person.id
verification_status = “VERIFICATION_NEEDED”
verification_reason = “ONLINE_TRIGGERED_BY_PIS_REGISTRATION_VIA_CONFIDANT“
confidant_person_relationship_documents = person.confidant_person.documents_relationship
In case if persons age < person_full_legal_capacity_age years old:
calculate relationship_expiration_date - date when person becomes person_full_legal_capacity_age years old
check if $.active_to <= relationship_expiration_date
if true - set active_to = $.active_to
else - set active_to = relationship_expiration_date
Check confidant person relationship
Get confidant_person_id from token (new header x-person-id)
Check relationship using Check confidant person relationship and having confidant_person_id and person_id
If relationship doesn’t exist - Create relationship PIS. Confidant patient sign-up registration | Create confidant person relationship
Search user in Mithril
Search for existing user in mithril database,
users
table, with person_id = person_id and is_active = trueIf user is found - check it is not blocked (is_blocked <> true)
in case blocked - return 401 ('User is blocked.').
in case not blocked - save its
user_id
and proceed to p.3.
If user is not found - proceed to p.4.
Create user if not exists
Create user for active person in mithril database,
users
table, set:id = autogenerate uuid
settings = ‘{“trusted_source”: false}’
priv_settings = ‘{"login_hstr": [], "otp_error_counter": 0}’
inserted_at = now()
updated_at = now()
password_set_at = now()
tax_id =
tax_id
ordocument.number
from payload (if both where passed - thentax_id
must be used)person_id =
person_id
of person that was found on Search person step
Create global role for created user in mithril database,
global_user_roles
table, set:id = autogenerate uuid
user_id = user_id of user created on p.4
role_id = id of role with name ‘PATIENT’
inserted_at = now()
updated_at = now()
Generate authorization token
Generate auth_token with scope
app:authorize
foruser_id
andclient_id of Auth UI (from env)
Save token to mithil database,
tokens
table, set:id = token uuid
name = token name (‘access_token’)
value = hashed token
expires_at = date and time when token will be expired in unix-time format
details = additional details of token (scopes, client_id, grant_type)
user_id = id of user
inserted_at = now()
updated_at = now()
Render a response according to specification.
ЕСОЗ - публічна документація