ЕСОЗ - публічна документація
RC_PIS. Confidant patient sign-up registration (DMS)
Purpose
This WS is designed to register patient in the system based on data received from Patient Information System.
Key points
This method must be used only by Auth front-end
Validates session token (jwt) that was obtained as a result of signed content as well as patient data validation by PIS. Confidant patient sign-up validation and signed content, skips revalidation of patient data.
Creates user as well as patient in the system
Generates access token for further actions
Specification
Validate request
Validate signed content
Check
signed_content
andsigned_content_encoding
are submittedin case of error - return 422 ('required property signed_content was not present' or ‘required property signed_content_encoding was not present')
Check signed content is a valid base64
in case of error - return 422 ('Invalid signed content')
Check signed content encoding is a 'base64' value
in case of error - return 422 ('is invalid')
Check digital signature is valid
in case of error - return 401
Validate applicant
Get drfo value from digital signature of
signed_content
Check that applicant user exists in mithril database,
users
table, with tax_id = drfo from digital signature and is_active = truein case of error - return 404 ('Applicant user not found.')
Check that applicant user is not blocked (is_blocked <> true)
in case of error - return 401 ('Applicant user is blocked.')
Check that applicant user has active person in mpi database,
persons
table, with id = person_id from found applicant user, status = active and is_active = truein case of error - return 404 ('Applicant person not found.')
Check that applicant user has active person with appropriate age (greated than no_self_auth_age global parameter)
in case of error - return 401 ('Incorrect applicant person age for such an action.')
Validate JWT
Ensure that token provided in payload (obtained fromPIS. Confidant patient sign-up validation ) is valid
validate JWT signature
validate issuer (
iss
= Ehealth)validate aud (
aud
= pis-registration)validate expiration (
exp
in the future)validate
content_hash
equals to MD5 hash value of decodedsigned_content
fieldin case of any error - return 401 ('Unauthorized')
Service logic
Search person
Search for existing active person in mpi database with data from person registration request according to existing process, described here Create/Update person request | Search person
Calculate score of comparison between found active persons and person registration request using existing deduplication process, described here Deduplication process NEW
Compare found score with PIS_ONLINE_DEDUPLICATION_MATCH_SCORE config parameter, set to ‘0.95’:If one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - save its
person_id
and proceed to PIS. Confidant patient sign-up registration | Check relationship between Person and Confidant PersonIf more than one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - return 401 ('It is impossible to uniquely identify the person.')
If no active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found - proceed to PIS. Confidant patient sign-up registration | Create person
Result | Actions |
---|---|
One active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found | |
More than one active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found |
|
No active person with match score > PIS_ONLINE_DEDUPLICATION_MATCH_SCORE was found |
Create person
Create new person in mpi database, set values in following tables based on person registration request:
persons
tableperson_phones
tableperson_addresses
tableperson_documents table
person_authentication_methods
table
Save signed content to media storage
Submit person on verification - create record in person_verifications table for person_id, set values for each verification stream:
Manual NHS verifiation
if
$.person.confidant_person
exists in person registration request or$.person.documents
contains document with type = 'PERMANENT_RESIDENCE_PERMIT' or$.person.unzr
is not empty and first 8 digits of$.person.unzr
!=$.person.birth_date
set nhs_verification_status = NOT_VERIFIED
set nhs_verification_reason = DOCUMENTS_TRIGGERED
else - according to logic, described here: RC_Sign person request v2 (DMS) | Manual NHS verification
DRFO registry verification - according to logic, described here: RC_Sign person request v2 (DMS) | DRFO registry verification
DRACS death acts registry verification - according to logic, described here: RC_Sign person request v2 (DMS) | DRACS death acts registry verification
MVS passport registry verification - according to logic, described here: RC_Sign person request v2 (DMS) | MVS passport registry verification
DMS passport registry verification - according to logic, described here: RC_Sign person request v2 (DMS) | DMS passport registry verification
UNZR registry verification - according to logic, described here: RC_Sign person request v2 (DMS) | UNZR registry verification
Calculate cumulative person verifiation status according to logic, described here: RC_Sign person request v2 (DMS) | Calculate cumulative verification status
Create relationship between confidant person and related person
Service must create unverified relationship between confidant person and related person for further verification by responsible person on NHS side
Call Create confidant person relationship . Set values:
confidant_person_id = $request.confidant_person.person_id
person_id = person.id
verification_status = “VERIFICATION_NEEDED”
verification_reason = “ONLINE_TRIGGERED_BY_PIS_REGISTRATION_VIA_CONFIDANT“
confidant_person_relationship_documents = person.confidant_person.documents_relationship with record_type: relationship_confirmation
In case if persons age < person_full_legal_capacity_age years old:
calculate relationship_expiration_date - date when person becomes person_full_legal_capacity_age years old
check if $.active_to <= relationship_expiration_date
if true - set active_to = $.active_to
else - set active_to = relationship_expiration_date
Check existing authentication method for person with type = THIRD_PERSON, ended_at > true or null and value = $request.confidant_person.person_id
if not found - create new authentication method for person, set values:
type = THIRD_PERSON
value = person.confidant_person.person_id
started_at = now()
ended_at: if person.age < no_self_auth_age
ended_at = person.birth_date + no_self_auth_age - 1d
else end_date = null
if found - update authentication method for person, set values:
ended_at: if person.age < no_self_auth_age
ended_at = person.birth_date + no_self_auth_age - 1d
else end_date = null
Check relationship between Person and Confidant Person
Check relationship using Check confidant person relationship and having applicant person_id as confidant_person_id and person_id
If relationship doesn’t exist - Create relationship https://e-health-ua.atlassian.net/wiki/spaces/EH/pages/17525605827/PIS.+Confidant+patient+sign-up+registration#Create-relationship-between-confidant-person-and-related-person
Search user in Mithril
Search for existing user in mithril database,
users
table, with person_id = person_id and is_active = trueIf user is found - check it is not blocked (is_blocked <> true)
in case blocked - return 401 ('User is blocked.').
in case not blocked - save its
user_id
and proceed to p.3.
If user is not found - proceed to p.4.
Create user if not exists
Create user for active person in mithril database,
users
table, set:id = autogenerate uuid
settings = ‘{“trusted_source”: false}’
priv_settings = ‘{"login_hstr": [], "otp_error_counter": 0}’
inserted_at = now()
updated_at = now()
tax_id =
tax_id
ordocument.number
from payload (if both where passed - thentax_id
must be used)person_id =
person_id
of person that was found on Search person step
Create global role for created user in mithril database,
global_user_roles
table, set:id = autogenerate uuid
user_id = user_id of user created on p.4
role_id = id of role with name ‘PATIENT’
inserted_at = now()
updated_at = now()
Generate authorization token
Generate auth_token with scope
app:authorize
foruser_id
andclient_id
of Auth UI (AUTH_CLIENT_ID env variable)Save token to mithil database,
tokens
table, set:id = token uuid
name = token name (‘access_token’)
value = hashed token
expires_at = date and time when token will be expired in unix-time format
details = additional details of token (scopes, client_id, grant_type)
user_id = id of user
inserted_at = now()
updated_at = now()
Render a response according to specification.
ЕСОЗ - публічна документація