Inbound SMART on FHIR Authentication
The Inbound SMART on FHIR Authentication configuration category includes the following configurable options:
Authentication Cache Timeout (Seconds)
Prevent Token KeyID Reuse
Require Key Expiry
Scopes Supported
Trust Intra-Cluster SMART Tokens from Module(s)
|
Authentication Cache Timeout (Seconds) |
|
|
NON_NEGATIVE_INTEGER | |
If set to a non-zero, non-negative value, successfully validated authentication tokens will be cached for the given number of seconds. This cache has a positive impact on performance since validating a token is a non-trivial operation and may involve lookups and crypto operations. However, setting this timeout to a value that is high means that invalidated tokens will be trusted for longer than they should be. | |
|
|
300
|
|
|
|
Prevent Token KeyID Reuse |
|
|
BOOLEAN | |
If enabled, the server will block tokens with a signed key from being reused. In other words, when the key is decoded as a JWT, the kid (KeyID) claim is verified to ensure that the same key has not been reused.
|
|
|
|
false
|
|
|
|
Require Key Expiry |
|
|
BOOLEAN | |
If enabled, the server will block tokens that do not have an expiry. | |
|
|
false
|
|
|
|
Scopes Supported |
|
|
STRING | |
A space separated list of scopes to advertise as supported in the .well-known/smart-configuration | |
|
|
openid fhirUser
|
|
|
|
Trust Intra-Cluster SMART Tokens from Module(s) |
|
|
STRING | |
This property provides a comma-separated list of Smile CDR SMART Outbound Security modules from which tokens will be accepted. See Accepting Internal Access Tokens for information on how to use this setting. Values for this setting should be in the form node_id/module_id , where this refers to a SMART Outbound Security module. If no value is supplied, only tokens issued by external OpenID Connect providers will be trusted, and these providers must be registered as OpenID Connect servers in the Smile CDR configuration.
|
|
|
|
(no default) | |
|