Skip to main content

Recently Updated Pages

Autorisatie en toestemmingen

Autorisatie

Op de vorige pagina is te lezen wat een autorisatie volgens Nuts precies is. Toch zien we dat er ...

Updated 6 months ago by Wout Slakhorst

Autorisaties volgens Nuts

Autorisatie

Om gegevens te kunnen uitwisselen zullen twee (computer) systemen moeten samenwerken. Het bronsys...

Updated 6 months ago by Wout Slakhorst

Agenda's en verslagen

Actiz architectuurwerkgroep

Google doc

Updated 6 months ago by Jorrit Spee

Referentie & solution architectuur (WIP)

SSIBAC

Nuts SSIBAC Een solution architectuur voor het implementeren van ABAC gebasseerd op attributen ve...

Updated 6 months ago by Wout Slakhorst

Authentication & authorization

Basics

When a request comes in at your resource endpoint, an access token should be available in the HTT...

Updated 7 months ago by Wout Slakhorst

Access tokens

Basics

After finding a service endpoint to interact with, it's time to request an access token. You can ...

Updated 7 months ago by Wout Slakhorst

Service search

Basics

You can find participants of a use case via their registered services. A use case defines the ser...

Updated 7 months ago by Wout Slakhorst

Service activation

Basics

Before another party can interact with you, they will first need to find your endpoints. The disc...

Updated 7 months ago by Wout Slakhorst

Subject registration

Basics

The first thing you need to do is create some public/private key material for your subjects. We u...

Updated 7 months ago by Wout Slakhorst

Obtaining credentials

Basics

After you created a subject with some DID documents, it's time to give meaning to these identifie...

Updated 7 months ago by Wout Slakhorst

Use Case Activation / Discoverability

Implementing a Nuts Use Case

After configuring the Nuts node with the required artifacts, the use case can be activated for a ...

Updated 7 months ago by Wout Slakhorst

AuthN using Verifiable Credentials

Designing a Nuts Use Case Authorization

To successfully negotiate an OAuth2 access token, the token issuer (OAuth2 Authorization Server) ...

Updated 7 months ago by Wout Slakhorst

OAuth2 Scopes and Presentation Definition Mapping

Designing a Nuts Use Case Authorization

Scope design When designing a system that uses OAuth2, you have to decide how scopes map to resou...

Updated 7 months ago by Wout Slakhorst

Credential Trust

Designing a Nuts Use Case Authorization

Authentication on Nuts heavily depends on trusted credential issuers: any attribute, revelant to ...

Updated 7 months ago by Rein Krul

OAuth2 Flows and Wallets

Designing a Nuts Use Case Authorization

Nuts supports a custom OAuth2 flows for acquiring an access token: the service-to-service flow. S...

Updated 7 months ago by Wout Slakhorst

Nuts Node Configuration

Implementing a Nuts Use Case

A use case writer supplements you with a number of artifacts, that need to be configured: Servic...

Updated 7 months ago by Rein Krul

Access Policy (TODO)

Designing a Nuts Use Case Authorization

Anti-patterns Bad: "Clients can access /Observation, but the FHIR server has to limit it to /Ob...

Updated 7 months ago by Rein Krul

Local v5 Nuts node with Ngrok

Cookbook

This documentation only applies to use cases requiring the Nuts gRPC network (did:nuts DIDs). ...

Updated 7 months ago by Rein Krul

Lokalisatie in netwerkzorg hoogover

Lokalisatie

Context Binnen netwerkzorg is vaak bekend wie de andere behandelaren zijn. Dit kan worden geïnven...

Updated 7 months ago by Steven van der Vegt

Notified Pull gebaseerd op FHIR subscriptions

Communicatiepatronen

Achtergrond Het Notified Pull (NP) communicatiepatroon stelt een initiatiefnemer in staat gegeven...

Updated 8 months ago by Steven van der Vegt