Go To AIH-HSP AI Modules

1 Function 2 Reference Model 3 Input/Output Data
4 SubAIMs 5 JSON Metadata 6 Profiles
7 Reference Software 8 Conformance Texting 9 Performance Assessment

1 Functions

The Authentication and Access Control (AIH-AAC) AIM:

Receives AAC Parameters Parameter set containing Authentication and Access Control data.
Produces AAC Token Token enabling an End-User and Third Party User to access the HBE.

2 Reference Model

The  Authentication and Access Control (AIH-AAC) AIM Reference Model is depicted in Figure 1.

Figure 1 – The Authentication and Access Control (AIH-AAC) AIM Reference Model

3 Input/Output Data

Table 1 specifies the Input and Output Data of the Authentication and Access Control (AIH-AAC) AIM. Links are to the Data Type specifications.

Table 1 – I/O Data of the Authentication and Access Control (AIH-AAC) AIM

Input Description
AAC Parameters Parameter set containing Authentication and Access Control data, that depends on the Access Control types used by the HBE.
Output Description
AAC Token Token representing an authorisation level enabling an End-User and Third Party User to access the HBE.

4 SubAIMs

No SubAIMs

5 JSON Metadata

https://schemas.mpai.community/AIH1/V1.0/AIMs/AuthenticationAndAccessControl.json

6 Profiles

No Profiles

7 Reference Software

Under development.

8 Conformance Testing

Table 2 provides the Conformance Testing Method for the Authentication and Access Control (AIH-AAC) AIM.

If a schema contains references to other schemas, conformance of data for the primary schema implies that any data referencing a secondary schema shall also validate against the relevant schema, if present and conform with the Qualifier, if present.

Table 2 – Conformance Testing Method for AIH-AAC AIM

Receives AAC Parameters Shall validate against the AAC Parameters schema
Produces AAC Token Shall validate against the AAC Token schema

9 Performance Assessment

Go To AIH-HSP AI Modules