{"_id":"hl7.fhir.us.udap-security","name":"hl7.fhir.us.udap-security","dist-tags":{"latest":"2.0.0"},"versions":{"2.0.0":{"name":"hl7.fhir.us.udap-security","_id":"hl7.fhir.us.udap-security@4.0.1","version":"2.0.0","date":"2025-12-09T09:26:54.000Z","fhirVersion":"4.0.1","kind":"fhir.ig","count":0,"canonical":"http://hl7.org/fhir/us/udap-security","url":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-2.0.0.tgz","dist":{"shasum":"b471625ce534670d6d93a45b56a45838f44f6c53","tarball":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-2.0.0.tgz"},"homepage":"http://hl7.org/fhir/us/udap-security/STU2","license":"CC-BY-4.0","author":{"name":"HL7 International / Security"},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 9, 2025 21:26+0000+00:00)","dependencies":{"hl7.fhir.uv.extensions.r4":"5.2.0","hl7.fhir.r4.core":"4.0.1","hl7.terminology.r4":"7.0.0"}},"2.0.0-ballot":{"name":"hl7.fhir.us.udap-security","_id":"hl7.fhir.us.udap-security@4.0.1","version":"2.0.0-ballot","date":"2024-12-17T12:00:00.000Z","fhirVersion":"4.0.1","kind":"fhir.ig","count":0,"canonical":"http://hl7.org/fhir/us/udap-security","url":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-2.0.0-ballot.tgz","dist":{"shasum":"87b05d9301bc787dc1416c45477c249cf690d93c","tarball":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-2.0.0-ballot.tgz"},"homepage":"http://hl7.org/fhir/us/udap-security/2025Jan","license":"CC-BY-4.0","author":{"name":"HL7 International / Security"},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 17, 2024 15:02+0000+00:00)","dependencies":{"hl7.fhir.us.core":"3.1.1","hl7.fhir.r4.core":"4.0.1","hl7.terminology.r4":"6.1.0","hl7.fhir.uv.extensions.r4":"5.1.0"}},"1.1.0":{"name":"hl7.fhir.us.udap-security","_id":"hl7.fhir.us.udap-security@4.0.1","version":"1.1.0","date":"2024-08-21T12:00:00.000Z","fhirVersion":"4.0.1","kind":"fhir.ig","count":0,"canonical":"http://hl7.org/fhir/us/udap-security","url":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-1.1.0.tgz","dist":{"shasum":"87b0e94b9c82916419eb96394619008cbfb4be2e","tarball":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-1.1.0.tgz"},"homepage":"http://hl7.org/fhir/us/udap-security/STU1.1","license":"CC-BY-4.0","author":{"name":"HL7 International - Security WG"},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Wed, Aug 21, 2024 13:14+0000+00:00)","dependencies":{"hl7.fhir.r4.core":"4.0.1","hl7.fhir.us.core":"3.1.1","hl7.terminology.r4":"6.0.2","hl7.fhir.uv.extensions.r4":"5.1.0"}},"1.0.0":{"name":"hl7.fhir.us.udap-security","_id":"hl7.fhir.us.udap-security@4.0.1","version":"1.0.0","date":"2022-09-27T12:00:00.000Z","fhirVersion":"4.0.1","kind":"fhir.ig","count":0,"canonical":"http://hl7.org/fhir/us/udap-security","url":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-1.0.0.tgz","dist":{"shasum":"e69458909e273f53aa2f1d1455641860953cf371","tarball":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-1.0.0.tgz"},"homepage":"http://hl7.org/fhir/us/udap-security/STU1","license":"CC-BY-4.0","author":{"name":"HL7 International - Security WG"},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Sep 27, 2022 18:31+0000+00:00)","dependencies":{"hl7.fhir.r4.core":"4.0.1","hl7.terminology.r4":"4.0.0","hl7.fhir.us.core":"3.1.1"}},"0.1.0":{"name":"hl7.fhir.us.udap-security","_id":"hl7.fhir.us.udap-security@4.0.1","version":"0.1.0","date":"2021-08-06T12:00:00.000Z","fhirVersion":"4.0.1","kind":"fhir.ig","count":0,"canonical":"http://hl7.org/fhir/us/udap-security","url":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-0.1.0.tgz","dist":{"shasum":"c9a9b9bcf8ed29ff7e61536ea6b5cc356280c3f3","tarball":"https://packages2.fhir.org/web/hl7.fhir.us.udap-security-0.1.0.tgz"},"homepage":"http://hl7.org/fhir/us/udap-security/2021Sep","license":"CC-BY-4.0","author":{"name":"HL7 International - Security WG"},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Fri, Aug 6, 2021 15:57+0000+00:00)","dependencies":{"hl7.fhir.r4.core":"4.0.1","hl7.fhir.us.core":"3.1.1"}}},"description":"This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Fri, Aug 6, 2021 15:57+0000+00:00)"}