FHIR © HL7.org  |  FHIRsmith 4.0.1  |  Server Home  |  XIG Home  |  XIG Stats  | 

FHIR IG analytics

Packagehl7.ehrs.us.dhfpr2
Resource TypeRequirements
IdRequirements-DHFPR2-TI.1.1.json
FHIR VersionR5
Sourcehttps://build.fhir.org/ig/HL7/dhfp-ig/Requirements-DHFPR2-TI.1.1.html
URLhttp://hl7.org/ehrs/us/dhfpr2/Requirements/DHFPR2-TI.1.1
Version2.0.0-ballot
Statusactive
Date2025-12-19T08:44:27+00:00
NameTI_1_1_Entity_Authentication
TitleTI.1.1 Entity Authentication (Function)
Realmus
Authorityhl7
DescriptionAuthenticate EHR-S users, and/or entities before allowing access.
PurposeAll entities accessing the EHR-S are subject to authentication. Examples of entity authentication, with varying levels of authentication rigor, include: - username/password; - digital certificate; - secure token; - biometrics.

Resources that use this resource

No resources found


Resources that this resource uses

No resources found


Narrative

Note: links and images are rebased to the (stated) source

Description I:

All entities accessing the EHR-S are subject to authentication.

Examples of entity authentication, with varying levels of authentication rigor, include:

  • username/password;
  • digital certificate;
  • secure token;
  • biometrics.
Criteria N:
TI.1.1#01 SHALL dependent

The system SHALL authenticate entities (e.g., users, organizations, applications, components, objects, and/or devices) accessing EHR-S protected resources (e.g., functions and data) according to scope of practice, organizational policy, and/or jurisdictional law, using an authentication mechanism such as an accredited Standards Development Organization-approved authentication standard (e.g., SAML, WS-Trust, Kerberos), username/password, digital certificate, secure token, biometric, or hardware-specific addressing mechanism. (See also ISO 22600.)

TI.1.1#02 SHALL

The system SHALL manage authentication data/information securely (e.g., passwords or biometric data).

TI.1.1#03 SHALL dependent

The system SHALL maintain configurable conditions and rules which protect against invalid, possibly malicious, authentication attempts according to organizational policy, and/or jurisdictional law (e.g., consecutive invalid logon attempts).

TI.1.1#04 SHALL dependent conditional

IF passwords are used to control access to the EHR-S, THEN the system SHALL provide the ability to maintain configurable timeframes (e.g., 180 days) for the reuse of passwords according to organizational policy, and/or jurisdictional law.

TI.1.1#05 SHALL dependent conditional

IF passwords are used to control access to the EHR-S, THEN the system SHALL provide the ability to maintain a configurable limit on the reuse of recently used passwords (e.g., the last 5 passwords) according to organizational policy, and/or jurisdictional law.

TI.1.1#06 SHALL conditional

IF username/passwords are used to control access to the EHR-S, THEN the system SHALL maintain password strength rules (e.g., requiring a minimum number of characters and inclusion of alpha-numeric complexity).

TI.1.1#07 SHALL dependent conditional

IF passwords are used to control access to the system, THEN the system SHALL capture the password using obfuscation techniques (e.g., during user password entry) according to scope of practice, organizational policy, and/or jurisdictional law.

TI.1.1#08 SHALL conditional

IF passwords are used to control access to the EHR-S, THEN the system SHALL manage password reset as an administrative function.

TI.1.1#09 SHALL conditional

IF user passwords are initially set or later reset by an administrator, THEN the system SHALL provide the ability to update password at the next successful logon.

TI.1.1#10 SHALL

The system SHALL present limited feedback to the user during authentication.

TI.1.1#11 SHALL

The system SHALL provide the ability to enter case-insensitive 'usernames' that contain typeable alpha-numeric characters in support of ISO-646/ECMA-6 (aka US ASCII).

TI.1.1#12 SHALL conditional

IF passwords are used, THEN the system SHALL provide the ability to enter case-sensitive passwords that contain typeable alpha-numeric characters in support of ISO-646/ECMA-6 (aka US ASCII).


Source1

{
  "resourceType": "Requirements",
  "id": "DHFPR2-TI.1.1",
  "meta": {
    "profile": [
      "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/FMFunction"
    ]
  },
  "language": "en",
  "text": {
    "status": "extensions",
    "div": "<!-- snip (see above) -->"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode": "informative"
    },
    {
      "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
      "valueCode": "NC"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode": "ehr"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger": 1,
      "_valueInteger": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/ehrs/us/dhfpr2/ImplementationGuide/hl7.ehrs.us.dhfpr2"
          }
        ]
      }
    }
  ],
  "url": "http://hl7.org/ehrs/us/dhfpr2/Requirements/DHFPR2-TI.1.1",
  "version": "2.0.0-ballot",
  "name": "TI_1_1_Entity_Authentication",
  "title": "TI.1.1 Entity Authentication (Function)",
  "status": "active",
  "date": "2025-12-19T08:44:27+00:00",
  "publisher": "HL7 International / Electronic Health Records",
  "contact": [
    {
      "telecom": [
        {
          "system": "url",
          "value": "http://www.hl7.org/Special/committees/ehr"
        }
      ]
    }
  ],
  "description": "Authenticate EHR-S users, and/or entities before allowing access.",
  "jurisdiction": [
    {
      "coding": [
        {
          "system": "urn:iso:std:iso:3166",
          "code": "US"
        }
      ]
    }
  ],
  "purpose": "All entities accessing the EHR-S are subject to authentication.\n\nExamples of entity authentication, with varying levels of authentication rigor, include:\n- username/password;\n- digital certificate;\n- secure token;\n- biometrics.",
  "derivedFrom": [
    "http://hl7.org/ehrs/uv/ehrsfmr2/Requirements/EHRSFMR2-TI.1.1"
  ],
  "statement": [
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": true
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-01",
      "label": "TI.1.1#01",
      "conformance": [
        "SHALL"
      ],
      "conditionality": false,
      "requirement": "The system SHALL authenticate entities (e.g., users, organizations, applications, components, objects, and/or devices) accessing EHR-S protected resources (e.g., functions and data) according to scope of practice, organizational policy, and/or jurisdictional law, using an authentication mechanism such as an accredited Standards Development Organization-approved authentication standard (e.g., SAML, WS-Trust, Kerberos), username/password, digital certificate, secure token, biometric, or hardware-specific addressing mechanism. (See also ISO 22600.)",
      "derivedFrom": "TI.1.1#1"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-02",
      "label": "TI.1.1#02",
      "conformance": [
        "SHALL"
      ],
      "conditionality": false,
      "requirement": "The system SHALL manage authentication data/information securely (e.g., passwords or biometric data).",
      "derivedFrom": "TI.1.1#2"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": true
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-03",
      "label": "TI.1.1#03",
      "conformance": [
        "SHALL"
      ],
      "conditionality": false,
      "requirement": "The system SHALL maintain configurable conditions and rules which protect against invalid, possibly malicious, authentication attempts according to organizational policy, and/or jurisdictional law (e.g., consecutive invalid logon attempts).",
      "derivedFrom": "TI.1.1#3"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": true
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-04",
      "label": "TI.1.1#04",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF passwords are used to control access to the EHR-S, THEN the system SHALL provide the ability to maintain configurable timeframes (e.g., 180 days) for the reuse of passwords according to organizational policy, and/or jurisdictional law.",
      "derivedFrom": "TI.1.1#4"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": true
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-05",
      "label": "TI.1.1#05",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF passwords are used to control access to the EHR-S, THEN the system SHALL provide the ability to maintain a configurable limit on the reuse of recently used passwords (e.g., the last 5 passwords) according to organizational policy, and/or jurisdictional law.",
      "derivedFrom": "TI.1.1#5"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-06",
      "label": "TI.1.1#06",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF username/passwords are used to control access to the EHR-S, THEN the system SHALL maintain password strength rules (e.g., requiring a minimum number of characters and inclusion of alpha-numeric complexity).",
      "derivedFrom": "TI.1.1#6"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": true
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-07",
      "label": "TI.1.1#07",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF passwords are used to control access to the system, THEN the system SHALL capture the password using obfuscation techniques (e.g., during user password entry) according to scope of practice, organizational policy, and/or jurisdictional law.",
      "derivedFrom": "TI.1.1#7"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-08",
      "label": "TI.1.1#08",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF passwords are used to control access to the EHR-S, THEN the system SHALL manage password reset as an administrative function.",
      "derivedFrom": "TI.1.1#8"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-09",
      "label": "TI.1.1#09",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF user passwords are initially set or later reset by an administrator, THEN the system SHALL provide the ability to update password at the next successful logon.",
      "derivedFrom": "TI.1.1#9"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-10",
      "label": "TI.1.1#10",
      "conformance": [
        "SHALL"
      ],
      "conditionality": false,
      "requirement": "The system SHALL present limited feedback to the user during authentication.",
      "derivedFrom": "TI.1.1#10"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-11",
      "label": "TI.1.1#11",
      "conformance": [
        "SHALL"
      ],
      "conditionality": false,
      "requirement": "The system SHALL provide the ability to enter case-insensitive 'usernames' that contain typeable alpha-numeric characters in support of ISO-646/ECMA-6 (aka US ASCII).",
      "derivedFrom": "TI.1.1#11"
    },
    {
      "extension": [
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-dependent",
          "valueBoolean": false
        },
        {
          "url": "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/requirements-change-info",
          "valueCode": "NC"
        }
      ],
      "key": "DHFPR2-TI.1.1-12",
      "label": "TI.1.1#12",
      "conformance": [
        "SHALL"
      ],
      "conditionality": true,
      "requirement": "IF passwords are used, THEN the system SHALL provide the ability to enter case-sensitive passwords that contain typeable alpha-numeric characters in support of ISO-646/ECMA-6 (aka US ASCII).",
      "derivedFrom": "TI.1.1#12"
    }
  ]
}