Page Status: draft updated 2025-08-08
AuditEvent
Page index
General information
The AuditEvent resource is used to record information about an event happening on a system.
Scope and Usage
In the catalog AuditEvent is used to record information about what system (HVODevice), HVOPractitioner, HVOPractitionerRole or HVOOrganization is attempting to access what data from what system (HVODevice). This is done for security reasons.
HVOAuditEvents are created automatically by the server, hence this resource can not be interacted with.
Boundaries and Relationships
AuditEvent should not be confused with Provenance, another common resource used to record meta data. Provenance is used to record information about changes done to a specific instance of a resource and by whom/what. AuditEvent is intended for recording access related events.
AuditEvent together with HVODevice makes up the access control logging system used by the catalog.
Profile
HVOAuditEvent (AuditEvent) | C | AuditEvent | |
id | Σ | 0..1 | id |
meta | Σ | 0..1 | Meta |
implicitRules | Σ ?! | 0..1 | uri |
language | 0..1 | codeBinding | |
text | C | 0..1 | Narrative |
contained | C | 0..* | Resource |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
category | Σ | 0..* | CodeableConcept |
code | Σ | 1..1 | CodeableConcept |
action | Σ | 0..1 | codeBinding |
severity | Σ | 0..1 | codeBinding |
occurred[x] | 0..1 | ||
occurredPeriod | Period | ||
occurredDateTime | dateTime | ||
recorded | Σ | 1..1 | instant |
outcome | Σ | 0..1 | BackboneElement |
id | 0..1 | string | |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
code | Σ | 1..1 | CodingBinding |
detail | Σ | 0..* | CodeableConcept |
authorization | Σ | 0..* | CodeableConcept |
basedOn | 0..* | Reference(CarePlan | DeviceRequest | ImmunizationRecommendation | MedicationRequest | NutritionOrder | ServiceRequest | Task) | |
patient | 0..1 | Reference(Patient) | |
encounter | 0..1 | Reference(Encounter) | |
agent | S Σ | 1..* | BackboneElement |
id | 0..1 | string | |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
type | 0..1 | CodeableConceptBinding | |
role | 0..* | CodeableConcept | |
who | S Σ | 1..1 | Reference(HVODevice | HVOOrganization | HVOPractitionerRole | HVOPractitioner) |
requestor | Σ | 0..1 | boolean |
location | 0..1 | Reference(Location) | |
policy | 0..* | uri | |
network[x] | 0..1 | ||
networkUri | uri | ||
networkString | string | ||
networkReference | Reference(Endpoint) | ||
authorization | 0..* | CodeableConcept | |
source | S Σ | 1..1 | BackboneElement |
id | 0..1 | string | |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
site | 0..1 | Reference(Location) | |
observer | S Σ | 1..1 | Reference(HVODevice) |
type | 0..* | CodeableConceptBinding | |
entity | S Σ | 0..* | BackboneElement |
id | 0..1 | string | |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
what | S Σ | 1..1 | Reference(Resource) |
role | 0..1 | CodeableConcept | |
securityLabel | 0..* | CodeableConcept | |
query | Σ | 0..1 | base64Binary |
detail | 0..* | BackboneElement | |
id | 0..1 | string | |
extension | C | 0..* | Extension |
modifierExtension | Σ ?! C | 0..* | Extension |
type | 1..1 | CodeableConcept | |
value[x] | 1..1 | ||
valueQuantity | Quantity | ||
valueCodeableConcept | CodeableConcept | ||
valueString | string | ||
valueBoolean | boolean | ||
valueInteger | integer | ||
valueRange | Range | ||
valueRatio | Ratio | ||
valueTime | time | ||
valueDateTime | dateTime | ||
valuePeriod | Period | ||
valueBase64Binary | base64Binary | ||
agent | 0..* | see (agent) |
AuditEvent | |
Short | Record of an event |
Definition | A record of an event relevant for purposes such as operations, privacy, security, maintenance, and performance analysis. |
Cardinality | 0..* |
Comments | Based on IHE-ATNA. |
Constraints |
|
Mappings |
|
AuditEvent.id | |
Short | Logical id of this artifact |
Definition | The logical id of the resource, as used in the URL for the resource. Once assigned, this value never changes. |
Cardinality | 0..1 |
Type | id |
Summary | True |
Comments | Within the context of the FHIR RESTful interactions, the resource has an id except for cases like the create and conditional update. Otherwise, the use of the resouce id depends on the given use case. |
AuditEvent.meta | |
Short | Metadata about the resource |
Definition | The metadata about the resource. This is content that is maintained by the infrastructure. Changes to the content might not always be associated with version changes to the resource. |
Cardinality | 0..1 |
Type | Meta |
Summary | True |
Constraints |
|
AuditEvent.implicitRules | |
Short | A set of rules under which this content was created |
Definition | A reference to a set of rules that were followed when the resource was constructed, and which must be understood when processing the content. Often, this is a reference to an implementation guide that defines the special rules along with other profiles etc. |
Cardinality | 0..1 |
Type | uri |
Modifier | True |
Summary | True |
Comments | Asserting this rule set restricts the content to be only understood by a limited set of trading partners. This inherently limits the usefulness of the data in the long term. However, the existing health eco-system is highly fractured, and not yet ready to define, collect, and exchange data in a generally computable sense. Wherever possible, implementers and/or specification writers should avoid using this element. Often, when used, the URL is a reference to an implementation guide that defines these special rules as part of its narrative along with other profiles, value sets, etc. |
Constraints |
|
AuditEvent.language | |
Short | Language of the resource content |
Definition | The base language in which the resource is written. |
Cardinality | 0..1 |
Type | code |
Binding | IETF language tag for a human language |
Comments | Language is provided to support indexing and accessibility (typically, services such as text to speech use the language tag). The html language tag in the narrative applies to the narrative. The language tag on the resource may be used to specify the language of other presentations generated from the data in the resource. Not all the content has to be in the base language. The Resource.language should not be assumed to apply to the narrative automatically. If a language is specified, it should it also be specified on the div element in the html (see rules in HTML5 for information about the relationship between xml:lang and the html lang attribute). |
Constraints |
|
AuditEvent.text | |
Short | Text summary of the resource, for human interpretation |
Definition | A human-readable narrative that contains a summary of the resource and can be used to represent the content of the resource to a human. The narrative need not encode all the structured data, but is required to contain sufficient detail to make it "clinically safe" for a human to just read the narrative. Resource definitions may define what content should be represented in the narrative to ensure clinical safety. |
Cardinality | 0..1 |
Type | Narrative |
Alias | narrative, html, xhtml, display |
Comments | Contained resources do not have a narrative. Resources that are not contained SHOULD have a narrative. In some cases, a resource may only have text with little or no additional discrete data (as long as all minOccurs=1 elements are satisfied). This may be necessary for data from legacy systems where information is captured as a "text blob" or where text is additionally entered raw or narrated and encoded information is added later. |
Conditions | The cardinality or value of this element may be affected by these constraints: dom-6 |
Constraints |
|
Mappings |
|
AuditEvent.contained | |
Short | Contained, inline Resources |
Definition | These resources do not have an independent existence apart from the resource that contains them - they cannot be identified independently, nor can they have their own independent transaction scope. This is allowed to be a Parameters resource if and only if it is referenced by a resource that provides context/meaning. |
Cardinality | 0..* |
Type | Resource |
Alias | inline resources, anonymous resources, contained resources |
Comments | This should never be done when the content can be identified properly, as once identification is lost, it is extremely difficult (and context dependent) to restore it again. Contained resources may have profiles and tags in their meta elements, but SHALL NOT have security labels. |
Conditions | The cardinality or value of this element may be affected by these constraints: dom-2, dom-4, dom-3, dom-5 |
Mappings |
|
AuditEvent.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the resource. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.modifierExtension | |
Short | Extensions that cannot be ignored |
Definition | May be used to represent additional information that is not part of the basic definition of the resource and that modifies the understanding of the element that contains it and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.category | |
Short | Type/identifier of event |
Definition | Classification of the type of event. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | Type of event. |
Summary | True |
Alias | type |
Requirements | Codes that classify the general type of event that happened. |
Constraints |
|
Mappings |
|
AuditEvent.code | |
Short | Specific type of event |
Definition | Describes what happened. The most specific code for the event. |
Cardinality | 1..1 |
Type | CodeableConcept |
Binding | Specific type of event. |
Summary | True |
Alias | subtype |
Requirements | This field enables queries of messages by implementation-defined event categories. |
Constraints |
|
Mappings |
|
AuditEvent.action | |
Short | Type of action performed during the event |
Definition | Indicator for type of action performed during the event that generated the audit. |
Cardinality | 0..1 |
Type | code |
Binding | DICOM Audit Event Action |
Summary | True |
Requirements | This broadly indicates what kind of action was done on the AuditEvent.entity by the AuditEvent.agent. |
Constraints |
|
Mappings |
|
AuditEvent.severity | |
Short | emergency | alert | critical | error | warning | notice | informational | debug |
Definition | Indicates and enables segmentation of various severity including debugging from critical. |
Cardinality | 0..1 |
Type | code |
Binding | This is in the SysLog header, PRI. http://tools.ietf.org/html/rfc5424#appendix-A.3 |
Summary | True |
Comments | ATNA will map this to the SYSLOG PRI element. |
Constraints |
|
Mappings |
|
AuditEvent.occurred[x] | |
Short | When the activity occurred |
Definition | The time or period during which the activity occurred. |
Cardinality | 0..1 |
Type | Period, dateTime |
Comments | The time or period can be a little arbitrary; where possible, the time should correspond to human assessment of the activity time. |
Constraints |
|
Mappings |
|
AuditEvent.recorded | |
Short | Time when the event was recorded |
Definition | The time when the event was recorded. |
Cardinality | 1..1 |
Type | instant |
Summary | True |
Requirements | This ties an event to a specific date and time. Security audits typically require a consistent time base (e.g. UTC), to eliminate time-zone issues arising from geographical distribution. |
Comments | In a distributed system, some sort of common time base (e.g. an NTP [RFC1305] server) is a good implementation tactic. |
Constraints |
|
Mappings |
|
AuditEvent.outcome | |
Short | Whether the event succeeded or failed |
Definition | Indicates whether the event succeeded or failed. A free text descripiton can be given in outcome.text. |
Cardinality | 0..1 |
Type | BackboneElement |
Summary | True |
Requirements | when a code is given there must be one code from the given codeSystem, and may be other equivilant codes from other codeSystems (for example http response codes such as 2xx, 4xx, or 5xx). |
Comments | In some cases a "success" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant. |
Constraints |
|
Mappings |
|
AuditEvent.outcome.id | |
Short | Unique id for inter-element referencing |
Definition | Unique id for the element within a resource (for internal references). This may be any string value that does not contain spaces. |
Cardinality | 0..1 |
Type | string |
Conditions | The cardinality or value of this element may be affected by these constraints: ele-1 |
Mappings |
|
AuditEvent.outcome.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.outcome.modifierExtension | |
Short | Extensions that cannot be ignored even if unrecognized |
Definition | May be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content, modifiers |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.outcome.code | |
Short | Whether the event succeeded or failed |
Definition | Indicates whether the event succeeded or failed. |
Cardinality | 1..1 |
Type | Coding |
Binding | DICOM Audit Event Outcome |
Summary | True |
Requirements | when a code is given there must be one code from the given codeSystem. |
Comments | In some cases a "success" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant. |
Constraints |
|
Mappings |
|
AuditEvent.outcome.detail | |
Short | Additional outcome detail |
Definition | Additional details about the error. This may be a text description of the error or a system code that identifies the error. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | A code that provides details as the exact issue. |
Summary | True |
Comments | A human readable description of the error issue SHOULD be placed in details.text. |
Constraints |
|
Mappings |
|
AuditEvent.authorization | |
Short | Authorization related to the event |
Definition | The authorization (e.g., PurposeOfUse) that was used during the event being recorded. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | The authorized purposeOfUse for the activity. |
Summary | True |
Alias | PurposeOfEvent |
Requirements | Record of any relevant security context, not restricted to purposeOfUse valueSet. May include security compartments, refrain, obligation, or other security tags. |
Comments | Use AuditEvent.agent.authorization when you know that it is specific to the agent, otherwise use AuditEvent.authorization. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why. |
Constraints |
|
Mappings |
|
AuditEvent.basedOn | |
Short | Workflow authorization within which this event occurred |
Definition | Allows tracing of authorizatino for the events and tracking whether proposals/recommendations were acted upon. |
Cardinality | 0..* |
Type | Reference(CarePlan | DeviceRequest | ImmunizationRecommendation | MedicationRequest | NutritionOrder | ServiceRequest | Task) |
Constraints |
|
Mappings |
|
AuditEvent.patient | |
Short | The patient is the subject of the data used/created/updated/deleted during the activity |
Definition | The patient element is available to enable deterministic tracking of activities that involve the patient as the subject of the data used in an activity. |
Cardinality | 0..1 |
Type | Reference(Patient) |
Requirements | When the .patient is populated it shall be accurate to the subject of the used data. The .patient shall not be populated when the used data used/created/updated/deleted (.entity) by the activity does not involve a subject. Note that when the patient is an agent, they will be recorded as an agent. When the Patient resource is Created, Updated, or Deleted it will be recorded as an entity. |
Constraints |
|
Mappings |
|
AuditEvent.encounter | |
Short | Encounter within which this event occurred or which the event is tightly associated |
Definition | This will typically be the encounter the event occurred, but some events may be initiated prior to or after the official completion of an encounter but still be tied to the context of the encounter (e.g. pre-admission lab tests). |
Cardinality | 0..1 |
Type | Reference(Encounter) |
Constraints |
|
Mappings |
|
AuditEvent.agent | |
Short | Actor involved in the event |
Definition | An actor taking an active role in the event or activity that is logged. |
Cardinality | 1..* |
Type | BackboneElement |
Must Support | True |
Summary | True |
Alias | ActiveParticipant |
Requirements | An agent can be a person, an organization, software, device, or other actors that may be ascribed responsibility. |
Comments | Several agents may be associated (i.e. have some responsibility for an activity) with an event or activity. For example, an activity may be initiated by one user for other users or involve more than one user. However, only one user may be the initiator/requestor for the activity. When a network are used in an event being recorded, there should be distinct agent elements for the known actors using the network. The agent with a network detail would be the responsible agent for use of that network. |
Constraints |
|
Mappings |
|
AuditEvent.agent.id | |
Short | Unique id for inter-element referencing |
Definition | Unique id for the element within a resource (for internal references). This may be any string value that does not contain spaces. |
Cardinality | 0..1 |
Type | string |
Conditions | The cardinality or value of this element may be affected by these constraints: ele-1 |
Mappings |
|
AuditEvent.agent.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.agent.modifierExtension | |
Short | Extensions that cannot be ignored even if unrecognized |
Definition | May be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content, modifiers |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.agent.type | |
Short | How agent participated |
Definition | The Functional Role of the user when performing the event. |
Cardinality | 0..1 |
Type | CodeableConcept |
Binding | The Participation type of the agent to the event. |
Requirements | Functional roles reflect functional aspects of relationships between entities. Functional roles are bound to the realization/performance of acts, where actions might be concatenated to an activity or even to a process. This element will hold the functional role that the agent played in the activity that is the focus of this Provenance. Where an agent played multiple functional roles, they will be listed as multiple .agent elements representing each functional participation. See ISO 21298:2018 - Health Informatics - Functional and structural roles, and ISO 22600-2:2014 - Health Informatics - Privilege Management and Access Control - Part 2: formal models. |
Comments | For example: assembler, author, prescriber, signer, investigator, etc. |
Constraints |
|
Mappings |
|
AuditEvent.agent.role | |
Short | Agent role in the event |
Definition | The structural roles of the agent indicating the agent's competency. The security role enabling the agent with respect to the activity. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | What security role enabled the agent to participate in the event. |
Requirements | Structural roles reflect the structural aspects of relationships between entities. Structural roles describe prerequisites, feasibilities, or competences for acts. Functional roles reflect functional aspects of relationships between entities. Functional roles are bound to the realization/performance of acts, where actions might be concatenated to an activity or even to a process. See ISO 21298:2018 - Health Informatics - Functional and structural roles, and ISO 22600-2:2014 - Health Informatics - Privilege Management and Access Control - Part 2: formal models.. |
Comments | For example: Chief-of-Radiology, Nurse, Physician, Medical-Student, etc. |
Constraints |
|
Mappings |
|
AuditEvent.agent.who | |
Short | Identifier of who |
Definition | Reference to who this agent is that was involved in the event. |
Cardinality | 1..1 |
Type | Reference(HVODevice | HVOOrganization | HVOPractitionerRole | HVOPractitioner) |
Must Support | True |
Summary | True |
Alias | userId |
Requirements | This field ties an audit event to a specific resource or identifier. |
Comments | Where a User ID is available it will go into who.identifier. Where a name of the user (human readable) it will go into who.display. |
Constraints |
|
Mappings |
|
AuditEvent.agent.requestor | |
Short | Whether user is initiator |
Definition | Indicator that the user is or is not the requestor, or initiator, for the event being audited. |
Cardinality | 0..1 |
Type | boolean |
Summary | True |
Requirements | This value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to another user. |
Comments | There can only be one initiator. If the initiator is not clear, then do not choose any one agent as the initiator. |
Meaning when missing | false |
Constraints |
|
Mappings |
|
AuditEvent.agent.location | |
Short | The agent location when the event occurred |
Definition | Where the agent location is known, the agent location when the event occurred. |
Cardinality | 0..1 |
Type | Reference(Location) |
Constraints |
|
Mappings |
|
AuditEvent.agent.policy | |
Short | Policy that authorized the agent participation in the event |
Definition | Where the policy(ies) are known that authorized the agent participation in the event. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used. |
Cardinality | 0..* |
Type | uri |
Requirements | This value is used retrospectively to determine the authorization policies. |
Comments | For example: Where an OAuth token authorizes, the unique identifier from the OAuth token is placed into the policy element Where a policy engine (e.g. XACML) holds policy logic, the unique policy identifier is placed into the policy element. |
Constraints |
|
Mappings |
|
AuditEvent.agent.network[x] | |
Short | This agent network location for the activity |
Definition | When the event utilizes a network there should be an agent describing the local system, and an agent describing remote system, with the network interface details. |
Cardinality | 0..1 |
Type | Reference(Endpoint), uri, string |
Requirements | When a network protocol is used the endpoint is associated with the agent most directly using the endpoint. This is usually the software agent that has implemented the application level protocol. Preference is to define network in terms of a Reference(Endpoint), or URI; use string only when address or hostname is all that is known. When encoding using string it is best to encode using the formal canonical host name, but if you can't, then you can encode numeric in Literal address form using square brackets '[]' as a v4 string (in dotted notation), or v6 string (in colon notation). |
Comments | When remote network endpoint is known, another agent representing the remote agent would indicate the remote network endpoint used. Convention is to indicate data flowing from Source to Destination. The convention for Search, given data flows both ways (query parameters vs results), is to have the Source as the initiator of the Search Transaction, and the Destination the responder to the Search transaction. |
Constraints |
|
Mappings |
|
AuditEvent.agent.authorization | |
Short | Allowable authorization for this agent |
Definition | The authorization (e.g., PurposeOfUse) that was used during the event being recorded. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | The reason the activity took place. |
Alias | PurposeOfUse |
Requirements | Record of any relevant security context, not restricted to purposeOfUse valueSet. May include security compartments, refrain, obligation, or other security tags. |
Comments | Use AuditEvent.agent.authorization when you know that is specific to the agent, otherwise use AuditEvent.authorization. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why. |
Constraints |
|
Mappings |
|
AuditEvent.source | |
Short | Audit Event Reporter |
Definition | The actor that is reporting the event. |
Cardinality | 1..1 |
Type | BackboneElement |
Must Support | True |
Summary | True |
Requirements | The event is reported by one source. |
Comments | Events are reported by the actor that detected them. This may be one of the participating actors, but may also be different. The actor may be a human such as a medical-records clerk disclosing data manually, that clerk would be the source for the record of disclosure. |
Constraints |
|
Mappings |
|
AuditEvent.source.id | |
Short | Unique id for inter-element referencing |
Definition | Unique id for the element within a resource (for internal references). This may be any string value that does not contain spaces. |
Cardinality | 0..1 |
Type | string |
Conditions | The cardinality or value of this element may be affected by these constraints: ele-1 |
Mappings |
|
AuditEvent.source.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.source.modifierExtension | |
Short | Extensions that cannot be ignored even if unrecognized |
Definition | May be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content, modifiers |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.source.site | |
Short | Logical source location within the enterprise |
Definition | Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group. |
Cardinality | 0..1 |
Type | Reference(Location) |
Requirements | This value differentiates among the sites in a multi-site enterprise health information system. |
Constraints |
|
Mappings |
|
AuditEvent.source.observer | |
Short | The identity of source detecting the event |
Definition | Identifier of the source where the event was detected. |
Cardinality | 1..1 |
Type | Reference(HVODevice) |
Must Support | True |
Summary | True |
Alias | SourceId |
Requirements | This field ties the event to a specific source system. It may be used to group events for analysis according to where the event was detected. |
Constraints |
|
Mappings |
|
AuditEvent.source.type | |
Short | The type of source where event originated |
Definition | Code specifying the type of source where event originated. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | Code specifying the type of system that detected and recorded the event. Use of these codes is not required but is encouraged to maintain translation with DICOM AuditMessage schema. |
Requirements | This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred. |
Constraints |
|
Mappings |
|
AuditEvent.entity | |
Short | Data or objects used |
Definition | Specific instances of data or objects that have been accessed. |
Cardinality | 0..* |
Type | BackboneElement |
Must Support | True |
Summary | True |
Alias | ParticipantObject |
Requirements | The event may have other entities involved. |
Comments | Required unless the values for event identification, agent identification, and audit source identification are sufficient to document the entire auditable event. Because events may have more than one entity, this group can be a repeating set of values. |
Constraints |
|
Mappings |
|
AuditEvent.entity.id | |
Short | Unique id for inter-element referencing |
Definition | Unique id for the element within a resource (for internal references). This may be any string value that does not contain spaces. |
Cardinality | 0..1 |
Type | string |
Conditions | The cardinality or value of this element may be affected by these constraints: ele-1 |
Mappings |
|
AuditEvent.entity.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.entity.modifierExtension | |
Short | Extensions that cannot be ignored even if unrecognized |
Definition | May be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content, modifiers |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.entity.what | |
Short | Specific instance of resource |
Definition | Identifies a specific instance of the entity. The reference should be version specific. This is allowed to be a Parameters resource. |
Cardinality | 1..1 |
Type | Reference(Resource) |
Must Support | True |
Summary | True |
Comments | Use .what.display when all you have is a string (e.g. ParticipantObjectName). |
Constraints |
|
Mappings |
|
AuditEvent.entity.role | |
Short | What role the entity played |
Definition | Code representing the role the entity played in the event being audited. |
Cardinality | 0..1 |
Type | CodeableConcept |
Binding | DICOM Audit Event Entity Role |
Requirements | For some detailed audit analysis it may be necessary to indicate a more granular type of entity, based on the application role it serves. |
Constraints |
|
Mappings |
|
AuditEvent.entity.securityLabel | |
Short | Security labels on the entity |
Definition | Security labels for the identified entity. |
Cardinality | 0..* |
Type | CodeableConcept |
Binding | Example Security Labels from the Healthcare Privacy and Security Classification System. |
Requirements | This field identifies the security labels for a specific instance of an object, such as a patient, to detect/track privacy and security issues. |
Comments | Copied from entity meta security tags. |
Constraints |
|
Mappings |
|
AuditEvent.entity.query | |
Short | Query parameters |
Definition | The query parameters for a query-type entities. |
Cardinality | 0..1 |
Type | base64Binary |
Summary | True |
Requirements | For query events, it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing. |
Comments | The meaning and secondary-encoding of the content of base64 encoded blob is specific to the AuditEvent.type, AuditEvent.subtype, and AuditEvent.entity.role. The base64 is a general-use and safe container for event specific data blobs regardless of the encoding used by the transaction being recorded. An AuditEvent consuming application must understand the event it is consuming and the formats used by the event. For example, if auditing an Oracle network database access, the Oracle formats must be understood as they will be simply encoded in the base64binary blob. The DICOM AuditMessage schema does not support both .name and .query being populated. |
Constraints |
|
Mappings |
|
AuditEvent.entity.detail | |
Short | Additional Information about the entity |
Definition | Tagged value pairs for conveying additional information about the entity. |
Cardinality | 0..* |
Type | BackboneElement |
Requirements | Implementation-defined data about specific details of the object accessed or used. |
Constraints |
|
Mappings |
|
AuditEvent.entity.detail.id | |
Short | Unique id for inter-element referencing |
Definition | Unique id for the element within a resource (for internal references). This may be any string value that does not contain spaces. |
Cardinality | 0..1 |
Type | string |
Conditions | The cardinality or value of this element may be affected by these constraints: ele-1 |
Mappings |
|
AuditEvent.entity.detail.extension | |
Short | Additional content defined by implementations |
Definition | May be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. |
Cardinality | 0..* |
Type | Extension |
Alias | extensions, user content |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.entity.detail.modifierExtension | |
Short | Extensions that cannot be ignored even if unrecognized |
Definition | May be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and managable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself). |
Cardinality | 0..* |
Type | Extension |
Modifier | True |
Summary | True |
Alias | extensions, user content, modifiers |
Requirements | Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions. |
Comments | There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone. |
Constraints |
|
Mappings |
|
AuditEvent.entity.detail.type | |
Short | Name of the property |
Definition | The type of extra detail provided in the value. |
Cardinality | 1..1 |
Type | CodeableConcept |
Binding | Additional detail about an entity used in an event. |
Constraints |
|
Mappings |
|
AuditEvent.entity.detail.value[x] | |
Short | Property value |
Definition | The value of the extra detail. |
Cardinality | 1..1 |
Type | Quantity, CodeableConcept, string, boolean, integer, Range, Ratio, time, dateTime, Period, base64Binary |
Requirements | Should not duplicate the entity value unless absolutely necessary. |
Constraints |
|
Mappings |
|
AuditEvent.entity.agent | |
Short | Entity is attributed to this agent |
Definition | The entity is attributed to an agent to express the agent's responsibility for that entity in the activity. This is most used to indicate when persistence media (the entity) are used by an agent. For example when importing data from a device, the device would be described in an entity, and the user importing data from that media would be indicated as the entity.agent. |
Cardinality | 0..* |
Type | see (agent) |
Comments | A usecase where one AuditEvent.entity.agent is used where the Entity that was used in the creation/updating of a target resource, is not in the context of the same custodianship as the target resource, and thus the meaning of AuditEvent.entity.agent is to say that the entity referenced is managed elsewhere and that this Agent provided access to it. This would be similar to where the Entity being referenced is managed outside FHIR, such as through HL7 V2, v3, or XDS. This might be where the Entity being referenced is managed in another FHIR resource server. Thus it explains the provenance of that Entity's use in the context of this AuditEvent activity. |
Constraints |
|
Mappings |
|
Details
The must-support flag indicates that the element is expected in some use cases, and a missing flag that the element is never used.
Supported operations
HTTP methods
Operation | Supported | Comment |
---|---|---|
Search (GET, POST) | no | |
Insert (POST) | no | |
Update (PUT) | no | |
Delete (DEL) | no | |
Operation (GET, POST) | no |