R4 Ballot #1 (Mixed Normative/Trial use) Release 5 Preview #2
This page is part of the FHIR Specification (v3.3.0: R4 Ballot 2). The current version which supercedes this version is 4.0.1 . For a full list of available versions, see the Directory of published versions Value Set http://hl7.org/fhir/ValueSet/restful-security-service

FHIR Infrastructure Work Group   Maturity Level : 3 N Normative (from v4.0.0) Use Context : Any
Normative Candidate Note:
This page is candidate normative content for R4 in has been approved as part of an ANSI standard. See the Conformance Package . Once normative, it will lose it's Maturity Level, and breaking changes will no longer be made. for further details.

This is a value set defined by the FHIR project.


Defining URL: http://hl7.org/fhir/ValueSet/restful-security-service
Version: 4.4.0
Name: RestfulSecurityService
Title: RestfulSecurityService

Types of security services used with FHIR.

Committee: FHIR Infrastructure Work Group
OID: 2.16.840.1.113883.4.642.3.178 (for OID based terminology systems)
Source Resource XML / JSON

This value set is used in the following places:

This value set includes codes from the following code systems:


This expansion generated 03 Apr 2018 23 May 2020

This value set contains 6 concepts

Expansion based on http://hl7.org/fhir/restful-security-service version 3.3.0 RestfulSecurityService v4.4.0 (CodeSystem)

All codes from system http://hl7.org/fhir/restful-security-service http://terminology.hl7.org/CodeSystem/restful-security-service
Code Display Definition
OAuth OAuth OAuth (unspecified version see oauth.net).
SMART-on-FHIR SMART-on-FHIR OAuth2 using SMART-on-FHIR profile (see http://docs.smarthealthit.org/).
NTLM NTLM Microsoft NTLM Authentication.
Basic Basic Basic authentication defined in HTTP specification.
Kerberos Kerberos see http://www.ietf.org/rfc/rfc4120.txt.
Certificates Certificates SSL where client must have a certificate registered with the server.


See the full registry of value sets defined as part of FHIR.

Explanation of the columns that may appear on this page:

Lvl A few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information
Source The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract')
Display The display (used in the display element of a Coding ). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code