AuditEvent (1)

#NameSourceVerDescription
1Basic AuditEvent pattern for when an activity was authorized by an SAML access token Comprehensive Norwayjohnmoehrke.basicaudit.no#currentR4A basic AuditEvent profile for when an activity was authorized by an SAML access token. This profile is expected to be used with some other detail that explains the activity. This profile only covers the SAML access token. **Builds upon the IHE BALP Comprehensive**
1
AuditEvent
AuditEvent.purposeOfEvent C D
AuditEvent.purposeOfEvent.text
AuditEvent.purposeOfEvent.coding
AuditEvent.purposeOfEvent.coding.display
AuditEvent.purposeOfEvent.coding.code
AuditEvent.purposeOfEvent.coding.system
AuditEvent.meta
AuditEvent.implicitRules
AuditEvent.language
AuditEvent.text
AuditEvent.contained
AuditEvent.extension
AuditEvent.modifierExtension
AuditEvent.category
AuditEvent.code
AuditEvent.action
AuditEvent.severity
AuditEvent.occurred[x]
AuditEvent.recorded
AuditEvent.outcome
AuditEvent.outcome.extension
AuditEvent.outcome.modifierExtension
AuditEvent.outcome.code
AuditEvent.outcome.detail
AuditEvent.authorization
AuditEvent.basedOn
AuditEvent.patient
AuditEvent.encounter
AuditEvent.agent S C (6)
AuditEvent.agent.network C (5)
AuditEvent.agent.media C (5)
AuditEvent.agent.name C (5)
AuditEvent.agent.altId C (5)
AuditEvent.agent.purposeOfUse C (6)
AuditEvent.agent.purposeOfUse.text
AuditEvent.agent.purposeOfUse.coding
AuditEvent.agent.purposeOfUse.coding.display
AuditEvent.agent.purposeOfUse.coding.code
AuditEvent.agent.purposeOfUse.coding.system
AuditEvent.agent.extension S C D (13)
AuditEvent.agent.extension.value[x]
AuditEvent.agent.extension.value[x].extension S C (2)
AuditEvent.agent.extension.value[x].value C (3)
AuditEvent.agent.extension.value[x].system C (3)
AuditEvent.agent.extension.value[x].type F (3)
AuditEvent.agent.modifierExtension
AuditEvent.agent.type C F (5)
AuditEvent.agent.role C (5)
AuditEvent.agent.who
AuditEvent.agent.who.identifier
AuditEvent.agent.who.identifier.value C (5)
AuditEvent.agent.who.identifier.system C (5)
AuditEvent.agent.who.display C (6)
AuditEvent.agent.requestor F (5)
AuditEvent.agent.location C (5)
AuditEvent.agent.policy C (5)
AuditEvent.agent.network[x]
AuditEvent.agent.authorization
AuditEvent.source
AuditEvent.source.extension
AuditEvent.source.modifierExtension
AuditEvent.source.site
AuditEvent.source.observer
AuditEvent.source.type
AuditEvent.entity S C (2)
AuditEvent.entity.name C
AuditEvent.entity.lifecycle C
AuditEvent.entity.type C F
AuditEvent.entity.extension
AuditEvent.entity.modifierExtension
AuditEvent.entity.what C
AuditEvent.entity.role F
AuditEvent.entity.securityLabel C
AuditEvent.entity.query C
AuditEvent.entity.detail C
AuditEvent.entity.detail.extension
AuditEvent.entity.detail.modifierExtension
AuditEvent.entity.detail.type
AuditEvent.entity.detail.value[x]
AuditEvent.entity.agent
AuditEvent.agent.extension.value[x].assigner.identifier
AuditEvent.agent.extension.value[x].assigner.identifier.value C (2)
AuditEvent.agent.who.identifier.assigner.identifier
AuditEvent.agent.who.identifier.assigner.identifier.value C (5)
S: There is slicing defined in the element(s)
C: There is cardinality erstrictions defined in the element(s)
I: There is invariants defined in the element(s)
F: There is a fixed or pattern value defined in the element(s)
D: There is document provided in the element(s)
B: There is terminology bindings defined in the element(s)
M: At least one of the element(s) has must-support = true
(N): The number of elements if > 1

Produced 08 Sep 2023