Endpoint (29)

#NameSourceVerDescription
1mTLS Signed Objecthl7.fhir.us.davinci-pdex#currentR4mTLS Endpoint Signed Object Extension
2NDH Associated Servershl7.fhir.us.ndh#currentR4Associated Servers
3NDH Associated Servershl7.fhir.us.davinci-pdex#currentR4Associated Servers
4NDH Contactpoint Availabletimehl7.fhir.us.davinci-pdex#currentR4An extension representing the days and times a contact point is available
5NDH Dynamic Registrationhl7.fhir.us.ndh#currentR4Dynamic Registration
6NDH Dynamic Registrationhl7.fhir.us.davinci-pdex#currentR4Dynamic Registration
7NDH Endpoint Access Control Mechanismhl7.fhir.us.davinci-pdex#currentR4Endpoint Access Control Mechanism
8NDH Endpoint Access Control Mechanismhl7.fhir.us.ndh#currentR4Endpoint Access Control Mechanism
9NDH Endpoint Connection Type Versionhl7.fhir.us.ndh#currentR4An extension for endpoint connection type version
10NDH Endpoint Connection Type Versionhl7.fhir.us.davinci-pdex#currentR4An extension for endpoint connection type version
11NDH Endpoint IHE Specific Connection Typehl7.fhir.us.ndh#currentR4Endpoint IHE Specific Connection Type
12NDH Endpoint Non FHIR Usecasehl7.fhir.us.ndh#currentR4NonEndpointUseCase is an enumeration of the specific use cases (service descriptions) supported by the endpoint
13NDH Endpoint Rankhl7.fhir.us.ndh#currentR4Order established by a Role, Organization… for Endpoints capable of transferring the same content
14NDH Endpoint Rankhl7.fhir.us.davinci-pdex#currentR4Order established by a Role, Organization… for Endpoints capable of transferring the same content
15NDH Endpoint Testing Certificationhl7.fhir.us.ndh#currentR4An extension for endpoint testing certification
16NDH Endpoint Usecasehl7.fhir.us.davinci-pdex#currentR4EndpointUseCase is an enumeration of the specific use cases (service descriptions) supported by the endpoint
17NDH Endpoint Usecasehl7.fhir.us.ndh#currentR4EndpointUseCase is an enumeration of the specific use cases (service descriptions) supported by the endpoint
18NDH FHIR IGhl7.fhir.us.davinci-pdex#currentR4FHIR IG
19NDH FHIR IGhl7.fhir.us.ndh#currentR4FHIR IG
20NDH Secure Exchange Artifactshl7.fhir.us.davinci-pdex#currentR4Secure Exchange Artifacts
21NDH Secure Exchange Artifactshl7.fhir.us.ndh#currentR4Secure Exchange Artifacts
22NDH Trust Frameworkhl7.fhir.us.davinci-pdex#currentR4Trust Framework
23NDH Trust Frameworkhl7.fhir.us.ndh#currentR4Trust Framework
24NDH Usage Restrictionhl7.fhir.us.ndh#currentR4The FHIR specification contains a security meta tag which can be used to inform systems of the sensitivity of resources, as well as by access control mechanisms to ensure content isn't exposed that shouldn't be. This mechanism only goes to the resource level, this reference to a usage-restriction (consent) extends this further into the resource, and can be applied to any element, and may apply to all properties beneath the element (e.g. If applied to an identifier on a practitioner, then all the properties of the identifier should not be exposed unless it is understood) This will be expected to be used as a modifier extension.
25NDH Verification Statushl7.fhir.us.ndh#currentR4Indicates a resource instance verification status
26NDH Verification Statushl7.fhir.us.davinci-pdex#currentR4Indicates a resource instance verification status
27VhDir Digitalcertificatehl7.fhir.uv.vhdir#currentR4A digital certificate, used to identify a user or group of users, or for encrypted communications
28VhDir Endpoint Rankhl7.fhir.uv.vhdir#currentR4Order established by a Role, Organization... for Endpoints capable of transferring the same content
29VhDir Endpoint Usecasehl7.fhir.uv.vhdir#currentR4An enumeration of specific use cases (service descriptions) supported by the endpoint
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Extension D D D D D D D D D D D D D D D D D D D D D D D D D D D C D D
Extension.extension S C (3) S C (3) S C (3) S C (4) S C (2) S C (2) C C C C C S C (2) C C S C (8) S C (3) S C (3) S C (3) S C (3) S C (4) S C (4) S C (5) S C (5) C C C S C D (7) S C D (3)
Extension.extension.value[x] B M (2) C B M (2) C B M (2) B M (4) B M (2) B M (2) B M B M (8) C B M (2) C B M (2) C (3) C (3) C B M (3) C B M (3) C B M (4) C B M (4) S C D B M (6) S C D B M (2)
Extension.extension.url F (2) F (2) F (2) F (4) F (2) F (2) F F (8) F (2) F (2) F (3) F (3) F (3) F (3) F (4) F (4) F (6) F (2)
Extension.extension.extension C (2) C (2) C (2) C (4) C (2) C (2) C C (8) C (2) C (2) C (3) C (3) C (3) C (3) C (4) C (4)
Extension.url F F F F F F F F F F F F F F F F F F F F F F F F F F F F F
Extension.value[x] C C C C C C C B M C B M B M B M B M C C C C C C C C C C C C C D B M B M C S C D C
S: There is slicing defined in the element(s)
C: There is cardinality erstrictions defined in the element(s)
I: There is invariants defined in the element(s)
F: There is a fixed or pattern value defined in the element(s)
D: There is document provided in the element(s)
B: There is terminology bindings defined in the element(s)
M: At least one of the element(s) has must-support = true
(N): The number of elements if > 1

Produced 08 Sep 2023