Journl Streamed
Talk to an expertWebsite
  • Introduction
  • Getting Started
    • Sandbox Access
    • On-Premise
    • Cloud
  • Overview
    • Why Journl Streamed?
    • Licensing & Support
    • Features
    • Solution Architecture and Usage
  • API
    • FHIR API
      • Accessing FHIR Data
      • CRUD
        • Create
        • Read
        • Update
          • Versioned Update
        • Patch
        • Delete
          • Versioned Delete
    • Batch Upsert
  • Services
    • Security & Access Control
    • FHIR Modeling, Profiles, and Standards
    • Careplan Creation
    • Analysis on Demand
      • Standard Process
      • Types of Analysis
    • Custom Resources
    • Monitoring & Maintenance
  • Storage
    • Database
      • Database schema
    • Backup and Restore
    • Indexes
  • Integrations
    • Data Ingestion and Decoupling
    • Subscriptions and Event Notifications
    • BI & Analytical tools
      • Power BI
      • Tableau
      • Jupyter Notebook
Powered by GitBook
On this page
  • Authentication & authorization
  • Security Measures
  1. Services

Security & Access Control

Description of security and how to use access control.

PreviousBatch UpsertNextFHIR Modeling, Profiles, and Standards

Last updated 9 months ago

Journl Streamed prioritizes the security and privacy of healthcare data. This documentation outlines the key components and best practices to ensure secure data management within the platform.

Authentication & authorization

We supports multiple authentication methods to verify the identity of users and systems accessing the platform. These include:

  • OAuth 2.0: A widely adopted authorization framework that enables third-party applications to obtain limited access to user accounts without exposing credentials. OAuth 2.0 is used to securely manage access tokens and permissions.

  • API Keys: Simple tokens that can be used for server-to-server interactions where user delegation is not required. API keys should be treated as sensitive information and securely stored.

  • Basic Authentication: A straightforward method using a username and password for client authentication. It is typically used for legacy systems or simple integrations.

With fine-grained access control we can ensure that users and applications can only access the resources they are permitted to. This is achieved through:

  • Role-Based Access Control (RBAC): Users are assigned roles that determine their permissions within the system. Each role has a set of allowed actions (e.g., read, write, delete) on specific resources.

  • Attribute-Based Access Control (ABAC): Access decisions are based on user attributes (e.g., department, job title) and resource attributes (e.g., sensitivity level). ABAC allows for more dynamic and context-aware access control policies.

Security Measures

If needed, sensitive data stored in Journl Streamed can be encrypted using industry-standard encryption algorithms. This protects data from unauthorized access even if the storage medium is compromised.

Communications between clients and the server are encrypted using TLS (Transport Layer Security). This ensures that data transmitted over the network remains confidential and tamper-proof.

Journl Streamed maintains detailed audit logs of all access and modification events. These logs include information about who accessed or modified data, what actions were performed, and when they occurred. Audit logs are crucial for monitoring, compliance, and forensic investigations.

Would like to know more about our security and how to use our access control?

with any questions you might have.

Contact the Journl team