Role-Based Access Control (RBAC) Use Cases
CBCC Main Page > CBCC Use Cases
Contents
Introduction
The following use cases are based on the RBAC specification.
Each type of user in a healthcare organization has a specified "role" which consists of "permissions" to perform certain functions and access specific data. While the set of permissions assigned to each role is based on local policy (enterprise-wide, jurisdiction-wide, etc.), the operation and the functions/information to which they apply, are standardized by HL7 as a normative specification. The functional roles for healthcare users are specified as an informative specification.
- Sample permissions:
- "read, M.A.R. (medication administration record)" allows the user the see the medication administered to a patient.
- "create, Registration" allows a clerk to register a patient by creating a registration/encounter record
Benefits RBAC for Patient Privacy
- Even though it does not take into account specific patient preferences, RBAC ensures that only specific user roles have access to patient information and clinical functionality (e.g. admission clerks cannot view pharmacy prescriptions).
Mask Functionality
Based on the functional role of the user logged in, the healthcare information system will limit access only to those operations (e.g. append, create, read, update, delete, execute) and functions (identified using an object id) that are allowed for that role.
Pre-condition
This use case would apply to a situation where both the application and the security systems are in the same organization or in different organizations.
Basic scenario
A user logs in, the application identifies the functional group or role for the user. Based on the user's role, the application interrogates the security systems for the functions allowed for the role. The security system stores the permissions associated with the role and it can specify whether the user can access specific functionality. Based on the results provided by the security system, the application displays to the users only those areas of functionality that prescribed by their functional role.
Actors
- User
- Healthcare Application
- Security System
Mask Information
Based on their functional role, users can view(read),create, update, delete, or act (execute) on information contained in a patient's record. While the role of the user may limit their access to specific patient record information - limiting it to the information required to perform the job as specified by the role -
Basic Scenario
The user inquires the Personal Health Record system, based on the role the system provides the information specified by the permissions assigned to the user's role.
Actors
- User
- EHR System (EHRS)
- Security System