Other ways to interoperate
Direct interoperability with OpenHIM
You must enter a comma separated list of trusted IP addresses to the whitelist property.
- Message format adaptation - this is the transformation of messages received in a certain format into another format (eg. HL7 v2 to HL7 v3 or MHD to XDS.b).
- Message orchestration - this is the execution of a business function that may need to call out to one or more other service endpoint on other systems. (eg. Enriching a message with a client’s unique identifier retrieved from a client registry then sending the enriched message to a shared health record).
Mediators can be built using any platform that is desired (some good options are pure Java using our mediator engine, Node.js, Apache Camel, Mule ESB, or any language or platform that is a good fit for your needs). The only restriction is that the mediator MUST communicate with the OpenHIM-core in a particular way.
Mediators must register themselves with the OpenHIM-core, accept request from the OpenHIM-core and return a specialised response to the OpenHIM-core to explain what that mediator did.
- 1.The mediator's exposed client endpoints must be protected by SSL so that data is encrypted in transit.
- 2.The endpoints must enforce JWT authentication.
- 3.The endpoints must check the scope of the JWT before permitting any further requests for business functions you feel are relevant to that scope.
- 4.Once the mediator has been written, tested and peer reviewed, it must be penetration tested by an equivalent independent, CREST equivalent certified penetration testing organisation before deployment.