As an extension of the infrastructure, a front-end for certain FHIR microservices has been built into the infrastructure. The solution is build built with the purpose of beeing a being an administrative solution for administrayive tasks administrative tasks. The solution uses the existing security model of the FUT infrastructure and the resources of the FUT infrastructure. A user accessing this solution needs to have administrative privileges for the areas of questionnaires, care teams, plan definitions, and activity definitions. A user with access rights to this solution does not automatically gain access to the clinical or the SSL domain.
The page describes the architecture of these frontends, developed as micro-frontends see also: Micro Frontends (martinfowler.com). The integration model used here, and also described in the document by Martin Fowler is the “Run-time integration via Web Components”.
User story using a shell application as a micro frontend
...
In there we have four types of components all released as containers.
The four types of components are related in this way:
The shell frontend (kam-ui) is a web application where the micro frontends are exposed inline. To the user, it seems to be one application.
The micro frontends are using the common pickers, to look up organizations, terminology, etc.
The micro frontends are using the infrastructure services to look up and persist resources in the infrastructure.
The four components are further described here:
Shell frontend
The shell frontend is a single-page app. It handles security and routing to the individual micro-frontends. The user accesses the shell and from there they can navigate through a menu to the individual micro-frontends. The user never leaves the shell application, but different micro-frontends can be shown. The connection between the shell application and the micro-frontends is very loosely coupled, and only through the user's browser. For further information on micro frontends see https://micro-frontends.org/ . The shell application is hosted as a container with an Nginx server, to enable the browser to load the shell frontend. The shell frontend-only really runs in the user's browser. The way these micro-frontends are loaded into the shell application, is facilitated by the tool Webpack, see also Micro frontends - eHealth Infrastructure Wiki - Confluence (atlassian.net) and Concepts | webpack
The micro-frontends are not loaded before they are needed, in order to maximize the performance of the user experience. As there can be many micro-frontends pre-fetching would come with a bigger and bigger penalty.
Micro frontend
The micro-frontends expose a frontend, tailored to show resources from a single infrastructure service. Currently, there are three micro-frontends: careteam, questionnaire, and plan. These micro-frontends are exposed by the shell-frontend and use infrastructure services to deliver resources to the end-user. For more information on how to interface from micro-frontend to shell application, read this page: Micro frontends - eHealth Infrastructure Wiki - Confluence (atlassian.net).
The individual micro frontends are hosted as a container with each their Nginx server, to enable the browser to load the specific micro-frontend. The individual micro-frontend only runs in the user's browser.
Common pickers
Among the micro-frontends, there is a need for a shared set of pickers, to make it possible to select an organization, create a timing expression, set measurement thresholds, etc. For this, a module has been created. The micro-frontends include this module and invoke it using messages in the browser, and will also receive the picked value/setting through a message. For more information on how to utilize pickers from the KAM project, have a look here: Kam-pickers - eHealth Infrastructure Wiki - Confluence (atlassian.net). The set of pickers is hosted as a container with each its own Nginx server, to enable the browser to load the pickers. The pickers only really run in the user's browser.
Infrastructure services
The remaining services are all infrastructure services
...
The security model used in KAM, is the same as the one used in the remaining FUT infrastructure. This means that the shell application will redirect the user to the IdP using the users browser, and in this process receive a set of security tokens (JWT). The shell application has the responsibility to do the required refreshes in order to ensure that the tokens are valid at all time, when using KAM. The access token is provided to the micro-frontends in browser local storage (with access tied to the KAM domain). They can use the token to do lookups into the infrastructure, and thus will only present data, which the current user has access to, with the currently selected security context.
Extensibility
The model used for micro-frontends is flexible and has already, apart from KAM been used by the K-PRO project for administrative elements. This is shown by this:
...
Here we see two new menu items, each linking to a separate K-PRO micro frontend:
“Fortolket visning” which enables the setup of views with interpretations of collected data from questionnaires
“Handlevejledninger” which enables the maintenance of instructions for different measures, carried out on the basis of questionnaire results
This setup is possible by mere configuration of the common workplace, with the configuration of new menu items with associated security model.