Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: spellcheck
Excerpt

This is a description of the token-based security the eHealth infrastructure use uses to authenticate the identity of users and control access to resources.

...

The current list of privilege roles defined is given in the table below.

OIO BPP Role Role to Privilege mapping lists all the privileges for each role.

...