Excerpt |
---|
This is a description of the token-based security the eHealth infrastructure use uses to authenticate the identity of users and control access to resources. |
...
The current list of privilege roles defined is given in the table below.
OIO BPP Role Role to Privilege mapping lists all the privileges for each role.
...