Upon client initiation of an OIDC Authorization Code Flow for a citizen user, federation is performed as shown below. Citizen access to the eHealth Infrastructure goes through NemLogin.
SAML Attributes for Citizen Users
NemLogin provides a set of SAML attributes in a SAML assertion which is used to identify the citizen. Other attributes are also part of the SAML attribute; they are however not currently used. The table below lists the current attributes that are delivered by NemLogin:
Attribute | Description |
---|---|
| Civil registration number (CPR) |
| Level of assurance (must be Substantial) |
| First name |
| Last name |
Citizen User Access Tokens
Citizens accessing the eHealth Infrastructure are handled a bit differently from other users accessing the platform. A citizen does not carry a context of system roles and organisation. Instead, access is limited to Patient data about the citizen herself/himself.
Using the provided SAML attributes, the infrastructure searches for a Patient resource that corresponds to the citizen. If found, the infrastructure automatically sets the Patient context in the access token and the user_id
is set to the Patient resource reference. The citizen cannot switch context and can access only Patient data being scoped to that Patient context.
In case no Patient is found, the access token user_id
is set to a UUID instead of a Patient resource reference. This design ensures that federated NemLogin can be verified without blocking the citizen from accessing the platform. When no Patient is found, the citizen is accessing the infrastructure prior to having been enrolled (created as a Patient) by an employee through https://docs.ehealth.sundhed.dk/latest-released/ig/OperationDefinition-ehealth-patient-create.html.
A Citizen Solution shall handle user_id
not set to a Patient resource reference, for instance, by warning the citizen that she/he has not yet been enrolled.