This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 9, 2025 21:26+0000+00:00)
package.json{
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 9, 2025 21:26+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@2.0.0",
"date": "20251209212654",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"tgz": "-/hl7.fhir.us.udap-security-2.0.0.tgz",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-2.0.0.tgz"
},
"name": "hl7.fhir.us.udap-security",
"dist-tags": {
"latest": "2.0.0"
},
"type": "IG",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International / Security",
"_versions": [ "2.0.0", "2.0.0-ballot", "1.1.0", "1.0.0", "0.1.0" ],
"id": "hl7.fhir.us.udap-security@2.0.0",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/STU2",
"versions": {
"1.0.0": {
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Sep 27, 2022 18:31+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@1.0.0",
"date": "20220927183126",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-1.0.0.tgz"
},
"name": "hl7.fhir.us.udap-security",
"type": "IG",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International - Security WG",
"id": "hl7.fhir.us.udap-security@1.0.0",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/STU1",
"version": "1.0.0",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International - Security WG"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.fhir.us.core": "3.1.1",
"hl7.terminology.r4": "4.0.0"
}
},
"1.1.0": {
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Wed, Aug 21, 2024 13:14+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@1.1.0",
"date": "20240821131401",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-1.1.0.tgz"
},
"name": "hl7.fhir.us.udap-security",
"type": "IG",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International - Security WG",
"id": "hl7.fhir.us.udap-security@1.1.0",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/STU1.1",
"version": "1.1.0",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International - Security WG"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.fhir.us.core": "3.1.1",
"hl7.terminology.r4": "6.0.2",
"hl7.fhir.uv.extensions.r4": "5.1.0"
}
},
"2.0.0-ballot": {
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 17, 2024 15:02+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@2.0.0-ballot",
"date": "20241217150256",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-2.0.0-ballot.tgz"
},
"name": "hl7.fhir.us.udap-security",
"type": "IG",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International / Security",
"id": "hl7.fhir.us.udap-security@2.0.0-ballot",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/2025Jan",
"version": "2.0.0-ballot",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International / Security"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.fhir.us.core": "3.1.1",
"hl7.terminology.r4": "6.1.0",
"hl7.fhir.uv.extensions.r4": "5.1.0"
}
},
"0.1.0": {
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Fri, Aug 6, 2021 15:57+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@0.1.0",
"date": "20210806155718",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-0.1.0.tgz"
},
"name": "hl7.fhir.us.udap-security",
"type": "fhir.ig",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International - Security WG",
"id": "hl7.fhir.us.udap-security@0.1.0",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/2021Sep",
"version": "0.1.0",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International - Security WG"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.fhir.us.core": "3.1.1"
}
},
"2.0.0": {
"description": "This implementation guide describes how to extend OAuth 2.0 to support secure and scalable workflows for business-to-business (B2B) apps that implement the client credentials flow or authorization code flow. (built Tue, Dec 9, 2025 21:26+0000+00:00)",
"fhirVersions": [ "4.0.1" ],
"tools-version": 3,
"_id": "hl7.fhir.us.udap-security@2.0.0",
"date": "20251209212654",
"license": "CC-BY-4.0",
"jurisdiction": "urn:iso:std:iso:3166#US",
"tgz": "-/hl7.fhir.us.udap-security-2.0.0.tgz",
"dist": {
"tarball": "https://fs.get-ig.org/-/hl7.fhir.us.udap-security-2.0.0.tgz"
},
"name": "hl7.fhir.us.udap-security",
"type": "IG",
"title": "Security for Scalable Registration, Authentication, and Authorization",
"author": "HL7 International / Security",
"id": "hl7.fhir.us.udap-security@2.0.0",
"directories": {
"lib": "package",
"example": "example"
},
"canonical": "http://hl7.org/fhir/us/udap-security",
"url": "http://hl7.org/fhir/us/udap-security/STU2",
"lsn": 2418,
"version": "2.0.0",
"timestamp": "2025-12-09T22:05:13.419299938Z",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International / Security"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.terminology.r4": "7.0.0",
"hl7.fhir.uv.extensions.r4": "5.2.0"
}
}
},
"lsn": 2418,
"version": "2.0.0",
"timestamp": "2025-12-09T22:05:13.419299938Z",
"maintainers": [ {
"url": "http://www.hl7.org/Special/committees/secure",
"name": "HL7 International / Security"
} ],
"dependencies": {
"hl7.fhir.r4.core": "4.0.1",
"hl7.terminology.r4": "7.0.0",
"hl7.fhir.uv.extensions.r4": "5.2.0"
}
}