8.0 Recommended Solution for Delegation of

esMD Author of Record Sub Workgroup Report
DRAFT Digital Signatures and Delegation of Rights
Electronic Submission of
Medical Documentation
Author of Record Level 1
Sub Workgroup Report
Digital Signatures and Delegation of Rights
1
12/14/12
1
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
2
3
Table of Contents
4
1.0
Summary ........................................................................................................................................... 5
5
2.0
Statement of Problem and Background........................................................................................... 6
6
3.0
Requirements .................................................................................................................................... 7
7
4.0
Assumptions ...................................................................................................................................... 7
8
5.0
Review of Standards ......................................................................................................................... 8
9
6.0
Evaluation of Alternative Solutions for Delegation of Rights ......................................................... 10
0.
Terms.................................................................................................................................................... 3
10
6.1
Proxy Certificates ........................................................................................................................ 10
11
6.2
SAML 2.0 Assertion .................................................................................................................... 11
12
6.3
Custom Assertion ....................................................................................................................... 11
13
6.4
Issues with Assertions ................................................................................................................ 11
14
6.5
Summary of Alternatives ........................................................................................................... 12
15
7.0
Recommended Solution for Digital Signatures ............................................................................... 12
16
7.1.
Recommended Standards .......................................................................................................... 13
17
7.2.
Digital Signature Artifacts for esMD Transactions and AoR Level 1 .......................................... 13
18
7.3 Verification of Digital Signature and Data Integrity ......................................................................... 13
19
7.4 Non-Repudiation ............................................................................................................................... 14
20
8.0 Recommended Solution for Delegation of Rights................................................................................. 16
21
8.1 Recommended Standards ................................................................................................................. 16
22
8.2 Delegation of Rights Artifact for Transaction and AoR Level 1 ......................................................... 16
23
8.3 Verification of Delegation of Rights .................................................................................................. 17
24
8.4 Non-Repudiation ............................................................................................................................... 18
25
9.0 Gaps ...................................................................................................................................................... 19
26
10.0 Risks, Issues and Obstacles ................................................................................................................. 19
27
Appendices.................................................................................................................................................. 20
28
Appendix A: Glossary ............................................................................................................................. 20
29
Appendix B: References .......................................................................................................................... 21
30
Appendix C: Copyright Acknowledgement ............................................................................................. 21
31
32
12/14/12
2
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
33
List of Figures:
34
35
36
37
Figure 1: Signature Artifact Example .......................................................................................................... 14
Figure 2: Delegation of Rights Example 1 ................................................................................................... 17
Figure 3: Delegation of Rights Example 2 ................................................................................................... 18
38
List of Tables:
39
40
41
42
43
44
45
Table 1: SWG Meeting Schedule ................................................................................................................... 7
Table 2: Digital Signatures Standards ........................................................................................................... 8
Table 3: Delegation of Rights Standards ....................................................................................................... 9
Table 4: Summary of Alternative Delegation of Rights Options ................................................................. 12
Table 5: Recommended Standards for esMD Digital Signatures ................................................................ 13
Table 6: Recommended Standards for esMD Delegation of Rights............................................................ 16
46
47
48
0. Terms
49
esMD – electronic submission of Medical Documentation
50
51
esMD Program – the program established by CMS for the electronic submission of Medical
Documentation
52
53
54
55
esMD Phase 1 – the first phase of the esMD Program focused on the electronic submission of PDF(s)
containing medical documentation in a C62 wrapper using the NwHIN Exchange. The primary source of
the submission is through certified Health Information Handlers (HIHs). esMD Phase 1 started pilot
production submission of documents in September of 2011
56
57
esMD Phase 1 Transaction – the transaction specified in the Implementation Guide for Electronic
Submission of Medical Documentation Project (esMD) Version 2.9 (4/17/2012)
58
esMD Gateway – the CMS NwHIN Connect instance that receives esMD Phase 1 transactions for CMS
59
60
61
62
63
esMD Initiative – the current esMD Program effort in conjunction with the ONC S&I Framework is
focused on three specific use cases: 1) Provider registration, 2) secure transmission of the electronic
Medical Documentation Requests, and 3) Author of Record, digital identities and digital signatures.
With this initiative, the esMD Program is soliciting participation by commercial payers and including
specific support for both CMS and commercial payers.
64
65
esMD Initiative Transactions – the specific transactions defined by the esMD Initiative use cases and the
subsequent implementation guides
The following are definitions of specific terms used in this document. For a full list of definitions see
Appendix A: Glossary.
12/14/12
3
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
66
Individual – in this document, any reference to an Individual is intended for a natural person only.
67
68
69
70
71
Organization or Entity – in this document, any reference to an organization or entity is to a legal entity
other than an Individual. In some cases, an Individual may also be the sole individual that is the
owner/subject of a professional corporation (PC) or limited liability corporation (LLC); in which case, the
Individual is the live person and PC or LLC is an organization or entity. Note: The term Organization will
be used in this document.
72
12/14/12
4
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
73
74
75
76
77
78
79
80
81
82
83
84
1.0
Summary
The Author of Record Sub Workgroup (SWG) on Digital Signatures and Delegation of Rights (DS/DR)
recognizes that healthcare payers using the esMD Initiative Implementation Guides require the ability to
create Public Key Infrastructure (PKI) based digital signatures and delegation of rights artifacts to
perform the following actions:
A. Establish identity of the provider to allow transmission of Protected Health Information (see
HIPAA) as part of an electronic Medical Documentation Request (eMDR).
B. Replace the “wet signature” on the document bundle submitted in response to an eMDR.
C. Determine authorship of medical documentation to support claims for payment for services
delivered by providers.
D. Prove delegation of rights where the originator of the above action is not the responsible
Individual or Organization (e.g., the originator is acting as an authorized agent).
85
86
87
88
All providers (Individuals and Organizations), as well as their designated agents, that register for the
esMD Program will be required to authenticate the above actions with digital signatures created using
X.509v3 signing certificates compliant with Federal Bridge Certification Authority (FBCA) Medium
Assurance and issued by Credential Service Providers (CSP) that are cross-certified with the FBCA.
89
The SWG recommends that the esMD Initiative identify and require:
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
A. A standard for digital signatures in the esMD transaction that clearly supports the transmission
of the public certificate and the basic message signature artifact (signed digest of the message)
as part of the esMD Initiative Transaction Implementation Guides (see Section 7.0).
B. A standard for digital signatures on document bundles that clearly supports the transmission of
the public certificate and the expanded signature artifact (minimum required: digest of
message, timestamp, and purpose of signature) for the Author of Record Level 1
Implementation Guide (see Section 7.0).
C. A standard for delegation of rights assertions for both messages and document bundle
signatures that include as part of the assertion, at a minimum, the certificate ID of both parties,
the purpose of the delegation, the effective date range, and an optional Uniform Resource
Identifier (URI) of a revocation list. Any transaction using the delegation of rights assertion must
include the public certificate of the delegator (see Section 8.0).
D. Long-term (21+ years) access to CSP/CA root certificates and revocation lists or a transaction
that can confirm that a certificate was valid (and not revoked) on a particular date/time.
The immediate need to provide digital signatures and delegation of rights artifacts can be met with
existing standards and implemented by providers, payers, agents and contractors. The capability may
be provided as a service by third parties or incorporated directly into or provided in conjunction with
EHRs and payer systems. Support for long-term access to certificate revocation lists will need to be
addressed by the industry. The ability to support validation or revocation of delegation assertions will
depend on the nature of the implementation and the specific delegation assertion and specific options
may be added as part of the pilots.
111
12/14/12
5
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
112
113
114
115
2.0
Statement of Problem and Background
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
On September 15, 2011, the esMD Program launched a pilot to accept electronic submissions from
providers via Health Information Handlers (HIHs). The current esMD initiative will enable Medicare
Review Contractors to send electronic Medical Documentation Requests, eliminating the need to send
the paper letters via mail. The next release will also implement the replacement of wet signatures with
Digital Signatures on the bundle of documents requested by CMS or the appropriate commercial
requestor.
133
134
135
136
The workgroup recommendations are constrained by two primary factors; (1) the solution must be
implemented within the first two quarters of calendar year 2013, and (2) the systems that support the
esMD Initiative (including esMD Phase 1) would have to meet standards established by the Federal
Information Security Management Act of 2002 (FISMA).
137
138
139
The workgroup identified a number of relevant standards. However, considering the FISMA
requirements, special emphasis was placed on NIST SP 800-63-1 and X.509 Certificate Policy for the
FBCA version 2.25 in determining the core requirements for their recommendations.
140
141
142
143
144
145
146
147
148
149
150
151
152
153
The overall recommendation is that all Individuals, Organizations and their agents must use a digital
certificate to sign esMD Initiative transactions and document bundles (as defined in the esMD Initiative
Author of Record Level 1 Use Case). The certificate’s root Certificate Authority (CA) must be crosscertified with the FBCA at Medium Assurance or above. Additionally, the provider should authenticate
to the signing module or application with at least one additional authentication factor prior to the actual
signing event. Adding the additional factor meets NIST Level of Assurance (LOA) 3 and supports the nonrepudiation assurances necessary for valid digital signatures. As technology options for both
authentication and digital signing continue to evolve, the esMD Initiative should continue to monitor
and update policies as appropriate to reflect improved technological capabilities.
Define the required process for issuing and managing digital credentials for the electronic submission of
Medical Documentation to the Centers for Medicare and Medicaid Services (CMS) and commercial
payers that adopt the esMD Initiative Implementation Guides.
There is a need on CMS’s part to: 1) verify the identification of the individual or organization receiving
Protected Health Information (PHI) contained in the eMDR and 2) to ensure authenticity of the
documents submitted in response to the eMDR. These are requirements for participation in the esMD
Program.
Three separate work groups were assembled to address Identity Proofing, Digital Credentials, Digital
Signatures, and Delegation of Rights issues associated with Digital Signatures. The Digital Signatures /
Delegation of Rights workgroup focused specifically on standards, policies and operational issues related
to digital signatures on Document Bundles and delegation of rights assertions for both message and
document bundle signatures.
The meetings to review the current standards, policies, alternatives and operational issues were
conducted on the schedule outlined in the table below:
12/14/12
6
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
154
155
Table 1: SWG Meeting Schedule
Date
Topic
Deliverable(s)
September 26, 2012
Standards
List and review of standards
October 3, 2012
Standards and industry examples
List and review of additional standards
industry examples
October 10, 2012
Transaction and AoR digital
signature and delegation process
Document digital signature and
delegation of rights process
October 17, 2012
Transaction and AoR signature and
delegation artifacts
Document digital signature and
delegation of rights artifacts
October 24, 2012
Validation process for nonrepudiation review
Document validation process with
assurance of non-repudiation of signer
and delegation(s)
October 31, 2012
Gaps in policy and standards
Identify gaps in standards, process and
policy and make recommendations
November 7-28, 2012
Review SWG report
SWG report
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
3.0
173
174
175
4.0
Requirements
The following specific requirements were provided by the esMD Initiative Author of Record workgroup:
1) Solution must
a. be implementable for pilot in Q1/Q2 of calendar year 2013.
b. scale to all providers (any Individual or Organization that may submit a claim to a healthcare
payer), healthcare payers, and agents for either party.
c. minimize the operational impact required to establish, maintain or use a digital identity and
digital signature.
d. provide for validation and non-repudiation of the digital signature without resorting to audit
logs or validation of system configuration.
2) Appropriate portions of the following standards must be supported
a. NIST 800-63-1 Level 3/4 (December 2011)
b. NIST 800-57 Part 1 (Revision 3 July 2012)
c. Federal Bridge Certification Authority Medium Assurance Level
d. X.509v3+ Digital Certificates
Assumptions
The following assumptions were made by the DS/DR SWG as part of their consideration of the esMD
AoR Use Case:
12/14/12
7
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
A. All esMD Initiative transactions must be digitally signed and non-repudiable by their author.
B. Document bundles must be digitally signed and non-repudiable by the responsible provider (the
subject of the eMDR) or their designated agent.
C. All delegation of rights to an agent must be cryptographically verifiable and non-repudiable.
D. Multiple architectural solutions may exist for implementation of DS/DR that include:
o National network – National services for authentication or complete AoR Level 1
o Federated method – Local (e.g., EHR)
E. Must comply with US government standards and regulations.
F. All certificates must be issued to Individuals or Organizations and include their unique
identification number (examples: Provider NPI, Health Plan HPID, Other Entity OEID, or EIN).
G. The esMD Initiative Implementation Guides require digital signatures and delegation of rights
artifacts for provider registration (UC 1), secure transmission of eMDRs (UC 2) and Author of
Record Level 1.
5.0
Review of Standards
The following standards, industry implementations, white papers and federal requirements were
reviewed by this SWG as part of their review and deliberation.
Digital Signatures
Table 2: Digital Signatures Standards
Standards
Document Link
ITI TF-1
ITI TF-2a
ITI TF-2b
ITI TF-3
IHE DSG
NIST SP 800-63-1
OASIS DSS Core Spec
XML DigSig
FIPS PUB 186-3
IETF RFC 6277
IETF RFC 6283
IETF RFC 5698
IETF RFC 5280
12/14/12
Title & Version / Notes
IHE IT Infrastructure Technical Framework: Volume
1: Integration Profiles, Revision 9.0
IHE IT Infrastructure Technical Framework: Volume
2a: Transactions Part A – Sections 3.1-3.28,
Revision 9.0
IHE IT Infrastructure Technical Framework: Volume
2b: Transactions Part B – Sections 3.29-3.51,
Revision 9.0
IHE IT Infrastructure Technical Framework: Volume
3: Cross-Transaction Specifications and Content
Specifications, Revision 9.0
IHE IT Infrastructure (ITI) Technical Framework
Supplement Document Digital Signature, Trial
Implementation Supplement
Electronic Authentication Guideline
Digital Signature Service Core Protocols, Elements,
and Bindings, Version 1.0
All DSS Standards
XML Signature Syntax and Processing (Second
Edition), W3C Recommendation
Digital Signature Standard
Online Certificate Status Protocol Algorithm Agility
Extensible Markup Language Evidence Record
Syntax
Data Structure for the Security Suitability of
Cryptographic Algorithms
Internet X.509 Public Key Infrastructure Certificate
Date
Aug 31, 2012
Aug 31 2012
Aug 31 2012
Aug 31 2012
Aug 10 2009
Dec 2011
Apr 11 2007
Jun 10 2008
Jun 2009
Jun 2011
Jul 2011
Nov 2009
May 2008
8
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
IETF RFC 5276
IETF RFC 4998
IETF RFC 3851
Industry
Implementations
White Papers /
Industry Reports
Federal Requirements
FBCA X.509 Certificate
Policy
21 CFR Parts 1305 and
1311, (DEA)
CertiPath X.509 Certificate
Policy
ABA IDM Task Force
Submission to UNCITRAL
Delegation of Rights
197
Table 3: Delegation of Rights Standards
Document Link
OASIS SAML Assertions
IETF RFC 3820
Federal Register, Vol 76,
No 8742 CFR Part 482 and
485
Industry
Implementations
Version 3.18
Overview of Identity Management. Additional
information found at the ABA’ Federated Identity
Management Legal Task Force page.
Digital Identity Management – Enabling Innovation and Trust in the Internet
Economy (OECD). This paper is summarized here and includes the following
reports:

Guidance on Digital Identity Management for Enabling Innovation and
Trust in the Internet Economy (Nov 23, 2011)

National Strategies and Policies for Digital Identity Management in
OECD Countries (Mar 31, 2010)

Role of Digital Identity Management in the Internet Economy: A Primer
for Policy Makers (June 11, 2009)

OECD Workshop on Digital Identity Management (May 8-9, 2007)
Action Plan
EU Qualified Signatures (eSignatures)
RMH Vol III Standard 3-1
CMS Risk Management Handbook Volume III,
Authentication
Standard 3.1: CMS Authentication Standards,
Version 1.2
195
196
Standards
and Certificate Revocation List Profile
Using the Server-Based Certificate Validation
Protocol to Convey Long-Term Evidence Records
Evidence Record Syntax
Secure/Multipurpose Internet Mail Extensions
(S/MIME) Version 3.1
Message
Specification
X.509 Certificate Policy for the Federal Bridge
Certification Authority, Version 2.25
Electronic Orders for Controlled Substances
TJC Hospital Record of
Care
IGTF OID Proxy Delegation
Tracing
HIPAA Business Associate
Agreement (BAA)
Title & Version / Notes
Assertions and Protocols for the OASIS
Security Assertion Markup Language
(SAML), Version 2.0
All SAML v2.0 files
Internet X.509 Public Key Infrastructure Proxy
Certificate Profile
Medicare and Medicaid Programs:
Changes Affecting Hospital and
Critical Access Hospital Conditions of
Participation: Telemedicine
Credentialing and Privileging
TJC standards are proprietary.
International Grid Trust Federation OID Proxy
Delegation Tracing
HHS - Sample Business Associate Contract
Provisions, Aug 14 2002
Aug 2008
Aug 2007
July 2004
Dec 9 2011
Apr 1 2005
Apr 16 2012
Winter 2011
Feb 23 2011
Jul 31 2012
Date
Mar 15 2005
Jun 2004
Feb 28 2008
OCR HIPAA Privacy - Business Associates, Apr 3,
12/14/12
9
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
AFIS (Automated
Fingerprint Identification
System)
Daon, Inc (Biometrics)
42 CFR Part 493 –
Laboratory Requirements
Federal Requirements
Unsorted
FEMA First Responder
Program
No reference
RMH Vol III Standard 3-1
Authentication
Safe-BioPharma
CMS – Pilot
Study Report on
Biometrics in EAuthentication
198
199
200
201
202
6.0
2003
NIST SP 500-290, American National Standard for
Information Systems Data Format for the Interchange of Fingerprint,
Facial& Other Biometric Information, Nov 2011
Site requires registration. Knowledgebase contains
white papers, data sheets and case studies.
Current CLIA Regulations (html)
CLIA requirements for agents or authorized
individuals
(webpage only)
Power of attorney / limited power of attorney
CMS Risk Management Handbook Volume III,
Standard 3.1: CMS Authentication Standards,
Version 1.2
Safe-BioPharma – Interoperable Digital Identity
Management in the Electronic Exchange of Health
Information
CMS – Pilot Testing of Initial Electronic Prescribing
Standards
Study Report on Biometrics in E-Authentication,
International Committee for Information
Technology Standards, Information Technology
Industry Council
Jul 31 2012
Mar 30 2007
Evaluation of Alternative Solutions for Delegation of Rights
The SWG reviewed a number of potential solutions to address the Delegation of Rights, including:
A. Proxy Certificates,
B. SAML Assertions, and
C. Custom Assertions.
6.1
Proxy Certificates
203
204
205
206
Based on IETF 3280, a Proxy Certificate is derived from and signed by a normal X.509v3 public key or by
another Proxy Certificate to provide restricted proxying and delegation within a PKI based
authentication system. The following is excerpted from IETF 3280.
207
A Proxy Certificate is an X.509v3 public key certificate with the following properties:
208
209
210
211
212
213
214
215
216
217
•
•
•
•
•
It is signed by either an X.509v3 End Entity Certificate (EEC), or by another PC. This EEC or PC is
referred to as the Proxy Issuer (PI).
It can sign only another PC. It cannot sign an EEC.
It has its own public and private key pair, distinct from any other EEC or PC.
It has an identity derived from the identity of the EEC that signed the PC. When a PC is used for
authentication, in may inherit rights of the EEC that signed the PC, subject to the restrictions
that are placed on that PC by the EEC.
Although its identity is derived from the EEC's identity, it is also unique. This allows this identity
to be used for authorization as an identity independent from the identity of the issuing EEC, for
example in conjunction with attribute assertions.
12/14/12
10
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
218
219
220
221
222
223
The Proxy Certificate contains a new X.509v3 extension to identify it as a PC and to place policies on the
use of the PC. This new extension, along with other X.509v3 fields and extensions, is used to enable
proper path validation and use of the PC.
6.2
The following is a review of SAML 2.0 Security Assertion Markup Language:
224
225
226
227
228
229
230
231
232
233
234
•
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
6.3
251
252
253
254
255
SAML 2.0 Assertion
•
•
•
•
SAML defines the syntax and processing semantics of assertions made about a subject by a
system entity.
SAML assertions and protocol messages are encoded in XML [XML] and use XML namespaces
[XMLNS].
The components primarily permit transfer of identity, authentication, attribute, and
authorization information between autonomous organizations.
The core SAML specification defines the structure and content of both assertions and protocol
messages used to transfer this information.
Assertions are usually created by an asserting party based on a request of some sort from a
relying party, although under certain circumstances, the assertions can be delivered to a relying
party in an unsolicited manner.
Custom Assertion
Creation of a custom assertion is an effective but non-standard solution for the Delegation of Rights. A
custom assertion has the benefit of including only the required information for the delegation and may
be considered an acceptable solution for some implementations of the esMD Initiative Transactions
where the standard allows for the extension of transaction-associated metadata. The required assertion
information consists of at least the following:
A.
B.
C.
D.
E.
A globally unique ID for this assertion
Issuer and X.509v3 serial number for both the originator and the recipient of the delegation
Effective dates
Purpose (from a defined code set)
Optional URI of revocation list
If the server countersigning approach is utilized to ensure the assertion is valid at the time of a signature
event by the recipient of the delegation of rights (see section 8.5), the specific encapsulation of the
assertion, in addition to its contents, is also important.
6.4
Issues with Assertions
Unlike Proxy Certificates which may potentially utilize CRLs to indicate Proxy Certificates that have been
revoked before they have expired, there is no equivalent solution for assertions. This is a potential
concern, since the assertion allows the holder to sign on behalf of the grantor of the right until the
expiration date. Solutions to this “problem” are discussed in section 8.5 below.
12/14/12
11
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
256
257
258
259
260
6.5
Summary of Alternatives
The following table summarizes the benefits, limitations and challenges with the above options for
conveying Delegation of Rights as required by the esMD initiative.
Table 4: Summary of Alternative Delegation of Rights Options
Benefits
Proxy Certificate
Understood form and use
Does not require
additional delegation
artifacts (i.e., selfcontained)
Limitations
Must be generated from
End-user Certificate
Challenges
Generation of Proxy Certificate is not
supported by FBCA. No general support
for trust chain from Proxy Certificates to
antecedent Proxy Certificate or Enduser Certificate
Requires the delegation activity to be
done with the specific Proxy Certificate
Holds information for
active date, purpose
Revocation process – who and how is it
handled?
SAML Assertion
Understood form and use
Easy to use (sign with own
certificate and provide
assertion as proof of right)
May not hold all required
information without
modification of standard
Revocation process – how is it handled?
Requires the inclusion of
custom metadata or the
extension of existing
metadata to support
Not an accepted standard
Uses certificate
verification to ensure
identity of grantor and
grantee
Custom Assertion
Contains only the
information required for
the delegation of rights
assertion
261
262
263
264
265
266
267
268
269
270
271
272
273
274
7.0
Recommended Solution for Digital Signatures
275
276
277
The digital signature is provided to the intended verifier along with the signed data. The verifying
entity verifies the signature by using the claimed signatory’s public key and the same hash function
that was used to generate the signature.
This SWG recommends a Digital Signature signing process compliant with FIPS PUB 186-3 using X.509v3
signing certificates with the non-repudiation bit set and issued according to the current X.509 Certificate
Policy for the Federal Bridge Certification Authority and compliant with Medium Assurance
requirements. The SWG also recommends that the signature artifact include at a minimum the
information specified in section 7.2 below and verification of the signature by the recipient is
conformant with the process described in section 7.3.
A hash function is used in the signature generation process to obtain a condensed version of the data
to be signed; the condensed version of the data is often called a message digest. The message digest is
input to the digital signature algorithm to generate the digital signature. The hash functions to be
used are specified in the Secure Hash Standard (SHS), FIPS 180-3. FIPS approved digital signature
algorithms shall be used with an appropriate hash function that is specified in the SHS.
12/14/12
12
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
7.1.
Recommended Standards
278
279
The following standards are recommended as appropriate for esMD Digital Signatures.
280
Table 5: Recommended Standards for esMD Digital Signatures
Standard and Link
Issued by
Version / Date
FBCA X.509 Certificate Policy
X.509 Certificate Policy for the Federal
Bridge Certification Authority, Version 2.25
Dec 9 2011
FIPS PUB 186-3
Digital Signature Standard
Jun 2009
281
7.2.
Digital Signature Artifacts for esMD Transactions and AoR Level 1
282
283
Digital signatures must conform to the requirements of FIPS 186-3.
284
When signing an esMD Initiative Transaction, the Implementation Guide shall specify:
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
A.
B.
C.
D.
the portion of the transaction that must be signed
the method used to create the digest of the signed portion
the use of the X.509v3 private key to encrypt the digest
how to include the following elements in the transaction:
i.
the encrypted digest, and
ii.
the public X.509v3 digital certificate corresponding to the X.509v3 private key used to
encrypt the digest
When signing an esMD AoR Level 1 Document Bundle, the Implementation Guide shall specify:
A. that all documents included in the Document Bundle shall be included in creating the digest to
be signed the method used to create the digest of the complete Document Bundle
B. the creation of a signing artifact that at a minimum must include
i.
the digest of the Document Bundle
ii.
the signature Date/Time (GMT), and
iii.
the purpose of the signature (from an appropriate standard code set)
C. to include the following elements in the transaction
i.
the AoR Level 1 Document Bundle,
ii.
the signature artifact, and
iii.
the public X.509v3 digital certificate corresponding to the X.509v3 private key used to
encrypt the digest
7.3 Verification of Digital Signature and Data Integrity
The recipient of the esMD Initiative Transaction or the esMD AoR Level 1 Document Bundle shall
perform the following validation to authenticate the signer and the signed information:
A. Validate the X.509v3 Digital Certificate(s) by verifying that:
i.
the certificate is current
12/14/12
13
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
309
310
311
312
313
314
315
316
317
318
319
320
321
ii.
iii.
B.
C.
D.
E.
it has been issued for a purpose acceptable to esMD
the trust anchor is acceptable for esMD by verifying the complete chain to a CA root
certificate or Federal common policy CSP
iv.
the altName field includes the required NPI or Alternative Payer ID identification
v.
it has not been revoked by verifying that the certificate is not on the certificate
revocation list
Decrypt the signed digest or signature artifact with public key
Compute the digest of transaction or document bundle
Verify that the signed digest matches computed digest
For the document bundle, verify that
i.
the signature date is appropriate
ii.
the signature purpose is appropriate
322
323
Figure 1: Signature Artifact Example
324
325
326
327
328
7.4 Non-Repudiation
All X.509v3 signing certificates issued by CSPs/CAs cross-certified with the FBCA for use with esMD must
have the non-repudiation bit set. Management and use of these signing certificates in conformance
with the FBCA Medium Assurance requirements and recommendations in NIST 800-57 and the
recommendations of the esMD AoR SWG white papers permits the recipient of the appropriately signed
12/14/12
14
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
329
330
transaction and document bundle, once verified as described in section 7.3 of this document, to
consider the signatures and content non-repudiable as established by standards cited in Section 7.1.
331
12/14/12
15
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
332
333
334
335
8.0 Recommended Solution for Delegation of Rights
336
337
8.1 Recommended Standards
338
Table 6: Recommended Standards for esMD Delegation of Rights
339
340
341
342
To convey, to a third party, the delegation of rights between the holder of a right and the Individual or
Organization that has been delegated the right by the holder, this SWG recommends the use of an
assertion conformant with the SAML Assertion Version 2.0.
The following standard is recommended as appropriate for esMD Delegation of Rights.
Standard and Link
Issued by
Version / Date
OASIS SAML Assertions
Assertions and Protocols for the OASIS
Security Assertion Markup Language
(SAML), Version 2.0
Mar 15 2005
8.2 Delegation of Rights Artifact for Transaction and AoR Level 1
The SAML Assertion should be created at the time the delegation of the right (e.g., the ability to register
the provider for a healthcare payer service) is made by the holder of the right and contain at a minimum
the following information:
343
344
345
346
347
348
349
350
351
352
A. A globally unique ID for this assertion
B. The issuer and serial number of the current X.509v3 signing certificate of the right grantor (the
private key of which must be used to sign the assertion)
C. The issuer and serial number of the current X.509v3 signing certificate of the recipient of the
right (the recipient must use the private key of this certificate to sign transactions and
documents when acting under the authority of the delegation of rights assertion)
D. The valid dates for the grant
E. The right that is granted (note: SWG recommends that an appropriate, computable list of rights
should be created and used for this purpose)
F. A URI to an assertion revocation list (if the assertion will not be countersigned)
353
A digest of the entire assertion must be signed by the grantor of the right.
354
355
When transmitting information to a third party that includes an assertion for the grant of a right, the
sending system must include in the transaction:
356
357
358
359
360
361
362
A. The public X.509v3 signing certificate of the grantor of the right
B. The signed assertion
C. The public X.509v3 signing certificate of the Individual or Organization to whom the right was
granted (as defined in the assertion)
D. Optionally but recommended,
a. Public X.509v3 signing certificate of the system that verified that the assertion is
currently valid
12/14/12
16
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
363
364
365
366
367
b. the method used to create the digest of the complete Document Bundle
c. the creation of a signing artifact that at a minimum must include
i. the digest of the signed assertion
ii. the signature Date/Time (GMT) and
iii. the purpose of signature (validation of the assertion)
368
369
Figure 2: Delegation of Rights Example 1
370
371
372
8.3 Verification of Delegation of Rights
373
374
375
376
377
378
379
380
381
382
The recipient of the esMD Initiative Transaction or the esMD AoR Level 1 Document Bundle that
includes a delegation of rights shall perform the following validation:
A. Validate the X.509 Digital Certificate of the assertion signer by verifying that:
a) the certificate is current
b) it has been issued for a purpose acceptable to esMD
c) the trust anchor is acceptable for esMD by verifying the complete chain to a CA root
certificate or Federal common policy CSP
d) the altName field includes the required NPI or Alternative Payer ID identification
e) it has not been revoked by verifying that the certificate is not on the certificate
revocation list
B. Decrypt the signed digest or signature artifact with public key
C. Compute the digest of assertion
12/14/12
17
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
383
384
385
386
387
388
389
390
391
392
393
394
395
396
D.
E.
F.
G.
Verify that the signed digest matches the computed digest
Verify that the assertion was valid when used
Verify that the right(s) delegated in the assertion are appropriate
Verify that one of the following is true
a) The assertion is for a one time purpose
b) The assertion is valid only for the date/time of the signature
c) The assertion has a valid URI for a revocation list and the assertion is not on the list
d) The assertion and its signature are countersigned by a trusted system (e.g. via a server
certificate associated with the grantor of the right that includes in the countersigned
signature artifact
i.
the digest of signed assertion (verify as above)
ii.
the signature Date/Time (GMT) (same as the signature date/time by the holder
of the right), and
iii.
the purpose of the signature (validation of the assertion)
397
398
399
400
401
402
403
404
Figure 3: Delegation of Rights Example 2
8.4 Non-Repudiation
By using X.509v3 signing certificates issued by CSPs/CAs cross-certified with the FBCA for use with esMD
that have the non-repudiation bit set, all assertion message digests signed with the private key allow the
recipient to consider the signatures and assertion non-repudiable as established by standards cited in
this document.
405
12/14/12
18
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
9.0 Gaps
Gaps exist in current standards, policies and operational processes that must be addressed to
implement the recommendations from this SGW. Satisfying these gaps is work that should be
undertaken during 2013 to support the digital signature and delegation of rights requirements of esMD
Use Case 1 (Provider Registration), Use Case 2 (secure transmission of the eMDR) and the Author of
Record implementation guides. These gaps include:
A. Selecting appropriate standards for digital signatures in the esMD transaction that clearly
support the transmission of the public certificate and the message signature artifact (signed
digest of the message).
B. Selecting appropriate standards for digital signatures on document bundles that, ideally, provide
transport-independent support for public certificates and document signature artifacts (signed
digest of message, timestamp, and purpose of signature).
C. Selecting appropriate standards for delegation of rights assertions for both messages and
document bundle signatures that include, at a minimum, issuer and certificate serial number of
both parties, the purpose of the delegation, the effective date range, and the optional location
of a revocation list. Any transaction must include the public certificate of the delegator.
D. Validation via pilots for the appropriate verification of the currency of a delegation of rights
artifact (e.g. one time use, countersigned by the system on use or a CRL equivalent revocation
process).
E. Providing for long-term access to CSP/CA root certificates and revocation lists or a transaction
that can confirm that a certificate was valid (and not revoked) on a particular date/time.
F. Support by provider, payers and agents for the recommended signature and delegation of rights
standards.
10.0 Risks, Issues and Obstacles
The following potential risks, issues and obstacles with regard to the DS/DR recommended were
identified by this SWG:
A. Time and cost to support DS/DR for providers, payers, agents and contractors
B. Transaction overhead to send the public certificate, signature artifact(s) and delegation of
rights artifact(s)
C. Processing time to validate digital signatures and delegation of rights
D. Long-term storage of public certificate, signature artifact(s) and delegation of rights
E.
F.
G.
H.
I.
artifact(s) by all involved parties
Long-term ability to validate that a certificate was not revoked when it was used in a signing
event
Limited adoption by the current provider and payer community
Limited use of current standards of digital signatures and delegation of rights in healthcare
Limited adoption by providers and payers
Use of the SAML assertion for delegation of rights, while supported by the SAML
architecture, is not currently employed in the healthcare industry.
12/14/12
19
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
433
Appendices
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
Appendix A: Glossary
A. Authentication (NIST) - Security measure designed to establish the validity of a transmission,
message, or originator, or a means of verifying an individual's authorization to receive specific
categories of information. [NS4009]
B. Author (of Record) - The individual that creates a record.
C. Certificate Authority (NIST) - An authority trusted by one or more users to issue and manage
X.509 Public Key Certificates and CARLs or CRLs.
D. Credential (NIST) - An object or data structure that authoritatively binds an identity (and,
optionally, additional attributes) to a token possessed and controlled by a Subscriber.
E. Credentialing – the process by which personal or professional information about an Individual
or Organization is verified by a third party.
F. Data Integrity (NIST) - A property whereby data has not been altered in an unauthorized
manner since it was created, transmitted or stored. Alteration includes the insertion, deletion
and substitution of data.
G. Decryption - The reverse process of encryption, i.e., to make the encrypted information
readable again.
H. Delegation of Rights - The ability to delegate rights or authority to another to act in a specific
capacity on behalf of the grantor of the right.
I. Digest – The result of applying a hash function to a message. Also known as “hash value.” A
hash function is a function that maps a bit string of arbitrary length to a fixed length bit string.
Approved hash functions are specified in FIPS 180-3 and are designed to satisfy the following
properties: (1) (One-way) it is computationally infeasible to find any input that maps to any new
pre-specified output, and (2) (Collision resistant) it is computationally infeasible to find any two
distinct inputs that map to the same output.
J. Digital Certificate (NIST) - A digital representation of information which at least (1) identifies
the certification authority issuing it, (2) names or identifies its subscriber, (3) contains the
subscriber's public key, (4) identifies its operational period, and (5) is digitally signed by the
certification authority issuing it.
K. Digital ID Management - A trusted authority is responsible for creating the key pair,
distributing the private key, publishing the public key and revoking the keys as necessary. The
“Passport Office” of the Digital World. The keys and their associated information (e.g. Digital
Certificate) are typically stored as software tokens, browser certificate stores, and hardware
tokens (Smart Cards, USB Tokens).
L. Digital Signatures - An artifact appended to a record as a result of a user’s intended action
wherein that memorializes a signing event by a process that digitally signs a document or
transaction using the private key component of his certificate. (From NIST - The result of a
transformation of a message by means of a cryptographic system using keys such that a Relying
Party can determine: (1) whether the transformation was created using the private key that
corresponds to the public key in the signer’s digital certificate; and (2) whether the message
has been altered since the transformation was made.) (From 800-63-1 an asymmetric key
operation where the private key is used to digitally sign data and the public key is used to verify
the signature. Digital signatures provide authenticity protection, integrity protection, and nonrepudiation).
12/14/12
20
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
M. Encryption - In cryptography, encryption is the process of transforming information (referred to
as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those
possessing special knowledge, usually referred to as a key.
N. Identity - A unique name of an Individual or Organization. Since the legal names of an Individual
or Organization are not necessarily unique, the ID must include sufficient additional
information (for example an address and NPI number) to make the complete name unique.
O. Identity Proofing - The process by which the credential issuer validates sufficient information
to uniquely identify an Individual or Organization applying for the credential. It proves that the
ID exists, proves the applicant is entitled to that ID, and addresses the potential for fraudulent
issuance of credentials based on collusion.
P. Non-repudiation (NIST) - A service that is used to provide assurance of the integrity and origin
of data in such a way that the integrity and origin can be verified by a third party. This service
prevents an Individual or Organization from successfully denying involvement in a previous
action.
Q. Public Key Infrastructure - A set of policies, processes, server platforms, software and
workstations used for the purpose of administering certificates and public-private key pairs,
including the ability to issue, maintain, and revoke public key certificates.
R. Registration Authority (NIST) - An entity that is responsible for identification and
authentication of certificate subjects, but that does not sign or issue certificates.
S. X.509v3+ - Includes X.509 version 3 and all subsequent versions [RFC 5280 and its
predecessors]
Appendix B: References





CMS Internet Only Manuals (IOM)
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT
Recommendation for Obtaining Assurances for Digital Signature Applications
OMB 04-04
Records Management Guidance For PKI Digital Signature Authenticated and Secured
Transaction Records
505
506
Appendix C: Copyright Acknowledgement
507
508
509
510
511
512
513
514
515
516
517
518
519
520
Copyright (C) The Internet Society (2002). All Rights Reserved.
Excerpts from Internet Society documents included above are allowed based on the following:
This document and translations of it may be copied and furnished to others, and derivative works that comment
on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in
whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this document itself may not be modified in any way,
such as by removing the copyright notice or references to the Internet Society or other Internet organizations,
except as needed for the purpose of developing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its
successors or assigns.
12/14/12
21
Summary White Paper
DRAFT Author of Record Subworkgroup on Digital Signatures and Delegation of Rights
521
522
523
524
525
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY
AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY
RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
12/14/12
22