Authentication and scope model for external applications
External developers authenticate with SMART on FHIR Authorization Code + PKCE. Tokens are validated by the proxy before access is granted to upstream FHIR APIs.
External developers authenticate with SMART on FHIR Authorization Code + PKCE. Tokens are validated by the proxy before access is granted to upstream FHIR APIs.
| Example | Value |
|---|---|
| Authorize | /AadSmartOnFhirProxy/authorize |
| Token | /AadSmartOnFhirProxy/token |
| FHIR base | /fhir |
| Discovery | /fhir/metadata |
Concrete hostnames are provided in partner onboarding artifacts.
| Example | Value |
|---|---|
| Baseline | user_impersonation |
| Launch | launch, launch.patient |
| Patient | patient.*.read |
| Extensions | Additional read scopes by approval |
Scope grant is controlled per app registration during onboarding.
| Example | Value |
|---|---|
| Application name | Legal or product name shown to members |
| Redirect URIs | All exact callback URIs for your environments |
| Client type | Public (PKCE) or Confidential |
| Support contacts | Security and operational contacts for incident response |
Credentials are issued after application review and approval.