Messaging Settings
Last updated
Last updated
The messaging settings section allows system administrators to configure the various messaging interfaces on SanteDB.
The REST based services in the configuration panel have two sections of configuration in their panel, as illustrated in the FHIR panel below.
REST API -> This section of the configuration panel is common to all REST services and controls the ports, paths and bindings of the REST API.
Service -> This section varies and is specific to the actual API being configured.
This section illustrates the common REST settings.
Info Name
The informational name for the REST API. This is usually how the service handler knows which REST endpoint to bind to.
FHIR
Service Behaviors
The service behaviors configuration allows the configuration of one or more global behaviors for the service. Service behaviors are applied on all endpoints in the REST manager. See Service Behaviors
See: Service Behaviors
Endpoints
The endpoints (port, scheme, and host) where the API should be accessed. See Service Endpoints.
See: Endpoints
The service behaviors option can be expanded to show a collection editor. Here, administrators can remove or add new behaviors to the service definition.
Behavior Configuration
An XML fragment which controls the settings for the specific behavior. These change based on the behavior applied. See Service Behaviors for more information.
<maxConcurrency>10</maxConcurrency>
Type
The type of behavior that should be applied to the service scope. This is the actual behavior implementation that will run.
Editing the endpoints will present a collection editor where administrators can add/remove specific endpoint bindings to/from the service. Endpoint bindings dictate the port, scheme and path where the REST API can be accessed.
Address
The address where the service should listen. Binding to 0.0.0.0 instructs the API to listen on all bound IP addresses of the service, 127.0.0.1 will bind only to localhost. You can also specify a specific IP address assigned to the machine to bind to.
http://0.0.0.0:9000/fhir
Certificate Binding
The details of the security certificate to use for HTTPS traffic. See details on certificate configuration below.
See: Certificate Binding
Endpoint Behaviors
Like the Service Behaviors configuration collection, this editor allows administrators to bind specific behaviors only to the specified endpoint.
See: Service Behaviors
When you set an endpoint address to scheme https://
the certificate binding configuration is enabled.
When binding an endpoint to HTTPS you must ensure:
The port is different than those used by HTTP bindings (only one scheme can be bound per port on a machine)
You have an SSL certificate with a private key installed in one of the key stores available to Windows or Mono (on Mono - using certmgr
)
Once the certificate binding is enabled, you can expand it and select the certificate
Certificate
The selected certificate to use when serving requests on the API endpoint.
CN=localhost
Find Type
The method which should be used for finding the certificate in the secure store. If you're sharing this configuration across machines this value should be set appropriately to ensure that the correct certificate is selected..
FindByThumbprint
- The thumbprint of the X509 certificate is used to locate the certificate (recommended)
FindBySubjectName
- The subject name is used to find the certificate (recommended if a strong SN is present)
Location
The location where the SanteDB iCDR host should look for certificates.
LocalMachine
- Use the local machine context (recommended)
CurrentUser
- Use the service user account store.
Store
The store where SanteDB iCDR should look for the certificate to use for hosting the environment.
My
- The personal store of the service account/machine (recommended)
Binding to HTTPS using the iCDR directly is only recommended on Microsoft Windows Operating Systems. It is possible to bind the certificate to a port/address pair in Mono on Linux operating systems, however this feature is not widely documented.
Consider using an TLS termination architecture for high-bandwidth deployments. Using a reverse proxy such as IIS or NGINX can greatly improve performance within the SanteDB iCDR environment as it allows shared web service endpoints to communicate using HTTP (with less overhead) whilst still allowing security transmission of data beyond the termination point.