Messaging Settings

The messaging settings section allows system administrators to configure the various messaging interfaces on SanteDB.

Common REST Settings

The REST based services in the configuration panel have two sections of configuration in their panel, as illustrated in the FHIR panel below.

  • REST API -> This section of the configuration panel is common to all REST services and controls the ports, paths and bindings of the REST API.

  • Service -> This section varies and is specific to the actual API being configured.

This section illustrates the common REST settings.

SettingDescriptionExample

Info Name

The informational name for the REST API. This is usually how the service handler knows which REST endpoint to bind to.

FHIR

Service Behaviors

The service behaviors configuration allows the configuration of one or more global behaviors for the service. Service behaviors are applied on all endpoints in the REST manager. See Service Behaviors

Endpoints

The endpoints (port, scheme, and host) where the API should be accessed. See Service Endpoints.

Service Behaviors

The service behaviors option can be expanded to show a collection editor. Here, administrators can remove or add new behaviors to the service definition.

SettingDescriptionExamples

Behavior Configuration

An XML fragment which controls the settings for the specific behavior. These change based on the behavior applied. See Service Behaviors for more information.

<maxConcurrency>10</maxConcurrency>

Type

The type of behavior that should be applied to the service scope. This is the actual behavior implementation that will run.

Endpoints

Editing the endpoints will present a collection editor where administrators can add/remove specific endpoint bindings to/from the service. Endpoint bindings dictate the port, scheme and path where the REST API can be accessed.

SettingDescriptionExample

Address

The address where the service should listen. Binding to 0.0.0.0 instructs the API to listen on all bound IP addresses of the service, 127.0.0.1 will bind only to localhost. You can also specify a specific IP address assigned to the machine to bind to.

http://0.0.0.0:9000/fhir

Certificate Binding

The details of the security certificate to use for HTTPS traffic. See details on certificate configuration below.

Endpoint Behaviors

Like the Service Behaviors configuration collection, this editor allows administrators to bind specific behaviors only to the specified endpoint.

Certificate Binding

When you set an endpoint address to scheme https:// the certificate binding configuration is enabled.

When binding an endpoint to HTTPS you must ensure:

  • The port is different than those used by HTTP bindings (only one scheme can be bound per port on a machine)

  • You have an SSL certificate with a private key installed in one of the key stores available to Windows or Mono (on Mono - using certmgr)

Once the certificate binding is enabled, you can expand it and select the certificate

SettingDescriptionExamples

Certificate

The selected certificate to use when serving requests on the API endpoint.

CN=localhost

Find Type

The method which should be used for finding the certificate in the secure store. If you're sharing this configuration across machines this value should be set appropriately to ensure that the correct certificate is selected..

FindByThumbprint - The thumbprint of the X509 certificate is used to locate the certificate (recommended)

FindBySubjectName - The subject name is used to find the certificate (recommended if a strong SN is present)

Location

The location where the SanteDB iCDR host should look for certificates.

LocalMachine - Use the local machine context (recommended)

CurrentUser - Use the service user account store.

Store

The store where SanteDB iCDR should look for the certificate to use for hosting the environment.

My - The personal store of the service account/machine (recommended)

Binding to HTTPS using the iCDR directly is only recommended on Microsoft Windows Operating Systems. It is possible to bind the certificate to a port/address pair in Mono on Linux operating systems, however this feature is not widely documented.

Consider using an TLS termination architecture for high-bandwidth deployments. Using a reverse proxy such as IIS or NGINX can greatly improve performance within the SanteDB iCDR environment as it allows shared web service endpoints to communicate using HTTP (with less overhead) whilst still allowing security transmission of data beyond the termination point.

Last updated