Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Status

Status
colourGreen
titleActive

Last Updated

13th March, 2025

Version

4

Tip

This change only affects applies to customers whom who are connecting to our Hl7 API over the Public Internet and not using HSCN.

New endpoints

...

Available endpoints on Port 443:

Deprecations

Motivations/Goals

We want to tighten our security. Efforts we make on this front include:

  • deprecate/remove support for

    Status
    colourYellow
    titleweak
    ciphers,

  • get a WAF in place and

  • use standard ports.

...

Overview

The two available endpoints will only accepts ciphers that are deemded deemed as

Status
colourGreen
titlerecommeded
and
Status
colourGreen
titlesecure
by the industry, while the third provides backward compatilibity.

...

if you are unable to support the below listed ciphers, please contact our support desk (email: help@patientsknowbest.com).

Option 1 - Preferred - mTLS Endpoint

We offer mtls.hl7.uk.patientsknowbest.com to those customers who have moved to the cloud and can’t use static IPs when accessing our services. It is also our prefered setup for new customers.

Identity is still derived from client credentials and not the client certificate. mTLS in this scenario is only used to replace IP allow listing.

...

.

To start the process of mTLS client certificate creation please contact ca@patientsknowbest.com stating you wish to set up certificates for the UK production environment.

Option 2 - no-mTLS Endpoint

Customers, who have

  • up-to-date client software tools that support the state of the art cipher suites,

  • have static IPs that we can allow-list and

  • can’t allocate budget to implement mTLS in short term

can move to no-mtls.hl7.uk.patientsknowbest.com.

Backward compatibilty

deprecated-ciphers.no-mtls.hl7.uk.patientsknowbest.com is intended as a short term solution for customers who are not as yet up to date with their software systems and still require support for using ciphers that are considered to be weak.

...

.

Standard ports

Using standard ports (443) will allow allows us to consolidate our server certificate management and fully automate the renewall process for all our endpoints.

Supported ciphers

my

WSDL

If you require a WSDL file please use one of the following paths depending on which option you are using:

...

Legend

  • (tick) supported,

  • (error) not-supported,

  • (error) *: not supported (for technical reasons)

...

Name (OpenSSL)

...

mtls

...

no-mtls

...

Supported ciphers

Name (OpenSSL)

mtls

no-mtls

TLS_AES_128_GCM_SHA256

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

TLS_AES_256_GCM_SHA384

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

TLS_CHACHA20_POLY1305_SHA256

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES128-GCM-SHA256

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES256-GCM-SHA384

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

ECDHE-ECDSA-CHACHA20-POLY1305

Status
colourGreen
titlerecommended

(tick)

(tick)

(tick)

ECDHE-RSA-AES128-GCM-SHA256

Status
colourGreen
titlesecure

(tick)

(tick)

(tick)

ECDHE-RSA-AES256-GCM-SHA384

Status
colourGreen
titlesecure

(tick)

(tick)

(tick)

ECDHE-RSA-CHACHA20-POLY1305

Status
colourGreen
titlesecure

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES128-SHA256

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-ECDSA-AES256-SHA384

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-RSA-AES128-SHA256

Status
colourYellow
titleweak

(error)

(error)

(tick)

ECDHE-RSA-AES256-SHA384

Status
colourYellow
titleweak

(error)

(error)

(tick)

AES128-SHA256

Status
colourYellow
titleweak

(error)

(error)

(tick)

AES256-SHA256

Status
colourYellow
titleweak

(error)

(error)

(tick)

ECDHE-ECDSA-AES128-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-RSA-AES128-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-RSA-AES256-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

DHE-RSA-AES128-SHA256

Status
colourYellow
titleweak

(error)

(error)

(error) *

DHE-RSA-AES128-GCM-SHA256

Status
colourYellow
titleweak

(error)

(error)

(error) *

DES-CBC3-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

EDH-RSA-DES-CBC3-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

AES128-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

DHE-RSA-AES128-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

AES256-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

DHE-RSA-AES256-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

DHE-RSA-AES256-SHA256

Status
colourYellow
titleweak

(error)

(error)

(error)

AES128-GCM-SHA256

Status
colourYellow
titleweak

(error)

(error)

(error)

AES256-GCM-SHA384

Status
colourYellow
titleweak

(error)

(error)

(error)

DHE-RSA-AES256-GCM-SHA384

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-ECDSA-AES256-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-ECDSA-DES-CBC3-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)

ECDHE-RSA-DES-CBC3-SHA

Status
colourYellow
titleweak

(error)

(error)

(error)