We plan to add three new endpoints and deprecate the current one for Hl7.

This change only affects customers whom are connecting to our Hl7 API over the Public Internet and not using HSCN.

New endpoints

We plan to introduce three new endpoints on Port 443:

Deprecations

Motivations/Goals

We want to tighten our security. Efforts we make on this front include:

All new endpoints have WAF protection. Two out of the three new only accepts ciphers that are deemded as and by the industry, while the third provides backward compatilibity.

Better support clients in the clould

We offer mtls.hl7.uk.patientsknowbest.com to those customers who moved to the cloud and can’t use static IPs when accessing our services. It is also our prefered setup for new customers.

note

Identity is still derived from client credentials and not the client certificate. mTLS in this scenario is only used to replace IP allow listing.

Identity is still derived from client credentials and not the client certificate. mTLS in this scenario is only used to replace IP allow listing.

Improve security

Customers, who have

can move to no-mtls.hl7.uk.patientsknowbest.com.

Backward compatibilty

deprecated-ciphers.no-mtls.hl7.uk.patientsknowbest.com is intended as a short term solution for customers who are not as yet up to date with their software systems and still require support for using ciphers that are considered to be weak.

We urge all our customers to get their systems up to date as it is a common best interest to exchange data as safely as possible.

Standard ports

Using standard ports (443) will allow us to consolidate our server certificate management and fully automate the renewall process for all our endpoints.

Supported ciphers

my.patientsknowbest.com:7443 supports all ciphers in below table. The new endpoints are compared with this - now deprecated - endpoint.

Legend

Name (OpenSSL)

mtls

no-mtls

deprecated-ciphers.no-mtls

TLS_AES_128_GCM_SHA256

(tick)

(tick)

(tick)

TLS_AES_256_GCM_SHA384

(tick)

(tick)

(tick)

TLS_CHACHA20_POLY1305_SHA256

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES128-GCM-SHA256

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES256-GCM-SHA384

(tick)

(tick)

(tick)

ECDHE-ECDSA-CHACHA20-POLY1305

(tick)

(tick)

(tick)

ECDHE-RSA-AES128-GCM-SHA256

(tick)

(tick)

(tick)

ECDHE-RSA-AES256-GCM-SHA384

(tick)

(tick)

(tick)

ECDHE-RSA-CHACHA20-POLY1305

(tick)

(tick)

(tick)

ECDHE-ECDSA-AES128-SHA256

(error)

(error)

(error)

ECDHE-ECDSA-AES256-SHA384

(error)

(error)

(error)

ECDHE-RSA-AES128-SHA256

(error)

(error)

(tick)

ECDHE-RSA-AES256-SHA384

(error)

(error)

(tick)

AES128-SHA256

(error)

(error)

(tick)

AES256-SHA256

(error)

(error)

(tick)

ECDHE-ECDSA-AES128-SHA

(error)

(error)

(error)

ECDHE-RSA-AES128-SHA

(error)

(error)

(error)

ECDHE-RSA-AES256-SHA

(error)

(error)

(error)

DHE-RSA-AES128-SHA256

(error)

(error)

(error) *

DHE-RSA-AES128-GCM-SHA256

(error)

(error)

(error) *

DES-CBC3-SHA

(error)

(error)

(error)

EDH-RSA-DES-CBC3-SHA

(error)

(error)

(error)

AES128-SHA

(error)

(error)

(error)

DHE-RSA-AES128-SHA

(error)

(error)

(error)

AES256-SHA

(error)

(error)

(error)

DHE-RSA-AES256-SHA

(error)

(error)

(error)

DHE-RSA-AES256-SHA256

(error)

(error)

(error)

AES128-GCM-SHA256

(error)

(error)

(error)

AES256-GCM-SHA384

(error)

(error)

(error)

DHE-RSA-AES256-GCM-SHA384

(error)

(error)

(error)

ECDHE-ECDSA-AES256-SHA

(error)

(error)

(error)

ECDHE-ECDSA-DES-CBC3-SHA

(error)

(error)

(error)

ECDHE-RSA-DES-CBC3-SHA

(error)

(error)

(error)