Syndicate content 0  
Announcement
· Jan 23, 2024
[Video] OAuth 2.0 Fundamentals

Hi Developers,

Watch this video to learn the different roles in OAuth 2.0, scopes, tokens, important authentication flows/grant types, and more:

OAuth 2.0 Fundamentals @ Global Summit 2023

https://www.youtube.com/embed/5zLdCs5cCd0
[This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]

3 4
0 456

If I add the same patient data with a different unique ID then it inserts as new data using a POST request.
So, In the FHIR server How can I prevent this kind of thing by using POST requests?
Note:- I don't want to use a PUT request for the same. The main thing is I want to get a unique patient record.
Que:- Is there any way to check data duplication on each FHIR resource?

Thanks & Regards,

Harshdeep Acharya

0 1
0 535

Hi,

There have been similar questions asked before, but a few years ago now. My problem is that when I create an application in plain CSP, a typical link to a page will look like this in the browser..

https://omnidata.com.au/csp/lcda/StudentList.csp?CSPCHD=001000010000EYnm...

One user sent back a comment.. 'I'm not using your application as it is un-secure' .. based on the fact that the elements are spelled out in the URL.

0 6
0 530
Question
· Nov 29, 2017
TCP adaptor + SSH Tunnel

Greetings.

We have one vendor who requires us to send data using TCP

through an SSH port forwarding tunnel that is set up in advance.

UNIX scripts maintain this, and the Ensemble interface uses a TCP Adapter.

I was thinking that Ensemble could maintain the SSH tunnel,

which would improve our detecting of issues.

Has anyone done something like this?

I see that the class %Net.SSH.Session has a method ForwardPort,

but it doesn't stand up the tunnel by itself. Instead, it appears

0 1
0 535

Hello Community,

This article aims to walk you through the process of setting up and utilizing the Flexible Python Runtime Feature for embedded Python. Prior to version 2024.2, Intersystems IRIS installer included a preinstalled version of Python, You can find the Python libraries and application files located in the \lib\python directory within your IRIS installation folder (for example, C:\InterSystems\IRIS20242\lib\python).

2 5
0 435

The request terminology sync task is currently producing this error:

ERROR #6248: SOAP response is a SOAP fault: faultcode=wsse:FailedAuthentication
faultstring=The security token could not be authenticated or authorized
faultactor=
detail=

The task is running correctly on other edges. I checked the HS_Services password and its the same as on the other edges. Anyone has any thoughts as to what could be causing this and how I can fix it.

0 1
0 534

Dear Community,

In advance of the upcoming release of InterSystems IRIS 2020.1 and InterSystems IRIS for Health 2020.1, we're pleased to invite you to the “Office Hours: InterSystems IRIS 2020.1 Preview” webinars. These Q&A sessions will provide a forum for you to ask questions and learn about the latest product features in the upcoming releases.

The webinar will feature members of InterSystems product management team who will answer questions and provide additional information about the new features and enhancements.

We will be hosting two sessions on Thursday, February 20, 2020. Reserve your spot by clicking one of the buttons below for the appropriate time slot.

➡️ 8AM (EST) WEBINAR

➡️ 1PM (EST) WEBINAR

3 2
1 495

I have an existing table, and I've added an array property to it that I need to populate.
The issue is that I can only use SQL to insert into the table due to access reasons.

For example:

Class Package.Tables.Person Extends %Persistent
{
Property Name As %String(MAXLEN = "");

Property Address As Array of Package.Datatypes.Address;
}

0 1
0 534

I've been looking at the idea of developing a Time Travel Debugger utility.

It would take a debug target and have a few options such as stack depth and disclude system code.

The debugger would either be started from an external tool, or triggered from a line of code inserted into a method that I want to record.

The debugger would execute the code from start to end and record the full stack on each step to the configured depth.

0 4
0 531

on red hat, but I would also be interested in a wider answer.

after running a benchmark for 40 minutes, I have been asked if any rollbacks occurred in that time. Rollbacks from SQL or objects.

The application does not record this, so I am looking for a system level record.

The journal entries do the necessary reverse sets and commit just like any transaction. So i don't think i can detect them there.

1 4
1 530

It's time to announce the Winners for February! Please welcome our awesome Global Masters Heroes!

The storm of applause goes to these developers and their great contribution to DC in February:

🥇 @Robert Cemper, ex Senior Sales Engineer from InterSystems, Austria

🥈 @Eduard Lebedyuk, Sales Engineer, InterSystems Corporation, Russia

🥉 @Benjamin De Boe, Product Manager, InterSystems Corporation, Belgium

Learn more about the competition and our awesome winners below.

6 3
0 474