DICOM PS3.2 2025c - Conformance |
---|
[Describe in this section the security mechanisms utilized by the implementation. In particular (but not limited to), consider:
Access authorizing policy and method, including details regarding trust methods, e.g., use of OAuth, use of access tokens, etc.
Credentials Storage Protection (for tokens, assertions, etc.)
Provisioning, Deprovisioning, Load balancing, Failover, etc. support
Cross site authorization systems such as Cross-Origin Resource Sharing (CORS)
These descriptions may be just a reference to another section of the Conformance Statement if these mechanisms are common with DICOM networking services described before or may contain references to other relevant documentation.]
DICOM PS3.2 2025c - Conformance |
---|