This section contains test cases performed with the Gazelle Security Suite tool:
--> Prior to performing ATNA tests, please read this page for guidelines that address frequently asked questions about testing expectations. <--
THIS PAGE APPLIES TO ATNA TESTING AT 2024 IHE CONNECTATHONs.
The ATNA requirements are in the IHE Technical Framework:
NOTE: The folloing options were retired in 2021 via CP-ITI-1247 and are no longer tested at IHE Connectathons:
Tool-based testing of TLS (node authentication) and of the format and transport of your audit messages is consolidated in one tool - the Gazelle Security Suite (GSS).
In order to ensure interoperability between systems doing interoperability (peer-to-peer) testing over TLS (e.g. XDS, XCA...) the Connectathon technical managers have selected a TLS version and ciphers to use for interoperability tests during Connectathon week. (This is analagous to a hospital mandating similar requirements at a given deployment.)
TLS POLICY for [ITI-19]:
*** For the 2022 IHE Connectathon, interoperabily testing over TLS shall be done using:
AUDIT MESSAGE POLICY for [ITI-20]:
Before 2020, an ATNA Audit Record Repository (ARR) was required to support receiving audit messages in both TLS syslog and UDP syslog. That meant that all Secure Node/Applications could send their audit messaes to any ARR.
Now, all actors sending and receiving audit messages may choose to support TLS Syslog, UDP Syslog, and/or FHIR Feed for transport. We expect that the Audit Record Repositories at the NA and EU Connectathons will provide good coverage of the options (TLS, UDP, FHIR), though some ARRs may support a subset. In particular, the FHIR Feed Option in ITI-20 may have less support because it was new as of 2020.
Connectathon technical managers will not select one transport for all audit records exchanged during Connectathon. Instead, Secure Node/Applications will choose ARRs for test partners that are compatible with the audit records they send in ITI-20. Gazelle Test Management will show compatible partners for ITI-20 interoperability tests: "ATNA_Logging_*.
The Gazelle Security Suite (GSS) tool is the SINGLE PROVIDER OF DIGITIAL CERTIFICATES for IHE Connectathons.
To obtain a digital certificate from the GSS tool for preparatory & Connectathon testing, follow the instructions in test 11100. That test contains instructions that apply to an IHE Connectathon, whether face-to-face or online.
Some facts about the digital certificates for Connectathon testing:
Systems testing ATNA are required to complete the ATNA Questionnaire in the GSS tool, ideally prior to Connectathon week. Embedded in the questionnaire are Audit Record tests and TLS tests customized for the profiles & actors you registered to test at Connectathon.
Read the Technical Framework documentation; you are responsible for all requirements in Record Audit Event [ITI-20] transaction. We will not repeat the requirements here.
WHICH SCHEMA???: The Record Audit Event [ITI-20] specifies use of the DICOM schema for audit messages sent using the ATX: TLS Syslog and ATX: UDP Syslog options. The DICOM schema is found in DICOM Part 15, Section A.5.1.
We expect implementations to be compliant; we have tested audit messages using the DICOM schema at IHE Connectathons since 2016.
SENDING AUDIT MESSAGES: You can send your audit records to the GSS tool simulating an Audit Record Repository. See test 11117.
Contact the Technical Project Manager for the IT Infrastructure domain. Refer to the Contact Us page.
There is no specific evaluation for this test.
Create a text file stating that you found and read the page. Upload that text file into Gazelle Test Management as the Log Return file for test 11099.
This test contains instructions for obtaining a digital certificate for your test system that is registered for an IHE Connectathon. You will obtain your digital certificate(s) from the Gazelle Security Suite tool.
First, please read the ATNA Testing Resources page before proceeding with this test. That page contains important context for using the digital certificates for Connectathon-related tests.
When you generate your digital certificate in Gazelle Security Suite, you will need to know two values:
(1) The hostname(s) for your test system:
(2) Domain Name:
When logging in to GSS, you will use your username & password from Gazelle Test Management for your Connectathon. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
It is also possible to find your certificate using the menu:
You are now ready to use this certificate for performing:
There is no specific evaluation for this test.
Create a text file stating that you have requested & received your certificate(s). Upload that text file into Gazelle Test Management as the Log Return file for test 11100.
In subsequent tests (eg 11109 Authentication test), you will verify the proper operation of your test system with your digital certificate.
In this test you complete a form which collects information that will help us evaluate the Audit Logging and Node Authentication (ATNA) capabilities of your test system.
The contents of your ATNA Questionnaire are customized based on the the profiles and actors that you have registered in Gazelle Test Management for a given testing event (e.g. an IHE Connectathon). Depending on which profiles/actors you have registered for, the ATNA Questionnaire will ask you to validate audit messages for transactions you support, and you will be asked to demonstrate successful TLS connections for the transports you support (eg DICOM, MLLP, HTTP).
Before you can generate your on-line ATNA questionnaire:
When logging in to GSS, you will use your username & password from Gazelle Test Management for your testing event. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
1. In GSS, select menu Audit Trail --> ATNA Questionnaires
2. First, search for any existing questionnaires for your organization. Use the filters at the top of the page to search based on various criteria. You will only be able to access the questionnaires created for your organization's test systems. Admins and monitors can access all of them.
3. You can use the icons in the right 'Actions' column to:
4. If no questionnaire is available for your test system, you need to create a new one.
5. Complete the questionnaire. You are now in the ATNA Questionnaire Editor.
6. Mark your questionnaire "Ready for review"
Depending on the testing event, the results of this test may be reviewed in advance. More typically, it will be reviewed and graded by a Monitor during the test event itself (e.g. during Connectathon week).
Note: You cannot get connectathon credit (i.e. a "Pass") for your ATNA Secure Node/Application without completing and submitting your questionnaire.
(1) Read the ATNA Testing Resources page before proceeding with this test.
(2) To perform this test, your digital certificate must be set up on your system (server and/or client). Follow the instructions in test 11000 to obtain digital certificate(s) for your test system(s).
(3) You should create your ATNA Questionnaire (test 11106) prior to running this test.
In this test, you will use the Gazelle Security Suite (GSS) tool (https://gazelle.ihe.net/gss) to verify that you are able to communicate with TLS clients and servers using digital certificates.
The GSS tool contains multiple client and server simulators that check:
The TLS simulators available in the GSS tool are listed in Column 1 in the following table, along with notes on which you should use for this test:
Simulator Names (keyword) | To be tested by... |
Simulator configuration |
-- Server DICOM TLS 1.2 Floor -- Server HL7 TLS 1.2 Floor -- Server HTTPS/WS TLS 1.2 Floor -- Server Syslog TLS 1.2 Floor |
Connectathon test system that supports the "STX: TLS 1.2 Floor option" and is a client that... -- Initiates a TLS connection with DICOM protocol -- Initiates a TLS connection with MLLP protocol (i.e. HL7 v2 sender) -- Initiates a TLS connection for a webservices transaction -- Initiates a TLS connection to send an audit message over TLS syslog |
TLS 1.2 with 4 'strong' ciphers:
You may test with just one of the ciphers. |
-- Server RAW TLS 1.2 INVALID FQDN |
Connectathon test system that is a client supporting the "FQDN Validation of Server Certificate option" |
TLS 1.2 with 4 'strong' ciphers; see list above. Certificate has an invalid value for subjectAltName. |
-- Client TLS 1.2 Floor |
Connectathon test system that supports the "STX: TLS 1.2 Floor option" and is a server that... -- Accepts a TLS connection with DICOM protocol -- Accepts a TLS connection with MLLP protocol (i.e. HL7 v2 responder) -- Accepts a TLS connection for a webservices transaction -- Accepts a TLS connection to receive an audit message over TLS syslog |
TLS 1.2 with 4 'strong' ciphers; see list above. |
When logging in to GSS, you will use your username & password from Gazelle Test Management for your testing event. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
If your test system (SUT) does not act as a client (i.e., does not initiate any transactions), then skip this portion of the test and only test the Server side below).
If your SUT acts as a client, you must be able to access to TLS server's public IP. You have to test your client by connecting to Server Simulators in the Gazelle Security Suite tool.
1. On the home page for the Gazelle Security Suite, select menu TLS/SSL-->Simulators-->Servers to find the list of server simulators. There are servers for different protocls (DICOM, HL7...) and for different ATNA options (e.g., TLS 1.2 Floor...).
2. Configure your client to connect to the test TLS server.
3. Check that the server is started before trying to connect to it. Click on the link for the server you want and look for status "Running"
4. In your SUT, perform a connection (eg send a query) to the test server. The TLS connection is valid, but at transaction level you will get invalid replies because we are only checking for the TLS connection.
5. You should then get a time-stamped entry in the results list at the bottom of the page. Blue dot means OK, red NOT OK.
5. For each successful connection, view the result with the icon in the "Action" column. Copy the Permanent link (URL) to the result into your ATNA Questionnaire, on the "TLS Tests" tab The link must be formatted like https://.../connection.seam?id=...
6. Repeat these steps for each supported protocol (HL7v2 , DICOM, Syslog server ...) : e.g., if your system has no DICOM capabilities, you can skip that portion of the test.
If your test system (SUT) does not act as a server (i.e., does not respond to any transactions initiated by others), then skip this portion of the test and only perform the Client test above).
If your SUT acts as a server (i.e. a responder to IHE transactions), your server must be accessible from the outside so that the GSS tool, as a client simulator, can connect to your SUT.
1. On the home page for the Gazelle Security Suite, select menu TLS/SSL-->Simulators-->Clients to find the list of client simulators.
2. In the "Start Connection" section of the page, you will have to specify, for each supported protocol :
3. Then click on "Start client".
4. You should then get a time-stamped entry in the results list. Blue means OK, red NOT OK.
5. For each successful connection, view the result at the bottom of the page using the icon in the "Actions" column. Copy the Permanent Link (URL) to the result into your ATNA Questionnaire, on the "TLS Tests" tab. The link must be formatted like https://.../connection.seam?id=...
6. Repeat these steps for each supported protocol (HL7v2, DICOM, Syslog client, ...) : e.g., if your system has no DICOM capabilities, you can skip that portion of the test.
Depending on the testing event, the results of this test may be reviewed in advance. More typically, it will be reviewed and graded by a Monitor during the test event itself (e.g. during Connectathon week).
The tool reports success or failure for each test you perform. Your test system must demonstrate successful TLS handshake for each inbound and outbound protocol you support.
If you are performing this test in preparation for an IHE Connectathon, a Connectathon monitor will verify your results as follows. The monitor will:
*** If your ATNA Secure Node/Secure Application is only a client (ie it only initiates transactions), then this test case is not applicable for you. Skip it. ***
This test exercises several error cases. You will use the TLS Tool in the Gazelle Security Suite as a simulated client, trying to connect to a Secure Node (SN) or Secure Application (SA) acting as a server.
Perform test 11109 Authentication Test before running this 'error cases' test.
When logging in to GSS, you will use your username & password from Gazelle Test Management for your testing event. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
Depending on the testing event, the results of this test may be reviewed in advance. More typically, it will be reviewed and graded by a Monitor during the test event itself (e.g. during Connectathon week).
Each error case must have a result of 'PASSED'.
Each transport type (HL7v2, DICOM, HL7, DICOM_ECHO, WEBSERVICE, SYSLOG, or RAW) implemented by your system as a server must have been tested at least one time in the list of error cases.
If you are performing this test in preparation for a Connectathon, a Connectathon monitor will verify your results pasted into each test step.
This test applies to a Secure Node/Application that supports the ATX: TLS Syslog or ATX: TLS UDP Option.
In this test, a Secure Node or Secure Application tests audit messages it sends.
The Gazelle Security Suite tool provides the ability to validate audit messages against the DICOM schema and the audit message definitions for many transactions in IHE Technical Frameworks. (We are not longer testing the RFC 3881 schema; the ATNA profile requires support for the DICOM schema for syslog audit messages sent via ITI-20.)
When logging in to GSS, you will use your username & password from Gazelle Test Management for your testing event. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
You may perform this test directly in the ATNA Questionnaire **or** you may use the Gazelle EVSClient tool. If you are preparing for an IHE Connectathon, you should use the instructions below for the ATNA Questionnaire.
---->Instructions for checking audit messages using the ATNA Questionnaire:
---->Instructions for checking audit messages using the EVSClient tool:
Depending on the testing event, the results of this test may be reviewed in advance. More typically, it will be reviewed and graded by a Monitor during the test event itself (e.g. during Connectathon week).
The tool reports the results of the validation of your messages. We are looking for PASSED results.
In this test, a client sends audit records or event reports using transaction [ITI-20] Record Audit Event to the Syslog Collector tool acting as an Audit Record Repository or Event Repository. The Syslog Collector is one of the tools embedded in the Gazelle Security Suite.
This test is performed by an ATNA Secure Node, Secure Application or Audit Record Forwarder. It is also performed by a SOLE Event Reporter.
Note that this test checks the transport of audit messages. The content of your audit message is verified in a different test.
When logging in to GSS, you will use your username & password from Gazelle Test Management for your testing event. There are separate CAS systems for different instances of Gazelle Test Management, and you will have to take this into account when logging in to GSS:
On the GSS home page (http://gazelle.ihe.net/gss) find the "Login" link at the upper right of the page.
You must check that your audit message has been received by the Syslog Collector and that the protocol SYSLOG is correctly implemented.
TCP Syslog is using the same framing requirement as TLS Syslog. You can first use the TCP port of Syslog Collector to debug your implementation. Keep in mind that the IHE ATNA Profile expects at least UDP or TLS for actors that produce SYSLOG messages.
.
This test applies to a Secure Node/Application that supports the ATX: FHIR Feed Option.
The RESTful ATNA TI Supplement, Section 3.20.4.2.2.1, defines a mapping between DICOM Audit Messages and FHIR AuditEvent Resources. Implementers should be creating their AuditEvent Resources according to the defined mappings, and expect that they will be examined according those mappings at IHE Connecthons.
---->Instructions for checking additional constraints on AuditEvent Resources (mapping defifned in ITI TF-2b: 3.20.4.2.2.1):
Depending on the testing event, the results of this test may be reviewed in advance. More typically, it will be reviewed and graded by a Monitor during the test event itself (e.g. during Connectathon week).
The tool reports the results of the validation of your Resources. We are looking for PASSED results.