|  | FhirAuditDispatcher Class | 
 Inheritance Hierarchy
Inheritance HierarchyNamespace: SanteDB.Messaging.FHIR.Auditing
 Syntax
SyntaxThe FhirAuditDispatcher type exposes the following members.
 Constructors
Constructors| Name | Description | |
|---|---|---|
|  | FhirAuditDispatcher | 
            Creates a new audit dispatcher
             | 
 Properties
Properties| Name | Description | |
|---|---|---|
|  | ServiceName | 
            Gets the name of the service
             | 
 Methods
Methods| Name | Description | |
|---|---|---|
|  | Equals | Determines whether the specified object is equal to the current object.(Inherited from Object.) | 
|  | Finalize | Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection.(Inherited from Object.) | 
|  | GetHashCode | Serves as the default hash function.(Inherited from Object.) | 
|  | GetType | Gets the Type of the current instance.(Inherited from Object.) | 
|  | MemberwiseClone | Creates a shallow copy of the current Object.(Inherited from Object.) | 
|  | SendAudit | 
            Send an audit to the repository
             | 
|  | ToString | Returns a string that represents the current object.(Inherited from Object.) | 
 Extension Methods
Extension Methods| Name | Description | |
|---|---|---|
|  | ConvertTReturn | 
            The purpose of this method is to convert object me to TReturn. Why?
            Because if you have an instance of Act that actually needs to be a SubstanceAdministration we can't just cast
            so we have to copy.
            (Defined by ExtensionMethods.) | 
|  | GetInstanceOfTDomain | 
            Gets an instance of TDomain from me
            (Defined by ModelExtensions.) | 
 Remarks
RemarksThis implementation of the IAuditDispatchService is responsible for dispatching audits to a central FHIR repository which supports the FHIR auditing specification.
This dispatcher is configured using the FhirDispatcherTargetConfiguration class where the dispatcher name is audit. The dispatcher configuration may include authentication/authorization parameters for the solution, as well as authenticators or proxy information.
 See Also
See Also