List of Figures
- 1-1 Cerner Connector Architecture
- 2-1 Overall Flow of the Process for Creating an Application by Using the Connector
- 3-1 Default Attribute Mappings for Cerner User Account
- 3-2 Default Attribute Mapping for Cerner Organization
- 3-3 Default Attribute Mapping for Personnel Group
- 3-4 Default Organization Group entitlement mapping
- 3-5 Default Attribute Mapping for Cerner Personnel Alias
- 3-6 Default PPR Access Mapping
- 3-7 Default Taxonomy Mapping
- 3-8 Default Secure Email Mapping
- 3-9 Default Role Profile Entitlement Mapping
- 3-10 Location View Assocication Name
- 3-11 Default Discern User Group Entitlement Mapping
- 3-12 Default Personal Role Mapping
- 3-13 Supervisor Relationship Mapping
- 3-14 Security Key Chain Entitlement
- 3-15 Default Address mapping
- 3-16 Default Phone Mapping
- 3-17 Default Credential Mapping
- 3-18 Default Bedrock Wizards Mapping
- 3-19 Bedrock Reports Mapping
- 3-20 Eprescribe Mappings
- 3-21 Default Attribute Mappings for EPCS
- 3-22 Simple Correlation Rule for Cerner Target Application
- 3-23 Predefined Situations and Responses for a Cerner Target Application