Release Management
Space shortcuts
Space Tools

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin

html-text
<a href="https://community.i2b2.org/wiki/download/attachments/16974296/releaseNotes_1710.pdf?api=v2"><img src="https://community.i2b2.org/wiki/download/attachments/851970/printer.png" alt="Printable version of this release note" title="Printable version of this release note" align=right></a>

Anchor
releaseNote-1710
releaseNote-1710
html-text
<!DOCTYPE html>
<html>
<head>
    <title>i2b2 1.7.10 Release Notes</title>
    <meta charset="UTF-8">
    <meta name="description" content="The release notes for version 1.7.10 of the i2b2 Software" />
    <meta name="keywords" content="i2b2, release, 1.7.10" />
<!--    <link rel="stylesheet" type="text/css" media="all" href="/stylesheets/i2b2-wiki.css" /> -->
</head>
<body>
    <h1 class="releaseHeading" id="rel1710">i2b2 Release 1.7.10</h1>
    <p class="releaseDate"><b>Release Date:</b> May 14, 2018</p>
</body>
</html>

Anchor
releaseNoteSum-1710
releaseNoteSum-1710

Release Summary

Release 1.7.10 contains several new enhancements to the i2b2 kernel, many of which improve the security around signing into the i2b2 Web Client. We have included some Auditing features like logging all successful and attempted logins into the i2b2 Web Client or keeping a log of all the Admin functions performed with the Admin Module.

Highlight of Features

  • Log admin and sign on activity
  • Lock users out after a specific number of failed login attempts
  • Require users to change passwords after a specified interval of time
  • Prevent users from using the same password when required to change it.
  • Enforce complex password requirements defined by the i2b2 Administrator.
  • Custom SQL Breakdowns
  • Temporal query made simple
  • Single sign-on
  • Improve datasource validation

Anchor
releaseNoteNewInstall-1710
releaseNoteNewInstall-1710

Installation Note

The 1.7.10 Release Notes apply to you if you are upgrading your existing i2b2 system from an earlier version of the i2b2 software.

Type of installWhere you need to go next
Upgrading an existing i2b2 (currently installed at your site)
Please go to the  Upgrade Notes section for the details about upgrading your i2b2 software. 
Upgrading your i2b2 in a SHRINE networkPlease read the information in the SHRINE Networks section before proceeding.
Installing a new instance of i2b2. (Never installed it before)We recommend you refer to the i2b2 Installation Guide found on the i2b2 Community Wiki. The install guide will take you through the entire installation process.
UI Text Box
typetip

If you run into issues or have questions you can reach out to the community by emailing the google group called i2b2 Install Help.


Anchor
releaseNoteShrineApprvl-1710
releaseNoteShrineApprvl-1710

SHRINE Networks

UI Text Box
sizemedium
typewarning

WARNING

Release 1.7.10 has not been tested within a SHRINE network. Therefore, i2b2 Release 1.7.10 should not be installed within a SHRINE network. It can be installed independently of SHRINE. However because it has not been tested with SHRINE we can not guarantee all of the new enhancements will continue to work correctly when implemented within a SHRINE environment.

Anchor
releaseNoteUpgrade-1710
releaseNoteUpgrade-1710

Upgrade Notes

Information about upgrading i2b2 to version 1.7.10 can be found in this section of the release notes.

 

Anchor
releaseNoteUpgradeComponents-1710
releaseNoteUpgradeComponents-1710

i2b2 Components

In release 1.7.10 the following i2b2 components contain changes and therefore need to be updated when upgrading your i2b2 environment.

  • i2b2 Database
  • i2b2 Server (kernel)
  • i2b2 Web Client

 

Anchor
releaseNoteUpgradeDrivers-1710
releaseNoteUpgradeDrivers-1710

Database Drivers

The JDBC drivers were updated to the following versions.

DriverNew Version
ojdbc8.jarOracle 1 2.2.0.1
postgresql-42.1.4.jarpostgres 42.1.4
mssql-jdbc-6.2.2.jre8.jarsql server 6.2.2

 

Anchor
releaseNoteUpgradePath-1710
releaseNoteUpgradePath-1710

Upgrade Paths

The i2b2 now provides two options for upgrading your i2b2 server.

  1. Continue to download the source code provided in the zip file released on www.i2b2.org/software
  2. Install the precompiled JAR files onto your existing i2b2 server to upgrade it to 1.7.10.

Both are acceptable paths to upgrade your i2b2 server and depending on which you choose will determine where you need to go to obtain the appropriate files. The location of the upgrade files for each component is outlined below.

 

Anchor
releaseNoteUpgradeSoftware-1710
releaseNoteUpgradeSoftware-1710

Upgrade Software

DescriptionWhere to find itRequirements
Upgrade i2b2 database to 1.7.10 Software page (i2b2 Website)Download i2b2createdb-1710.zip file under Source Code
Upgrade i2b2 Web Client to 1.7.10 Software page (i2b2 Website)Download i2b2webclient-1710.zip file under Source Code  
Upgrade i2b2 Server to 1.7.10 (Source Code) Software page (i2b2 Website)Download i2b2core-src-1710.zip file under Source Code  
Upgrade i2b2 Server to 1.7.10 (JAR files) Upgrade to Release 1.7.10 from 1.7.09c page (Community Wiki)See Technical Details section on the i2b2 Upgrades page and upgrade documentation on Upgrade to latest version page.


Anchor
releaseNoteUpgradeDoc-1710
releaseNoteUpgradeDoc-1710

Upgrade Documentation

DocumentationWhere to find itWebsite
Database changes included in this release (star)Database Changes 
List of core changes included in this release (star)Change Summary - i2b2 Kernel (Core Software) 
List of Web Client changes included in this release (star)Change Summary - i2b2 Web Client 
Details about the new features (star)Details about New Features in Release 1.7.10 
Technical details and notes about upgrading the i2b2 serverUpgrade i2b2 pagei2b2 Community Wiki
Upgrade Instructions (server)Upgrade to latest version page (Instructions section)i2b2 Community Wiki
Core documentation - Technical doc for i2b2 cellsi2b2 Documentation zip file (i2b2core-doc-1710.zip)i2b2 Website/software

(star) These sections are located within this document. All other documents are external pages either on the community wiki or on the i2b2 Website.

Anchor
releaseNoteDbChgs-1710
releaseNoteDbChgs-1710

Database Changes

Release 1.7.10 involves a few changes to the i2b2 Database. Some are simple an addition to the sample data that is included in the demo data that is delivered with the software while others are changes to the database structure to support new features that are included in 1.7.10

Crcdata Tables

QT_BREAKDOWN_PATH

  • Added new breakdowns for the new SQL Query Breakdown feature

QT_QUERY_RESULT_TYPE

  • Added new breakdowns for the new SQL Query Breakdown feature
  • Added new column to support roles based access for the new SQL Breakdowns
    • New column name = QT_ROLE_CD

Pmdata Tables

PM_USER_LOGIN table

  • Remove the primary key
  • Added the PM_USER_LOGIN_IDX index

Anchor
releaseNoteChgSum-1710
releaseNoteChgSum-1710

Change Summary - Release 1.7.10

Did you know?

  • Changes to the i2b2 server & database are listed under i2b2 Kernel (Core) Software
  • Changes to the i2b2 Web Client are listed under i2b2 Web Client Software
  • Additional information about the new features can be found in the Feature Details - Release 1.7.10 section located this Change Summary section.

Anchor
releaseNoteChgSumCore-1710
releaseNoteChgSumCore-1710

i2b2 Kernel (Core Software)

New Features and Improvements

 

Jira
serveri2b2 JIRA
columnskey,summary
maximumIssues1000
jqlQueryproject = CORE AND issuetype in (Improvement, "New Feature", Story, Task, Sub-Task) AND fixVersion = 1.7.10 AND labels = wikirelease
serverId6e4599d0-bdbc-37f8-9067-5f0befc0ec6c

 

Bug Fixes

Jira
serveri2b2 JIRA
columnskey,summary
maximumIssues1000
jqlQueryproject = CORE AND issuetype = Bug AND fixVersion = 1.7.10 AND labels = wikirelease
serverId6e4599d0-bdbc-37f8-9067-5f0befc0ec6c

 

Anchor
releaseNoteChgSumWeb-1710
releaseNoteChgSumWeb-1710

i2b2 Web Client Software

New Features and Improvements

 

Jira
serveri2b2 JIRA
columnskey,summary
maximumIssues1000
jqlQueryproject = WEBCLIENT AND issuetype in (Improvement, "New Feature", Story, Task, Sub-Task) AND fixVersion = 1.7.10 AND labels = wikirelease
serverId6e4599d0-bdbc-37f8-9067-5f0befc0ec6c

 

Bug Fixes

Jira
serveri2b2 JIRA
columnskey,summary
maximumIssues1000
jqlQueryproject = WEBCLIENT AND issuetype = Bug AND fixVersion = 1.7.10 AND labels = wikirelease
serverId6e4599d0-bdbc-37f8-9067-5f0befc0ec6c

 

Anchor
releaseNoteFeatureDetails-1710
releaseNoteFeatureDetails-1710

Feature Details - Release 1.7.10

Release 1.7.10 has many new features and for the purpose of this document we have grouped them into one of the following four categories:

  1. Auditing improvements
  2. Password management improvements
  3. Query improvements
  4. Miscellaneous improvements

Anchor
releaseNoteFeatureDetailsAudit-1710
releaseNoteFeatureDetailsAudit-1710

Auditing improvements

The auditing improvements are part of a larger group of enhancements that are labeled in JIRA as "Security enhancements". There are only two auditing features and both involve keeping an audit trail of information for maintaining security. Right now the audit trail is limited to the i2b2 Admin module and the process of logging into the i2b2 Web Client.

 

UI Text Box
typeinfo

The auditing improvements are strictly server and database security enhancements to capture the information for auditing purposes. The audit information is logged in the PM_USER_LOGIN table for both features. Due to different security requirements on who can access this type of database information we have chosen to not include a way for i2b2 users to view or print the audit information from within the i2b2. This decision may be reviewed again for a future release. For now, if a site wants to obtain the logged information they can query their i2b2 database and retrieve the information directly from the PM_USER_LOGIN table.

 


Anchor
releaseNoteFeatureDetailsAuditLogon-1710
releaseNoteFeatureDetailsAuditLogon-1710

Log number of attempted logins

JIRA Issue: CORE-285

All successful and failed login attempts to sign into the i2b2 Web Client will be logged in the PM_USER_LOGIN table.

Highlights of New Feature

  • No additional setup is needed to turn the enhancement on
  • Even when a user is locked out the system will log when they attempt to access the system
Example Box
Sample data from PM_USER_LOGIN table

  • The first row shows on 4/16/2018 at 11:12 in the morning the demo user tried to sign into the Web Client.
    • The "BADPASSWORD in ATTEMPT_CD column tells me they entered the wrong password and they were not successful logging in.
  • The second row shows one minute later the same user was able to enter their password successfully and log into the Web Client.

 


Anchor
releaseNoteFeatureDetailsAuditAdmin-1710
releaseNoteFeatureDetailsAuditAdmin-1710

Log Admin Functions

JIRA Issue: CORE-286

Functions performed within the Admin module will be logged within the PM_USER_LOGIN table.

 

Example Box
EXAMPLE

For the purpose of this documentation, the basic steps an i2b2 Admin rakes to add a new user outlined below:

Step 1: Signs into the i2b2 Web Client & select the Administrator project

Step 2: Selects Manage Users from the navigation panel

Step 3: Clicks on Add User button

Step 4: Enters information about the user and clicks on Save.

Step 5: Clicks on Manage Users to refresh the list and display the new user in the navigation panel.

 

As each step was performed, the service and USER_ID was logged in the PM_USER_LOGIN table along with the date & time (server side).

 

Anchor
releaseNoteFeatureDetailsPwdMgmt-1710
releaseNoteFeatureDetailsPwdMgmt-1710

Password management improvements

The improvements to managing passwords are the other enhancements that are part of the larger group of "Security enhancements". There are four new features that are designed to help sites improve security of their i2b2 by improving how their user passwords are managed within the i2b2. The site administrators will now have control over requiring users to change passwords, use complex passwords, and lock users out for entering the wrong password too many times. 

4 New Features Include

  1. Account lockout
  2. Mandatory password change
  3. Prevent repeat passwords
  4. Enforce complex passwords

Anchor
releaseNoteFeatureDetailsPwdMgmtLock-1710
releaseNoteFeatureDetailsPwdMgmtLock-1710

Account Lockout

JIRA Issue: CORE-287

Accounts are locked and users are not able to sign into the i2b2 after a specific number of failed login attempts have been made.

Highlights of New Feature

  • 2 new global parameters
    1. PM_LOCKED_MAX_COUNT
    2. PM_LOCKED_MAX_WAIT_TIME
  • Account lockout threshold and wait time is defined by the site Administrator.
  • Users are locked-out when the defined number of failed attempts have been reached.
  • Once locked
    • user receives a lockout message
    • user must wait a preset period of time
  • Successful login resets the number of failed logins

 

New Parameters

Two new Global Parameters were created as part of the new lockout feature. These parameters must be defined in the PM_GLOBAL_PARAMS table for users to be locked out after the defined number of failed attempts and number of minutes they must wait before attempting to try again.

 

Anchor
releaseNoteFeatureDetailsPwdMgmtLockMaxCount-1710
releaseNoteFeatureDetailsPwdMgmtLockMaxCount-1710

PM_LOCKED_MAX_COUNT Parameter
  • Threshold for failed sign-in attempts
  • The value is inclusive. i.e. if you enter 4 then the 4th time the user enters the wrong password they will receive the error message and their account will be locked.

 

 

 

Anchor
releaseNoteFeatureDetailsPwdMgmtLockWaitTime-1710
releaseNoteFeatureDetailsPwdMgmtLockWaitTime-1710

PM_LOCKED_WAIT_TIME Parameter
  • Number of minutes an account is locked before a user can sign in again.

 

 


 

Anchor
releaseNoteFeatureDetailsPwdMgmtPwdChg-1710
releaseNoteFeatureDetailsPwdMgmtPwdChg-1710

Mandatory Password Change

JIRA Issue: CORE-287

Require users to change passwords after a specified interval of time. The i2b2 Administrator controls the number of days allowed before a password must be changed. If a user attempts to sign on after their password has expired, the i2b2 Change Password window will open and the user must change their password before they can sign on. Once the user changes their password, the system will calculate the next expiration date for that user.

Highlights of New Feature

  • Require users to change passwords
  • i2b2 Admins control how often (interval)
  • Change password window will open when password expired
  • 2 new parameters; 1 global & 1 user
  • The system uses the value in the global parameter to calculate the next expiration date and adds the appropriate user parameter to the table.

 

Summary of password expiration process

 

UI Steps
sizesmall
UI Step

New global parameter is set (entered via the i2b2 Admin module).

UI Step

Password expiration feature is turned on.

UI Step

ALL user passwords are now expired.

UI Step

User attempts to sign into the i2b2 Web Client; they are prompted to enter a new password

UI Step

User enters a new password & successfully signs into the i2b2 Web Client.

UI Step

Using the value defined in the global parameter and the date the user has signed on the system calculates the next expiration date for that user.

UI Step

Once the new expiration date has been calculated the system will add a user parameter to the appropriate user with the correct expiration date.

 

 

New Parameters

Two new parameters were created as part of the Mandatory password change feature. Both parameters are called PM_EXPIRED_PASSWORD however one is set within PM_GLOBAL_PARAMS and the other within PM_USER_PARAMS. Each parameter has a different function in the password expiration process and is further defined below.

 

Table: PM_GLOBAL_PARAMS

The new Global Parameter called PM_EXPIRED_PASSWORD must be added to the PM_GLOBAL_PARAMS table to define the password change interval. Once this parameter has been set the mandatory password change feature will be turned on. If this parameter is not added as a global parameter then passwords will never expire.

 

 

 

Highlights of global parameter PM_EXPIRED_PASSWORD
  • Global Parameter PM_EXPIRED_PASSWORD
  • Turns the feature on
  • Defines password change interval
  • Affects ALL users

 

 

Table: PM_USER_PARAMS

The new user parameter, PM_EXPIRED_PASSWORD, is automatically added to the PM_USER_PARAMS table the first time a user successfully changes their expired password. When they change their password, the system will look to the PM_EXPIRED_PASSWORD parameter in the PM_GLOBAL_PARAMS table to see the change interval defined and then calculate the new expiration date to add to the user parameter.

 

 

Highlights of user parameter PM_EXPIRED_PASSWORD
  • User Parameter PM_EXPIRED_PASSWORD
  • Date password will expire for user
  • Added by system when password changed 1st time
  • Can be manually added / edited to a future date for user accounts don't want to expire

 

 

 

UI Text Box
typeinfo

As soon as you add the PM_EXPIRED_PASSWORD to your PM_GLOBAL_PARAMS table, ALL passwords will expire except the i2b2 AGG_SERVICE_ACCOUNT. To prevent service accounts from expiring you need to add the user parameter as soon as the feature is turned on or even before it. Set the expiration date for a date in the distant future. The following steps outline how to do this.

  1. Log into i2b2 Admin Module
  2. Click on Manage Users in the left Navigation tree to expand the list of users
  3. Locate the user who is your service account
  4. Click on their name to expand it
  5. Click on Params
  6. Click on Add New Parameter button located on the right side of the page
  7. Add the PM_EXPIRED_PASSWORD parameter (example shown below).
  8. At Parameter Value enter a date far enough into the future that the password will not expire anytime soon.
  9. Click Save.

 

 


 

Anchor
releaseNoteFeatureDetailsPwdMgmtPwdRpt-1710
releaseNoteFeatureDetailsPwdMgmtPwdRpt-1710

Prevent repeat password

JIRA Issue: CORE-300

Users are no longer allowed to use their current password as their new password when required to change it. 


Highlights of New Feature

  • No additional setup is needed
  • New password can't be same as current password
  • Warning message displayed if user enters same password

 

 


 

Anchor
releaseNoteFeatureDetailsPwdMgmtPwdComplex-1710
releaseNoteFeatureDetailsPwdMgmtPwdComplex-1710

Enforce Complex Passwords

JIRA Issue: CORE-288

Passwords must meet complexity requirements defined by the i2b2 Administrator. The requirements will be enforced when users change their passwords for the Change Password Window. However, when an i2b2 Administrator is setting up a new user in the i2b2 Admin Module the requirements are not required when entering or editing the password in User Management.

Highlights of New Feature

  • New global parameter
  • i2b2 Administrator defines requirements for complexity
  • Requirements are enforced when users change passwords
  • User receives Warning message if new password doesn't meet requirements

 

 

 

New parameter

A new Global Parameter was created to support the Enforce Complex Passwords feature. The new parameter defines the complexity requirements for the passwords and once it has been entered into the PM_GLOBAL_PARAMS table the feature will be turned on for all users. This means all users will be required to follow the new requirements the next time they change their password. Again, the only exception is when the password is set by the i2b2 Administrator from within the i2b2 Admin Module.

 

Global Parameter: PM_COMPLEX_PASSWORD

Table: PM_GLOBAL_PARAMS

 

 

 

Complex Requirement Variables

Setting the parameter value for PM_COMPLEX_PASSWORD

  • Each password requirement is defined as an independent variable.
  • However, the variables are concatenated into a single string and stored in the VALUE column of the PM_GLOBAL_PARAMS table


The table shown below lists each of the variables and the associated requirement that will be enforced.

VariablesRequirement
(?=.*[0-9])Numbers (0-9)
(?=.*[a-z])Lower case letters (a-z)
(?=.*[A-Z])Upper case letters (A-Z)
(?=.*[!@#$%^&+=])Special characters (!@#$%^&+=)
(?=\S+$).{8,}Password is a string and must be 8 characters
UI Text Box
sizemedium
typewarning

The (?=\S+$).{8,} variable is always required when setting the PM_COMPLEX_PASSWORD parameter. The system needs to know that password is a string and the length of password. You do have the option to change the length to be greater or lesser than 8 characters.

 

The requirements can be used in any combination.  For instance, if the passwords must be 8 characters and contain at least 1 lower case letter and 1 number then the parameter value will be:

(?=.*[0-9])(?=.*[a-z])(?=\S+$).{8,}

 

If all the requirements in the table were to be used, the following would be entered as the Parameter Value:

(?=.*[0-9])(?=.*[a-z])(?=.*[A-Z])(?=.*[!@#$%^&+=])(?=\S+$).{8,}

 

 


 

Anchor
releaseNoteFeatureDetailsQryImprov-1710
releaseNoteFeatureDetailsQryImprov-1710

Query improvements

The following two new improvements have been made to queries. 

  1. SQL Query Breakdown
    • Custom breakdowns based on SQL query
    • 4 new breakdowns provided in the demo data as examples
  2. Temporal Query made simple
    • New simple mode available
    • Streamlined

Anchor
releaseNoteFeatureDetailsQryBreakdown-1710
releaseNoteFeatureDetailsQryBreakdown-1710

SQL Query Breakdowns

Standard demographic breakdowns have been available in the i2b2 for a long time. For instance, when running a query you can select breakdowns like Gender patient breakdown or Race patient breakdown.  Users have also been able to add their own custom breakdowns provided they added the breakdowns in all the appropriate places. In release 1.7.10 we are introducing SQL query breakdowns, which are basically your normal query breakdowns except they have a SQL query built within it. The i2b2 demo data that is delivered with 1.7.10 has been updated to include the following four new SQL query breakdowns 

  1. Length of stay breakdown
  2. Top 20 medications breakdown
  3. Top 20 diagnoses breakdown
  4. Inpatient and outpatient breakdown

 

UI Text Box
sizemedium
typeinfo

Now that SQL queries can be run within a breakdown it has become necessary to provide the appropriate level of security to these breakdowns as we would a standard query. Therefore, we have taken the appropriate steps to enable sites to restrict custom breakdowns to a defined role. If the user does not have the appropriate role for the project they are logged into then they will not be able to see the breakdown listed when running a query.

The new SQL breakdowns included in 1.7.10 are restricted to the Limited Data Set (DATA_LDS) role.

 

For the most part setting up a new custom query breakdown will continue to be the same in that you still need to add the breakdown to the following places before you can begin using it.
  1. QT_QUERY_RESULT_TYPE table
  2. QT_BREAKDOWN_PATH table
  3. CRCApplicationContext.xml file

 

** New ** Additional Setup Steps for SQL Breakdown
There are two additional steps that need to be taken if you want to set up a SQL Query breakdown.
  1. Add SQL query into the QT_BREAKDOWN_PATH table
    • SQL statement goes into the VALUE column
  2. Add the correct access level into QT_QUERY_RESULT_TYPE table
    • The role goes into USER_ROLE_CD column

 

Sample Data: Snapshot of the Length of stay breakdown included in demo data

Define SQL in the QT_BREAKDOWN_PATH table

 

 

Code Block
languagesql
SELECT length_of_stay            AS patient_range,
   COUNT(DISTINCT a.PATIENT_num) AS patient_count
FROM visit_dimension a,
   DX b 
WHERE a.patient_num = b.patient_num
GROUP BY a.length_of_stay 
ORDER BY 1

 

Define the appropriate access level in QT_QUERY_RESULT_TYPE table

 

 

Running a Query and Viewing Results
  • Provided you have the correct access when you click on the Run button in the Query Tool, the Run Query window will display.
  • The list of Result Types, including the SQL breakdowns will display.

 

  • Check off the different breakdowns the results on the Graph Results tab will display as follows:


 

  • Click on the Query Report tab to view and print the results of your query.

 


 

Anchor
releaseNoteFeatureDetailsQrySimpleTempQry-1710
releaseNoteFeatureDetailsQrySimpleTempQry-1710

Temporal Query made Simple

Running a temporal query in earlier versions of the i2b2 could be cumbersome and difficult to use. The way the screens were laid out would make it hard to remember population constraints, it was complicated, difficult to learn and hard to comprehend temporality.

In 1.7.10 temporal queries have been made simple by developing a Simple Temporal Query mode. This new mode has streamlined features; displays ordering of events and population constraint on same page.

 

Simple vs Advanced Mode

Simple mode does not support the following features

  • Non-linear temporal sequences
  • Multiple Panels
  • Number Restrictions

 

Highlights of New Simple Temporal Query mode

Query Timing list has been updated
  • Non-Temporal Query: Treat all groups independently
  • Non-Temporal Query: Selected groups occur in the same financial encounter
  • Temporal Query: Define sequence of Events

 

 

Tutorial Available
  • As soon as you select Temporal Query: Define sequence of Events the simple temporal query mode will display.
  • At this point you can either start the Tutorial or begin your query by dragging over an observation.



All events are on the same page page
  • Add Hypertension into Observation A and Acute Myocardial Infarction into Observation B.

 

 

Relationship Editor
  • Can edit the relationships without leaving the page.
  • Simply click on the text in between the two observations
  • The Temporal Relationship window will open with the observations visible behind it

 

 

Easily Change Order of Observations
  • Swapping position of Observations by dragging the panel

 

 

Adding population constraints (optional)
  • Can add population constraints without leaving the page.
  • Simply click on Show Constraining Population located at the bottom of the view
  • The standard 3 panel query view will open on the bottom half where you can add your patient sets.

                 

 

 

Switching to advanced mode
  • Click on Switch to Advanced Temporal Query to change your mode and query into the old temporal query.

 

 

Preserving query between switches
  • Queries will be preserved when switching between simple and advanced. The only exception is when a query doesn't meet the simple criteria (i.e. multiple panels, non-linear temporal sequences, number restrictions)

 

Anchor
releaseNoteFeatureDetailsMisc-1710
releaseNoteFeatureDetailsMisc-1710

Miscellaneous improvements

Anchor
releaseNoteFeatureDetailsMiscSignon-1710
releaseNoteFeatureDetailsMiscSignon-1710

Single sign-on location for Web Client and Admin Module

JIRA Issue: WEBCLIENT-226

 

The i2b2 Admin module no longer needs to be setup on the i2b2 server and results in the following benefits.

  • i2b2 Administrators will log in from the same location as the i2b2 Web Client.
  • Easier installation and maintenance. Will only install the i2b2 Web Client.

To sign into the i2b2 Admin module, Administrators will go to the same location as their i2b2 Web Client and enter their login credentials.  Provided their user is setup as an Admin they will be able to select "Administrator" from the list of projects in the project dialog. The Administrator project will launch the Admin module.

 

 


Anchor
releaseNoteFeatureDetailsMiscDataSrc-1710
releaseNoteFeatureDetailsMiscDataSrc-1710

Improve datasource validations

JIRA Issue: CORE-129

On certain occasions a database connection in a pool would go bad and the i2b2 would continue to use the connection which would cause errors in the i2b2. To resolve this problem database connections will now be validated and checked that the connection is valid. If a connection in the pool goes bad the i2b2 will not continue using it.

 

Code Block
languagesql
titleMSSQL Example
collapsetrue
<validation> 
     <validate-on-match>true</validate-on-match> 
     <check-valid-connection-sql>SELECT 1 FROM DUAL</check-valid-connection-sql> 
     <use-fast-fail>true</use-fast-fail> 
 </validation> 

 



Include Page
1.7.09c Release Notes
1.7.09c Release Notes