T-029-002 — Functional & Interface Commissioning Template
1. Document Control
- Document ID: T-029-002
- Title: Functional & Interface Commissioning
- Device: Legit.Health Plus
- Document Type: Commissioning Template
- Lifecycle Phase: Release / Commissioning
- Standard(s): ISO 62304, ISO 82304-1
Regulatory purpose: This document defines the controlled commissioning activities required to confirm that the deployed software instance exposes the intended API interfaces correctly, enforces required access controls, and integrates correctly with internal services and external interfaces necessary for intended use.
2. Scope
This template applies to the commissioning of the production-deployed Legit.Health Plus API-based SaMD, including:
- API availability, routing, and versioning
- Authentication and authorization enforcement
- End-to-end request/response behavior at the API boundary
- Internal service-to-service connectivity required to produce outputs
- Audit logging behavior required for traceability
This template does not cover:
- Algorithm performance validation (clinical performance)
- Model quality metrics (e.g., sensitivity/specificity)
- Load/performance qualification beyond commissioning sanity checks
- Security penetration testing (handled in dedicated security activities)
3. Normative Basis
This commissioning activity is required to satisfy the following normative intents:
- ISO 62304 §5.7: Verification of integrated software system behavior in the target environment
- ISO 62304 §5.8: Release readiness confirmation includes correct operation of integrated system
- ISO 82304-1 §5.6: Interface and dependency behavior verified in the context of use
- ISO 82304-1 §7.2: Confirm correct operation of the health software product in its operational environment
4. Inputs and Preconditions
The following shall be available prior to execution:
- Completed R-TF-029-001 for the same release (deployment & configuration commissioning)
- Approved release identifier and deployed API base URL(s)
- Access to production monitoring/logging relevant to commissioning evidence
- Commissioning test credentials (non-patient) with least privilege
- Representative commissioning test images (non-identifiable or synthetic) and metadata payloads
5. Device and Release Identification
Objective: Ensure traceability between commissioning results and the released/deployed baseline.
| Item | Value |
|---|---|
| Device name | |
| Software version | |
| Internal release identifier | |
| Commissioning execution date | |
| Production base URL | |
| API version(s) commissioned |
6. Commissioning Test Controls
6.1 Data Controls
Objective: Ensure commissioning does not process identifiable patient data.
- Test images and payloads shall be non-identifiable and authorized for commissioning use.
| Data set / artifact | Description | Source | Approved for commissioning (Y/N) |
|---|---|---|---|
6.2 Credentials and Access Controls
Objective: Ensure commissioning accounts are controlled and traceable.
| Credential / principal | Intended scope | Control mechanism (e.g., IAM/JWT) | Notes |
|---|---|---|---|
7. API Availability and Routing
Objective: Confirm the API is reachable over HTTPS, routes requests correctly, and exposes correct device information.
| Check ID | Endpoint / Interface | Method | Expected result | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|---|
| A1 | /device/health | GET | 200 OK, reports healthy | |||
| A2 | /device/about | GET | Returns device + version metadata consistent with release | |||
| A3 | Base URL + TLS | N/A | TLS enforced, no plain HTTP |
8. Authentication and Authorization Enforcement
Objective: Confirm that protected clinical endpoints require valid authorization and reject invalid/expired credentials.
| Check ID | Endpoint / Interface | Method | Scenario | Expected result | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|---|---|
| AUTH1 | /auth/login | POST | Valid commissioning credentials | JWT issued | |||
| AUTH2 | /clinical/* | POST | No token | 401/403 as specified | |||
| AUTH3 | /clinical/* | POST | Invalid/expired token | 401/403 as specified | |||
| AUTH4 | /clinical/* | POST | Valid token | Request accepted |
9. Input Validation and Error Handling
Objective: Confirm that malformed inputs are handled predictably, safely, and traceably.
| Check ID | Interface | Scenario | Expected result | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|---|
| VAL1 | /clinical/* | Missing required fields | 4xx with clear error structure | |||
| VAL2 | /clinical/* | Unsupported content type | 4xx returned | |||
| VAL3 | /clinical/* | Corrupted/invalid image payload | 4xx returned; no server error |
10. Internal Service Integration Sanity Checks
Objective: Confirm that API requests traverse required internal dependencies to produce outputs.
| Check ID | Workflow / Dependency | Scenario | Expected result | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|---|
| INT1 | API → Control Plane | Standard request | Routed successfully; no orchestration errors | |||
| INT2 | Control Plane → Expert services | Standard request | Required expert calls succeed | |||
| INT3 | Expert results → Report Builder | Standard request | Report builder produces canonical report | |||
| INT4 | Report → API response | Standard request | Response conforms to expected schema |
Note: Detailed clinical workflow commissioning is performed in T-029-003. The checks above confirm integration readiness only.
11. Audit Logging Verification
Objective: Confirm that API interactions produce audit records consistent with device traceability requirements.
| Check ID | Scenario | Expected result | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|
| AUD1 | Successful clinical request | Audit entry created | |||
| AUD2 | Rejected request (auth failure) | Audit entry created (as specified) |
12. Failure Mode Sanity Checks
Objective: Confirm safe behavior for common operational failures without requiring full resilience qualification.
| Check ID | Failure stimulus | Expected system behavior | Actual result | Pass/Fail | Evidence reference |
|---|---|---|---|---|---|
| FM1 | Downstream timeout / dependency delay | Predictable error response; no undefined behavior | |||
| FM2 | Partial expert failure (if testable) | Controlled degradation or error per requirements |
13. Evidence Register
Objective: Identify where commissioning evidence is stored in a controlled manner.
| Evidence item | Type | Location / reference | Notes |
|---|---|---|---|
| API call logs / request IDs | Log | ||
| Monitoring snapshot (health) | Snapshot | ||
| Audit log proof (record IDs) | Log / DB reference | ||
| Commissioning test artifacts | File |
14. Deviations
Objective: Record any observed deviations, assess impact, and document resolution.
| Deviation ID | Description | Impact assessment | Resolution / corrective action | Status (Open/Resolved) | Evidence reference |
|---|
☐ No deviations encountered
15. Functional Commissioning Acceptance
Objective: Formally confirm that functional and interface commissioning requirements have been met.
Acceptance statement:
The deployed software instance has been commissioned and confirmed to expose the intended API interfaces, enforce required access controls, and integrate correctly with internal services necessary to support intended operation in the production environment.
| Role | Name | Date | Signature |
|---|---|---|---|
| Responsible engineer | |||
| Quality / Regulatory |
16. Output
The completed commissioning record generated from this template shall be stored as R-TF-029-002 and maintained as part of the release evidence set for the commissioned software version.