Submit a new x12-270 eligibility request

Overview

Provided a valid request, this endpoint accepts a raw EDI X12 270 payload and dispatches a new real-time transaction request to our internal engine.
The response uses the same normalized JSON model returned by the JSON real-time endpoint. Both real-time endpoints return JSON, and that JSON includes the raw x12-271 response string so clients can extract the payer's original EDI response if needed.
Real-time response time is driven primarily by payer and clearinghouse latency. The downstream clearinghouse timeout is 2 minutes to accommodate slower payer connectivity and heavy-volume periods.
If your organization is enrolled in deduplication, that feature is evaluated before clearinghouse submission. Deduplication is customer-configurable, including the lookback window and whether prior-month requests are excluded. When a duplicate is found, the clearinghouse is skipped and the transaction sourceType is duplicate.

Coverage Discovery Integration

If you are enrolled in Coverage Discovery at the time of the request and your configured discovery conditions are met, the Coverage Discovery workflow will be started automatically. Common examples include real-time responses with status.value of ineligible or patient_unknown, or response-side HMO plan information parsed from the returned x12-271. In this scenario, the response link header contains one or more related Coverage Discovery task resource paths, e.g.:
</coverage-discovery/0716e3e8-87ee-11ee-b9d1-0242ac120002>; title="coverage discovery - Task 1"; rel="related", </coverage-discovery/0e565a58-87ee-11ee-b9d1-0242ac120002>; title="coverage discovery - Task 2"; rel="related"
Parse this header as RFC 8288-style link values. When more than one discovery task is created, multiple related links may be returned in the same header.
When discovery is triggered from this X12 real-time endpoint, the submitted x12-270 is canonicalized internally into the canonicalEligibilityRequest used by Coverage Discovery. If response-side facts are needed, the normalized JSON response and its embedded x12-271 become the source model for canonicalEligibilityResponse.
Each related resource can be retrieved through the /coverage-discovery/{id} endpoint.
If conditions are not met, the link response header will not contain any related /coverage-discovery references.

Callback Solution With Consolidated Real-Time Eligibility and Coverage Discovery Responses

If you are enrolled in our callback solution and wish to consolidate the Real-Time Eligibility (RTE) response with the Coverage Discovery response, you may opt into this capability.
When enabled, the abbreviated eligibility transaction will be included in the corresponding Coverage Discovery record.

⚠️ Note: This integrated response is only available via callback and only if your organization is enrolled in this capability.

Refer to the /coverage-discovery/{id} response examples for data model references.

Body Params

New real-time eligibility transaction request using raw X12.

string
Headers
string

(Optional) A unique identifier value that is attached to the response that allow reference to the original request. Differs from x-optum-trace-id as the correlation-id is stored within the datastore for future queryability.

string

(Optional) Identifies a customer-specific configuration (sub-tenant) assigned by the Enhanced Eligibility team. This value will be provided by the Enhanced Eligibility team for you to include as a request header when a customer-specific configuration has been identified and is required for specific customers. Clients must not generate or infer this value.

x-optum-eligibility-disable-value-add
array of strings

(Optional) A comma-delimited list of strings that disable value-added features on a request-by-request basis. deduplication disables the customer-configured request deduplication feature for that request only. If you specify a value-added feature that you are not enrolled in, it will be ignored.

x-optum-eligibility-disable-value-add
Responses

Language
Credentials
OAuth2
URL
Response
Click Try It! to start a request and see the response here! Or choose an example:
application/json