← Back to Docs

Healthcare Authentication

Guides

Healthcare Authentication

Priiism provides authentication patterns designed for healthcare organizations that need HIPAA-compliant access controls. This guide covers three scenarios: patient-facing apps, physician/staff apps, and the B2B2C model where hospital IT teams build clinical applications on Priiism.

Pattern 1: Patient-Facing App

Patient portals and consumer health apps need a balance of security and ease of use. Patients are non-technical users who expect a familiar login experience.

SettingValueReason
Auth methodEmail/passwordUniversal, no corporate IdP dependency
Social loginGoogle (optional)Convenience for patients; reduces password fatigue
MFA policyRequiredHIPAA requires reasonable safeguards for PHI access
MFA methodEmail OTP or TOTPEmail OTP is easier for patients; TOTP is more secure
Session lifetime72 hoursBalances security with convenience
Idle timeout4-8 hoursProtects PHI on shared/forgotten devices

Setup Steps

  1. Set up authentication on your project
  2. Enable email/password (default) and optionally Google social login
  3. Set MFA policy to Required
  4. Enable Email OTP as the MFA method (most accessible for patients)
  5. Set session lifetime to 72 hours
  6. Set idle timeout to 4 hours (adjust based on your risk assessment)

Patient Identity Considerations

  • Email verification: Auth0 sends a verification email on signup. Consider requiring email verification before granting access to PHI.
  • Password reset: Patients frequently forget passwords. Ensure the password reset flow is clearly accessible on the login page.
  • Account lockout: Auth0 locks accounts after 10 failed login attempts by default. This protects against brute force attacks.
  • Audit trail: All authentication events (login, logout, password changes, MFA enrollment) are logged by Auth0 and available in the Priiism identity dashboard.

Pattern 2: Physician/Staff App

Clinical applications used by physicians, nurses, and administrative staff should use enterprise SSO through the hospital’s existing identity provider. Staff members already have credentials — don’t make them create another account.

SettingValueReason
Auth methodEnterprise SSO (SAML/OIDC)Staff use their hospital credentials
Identity providerHospital AD / OktaFederation with existing IdP
MFA policyRequiredHIPAA compliance for PHI access
MFA methodTOTP (authenticator app)More secure than SMS; hospitals often already issue authenticator apps
Session lifetime24 hoursOne shift + buffer
Idle timeout1-2 hoursClinical workstations are often shared

Setup Steps

  1. Have the hospital IT admin set up enterprise SSO for the organization

  2. Connect the hospital’s Active Directory or Okta instance via SAML 2.0

  3. Configure role mappings from hospital AD groups to Priiism org roles:

    Hospital AD GroupPriiism RoleApp Permissions
    PhysiciansAdminFull read/write to patient records
    NursesMemberRead/write within assigned departments
    Admin-StaffMemberRead access, scheduling, billing
    IT-AdminsOwnerSystem configuration, user management
    Medical-StudentsViewerRead-only access for training
  4. Set MFA to Required with TOTP as the method

  5. Set idle timeout to 1 hour for workstations accessing PHI

Staff Identity Considerations

  • Shared workstations: Clinical environments often have shared computers. Short idle timeouts and mandatory re-authentication protect against unauthorized access.
  • Break-the-glass access: For emergency scenarios, consider a secondary admin account that can bypass normal access restrictions. Document and audit all emergency access.
  • Role-based access control: Map hospital departments and roles to Priiism roles. Use the most restrictive access that still allows staff to do their job.
  • Offboarding: When staff leave the hospital, disabling their AD account automatically revokes Priiism access (SSO federation handles this).

Pattern 3: B2B2C (Hospital IT Builds on Priiism)

The most powerful healthcare pattern: a hospital IT team uses Priiism as their development platform, building clinical applications that serve both staff and patients.

How It Works

Hospital IT Team (Org Admin)
    |
    +-- Connects hospital AD/Okta (Enterprise SSO)
    |
    +-- Approves project templates for clinical use
    |
    +-- Clinical developers build apps from templates
         |
         +-- Staff-facing apps -> Hospital SSO
         |
         +-- Patient-facing apps -> Consumer identity pool

Step-by-Step Setup

1. Hospital IT Gets a Priiism Organization

The hospital IT department creates a Priiism organization on an Enterprise plan. This org serves as the central management point for all clinical applications.

2. IT Admin Connects Enterprise SSO

Follow the Enterprise SSO guide to connect the hospital’s Active Directory or Okta. This allows IT staff and clinical developers to log into Priiism with their hospital credentials.

3. IT Admin Approves Project Templates

The IT admin reviews and approves project templates that meet clinical requirements:

  • HIPAA-compliant data handling
  • Required auth configuration (MFA, session timeouts)
  • Approved component libraries
  • Audit logging enabled

Templates ensure every clinical app starts from a secure, compliant baseline.

4. Clinical Developers Build Apps

Clinical developers (citizen devs, clinical informaticists, or IT staff) create projects from approved templates. They use the Priiism AI agent to describe what they need:

“Build a patient intake form that collects demographics, insurance info, and medical history. Store data in the project database with encryption.”

The AI agent generates the app from the approved template, inheriting all security and compliance settings.

5. Separate Auth Pools

Each app gets the right auth configuration for its audience:

  • Staff-facing apps use the hospital’s enterprise SSO. Physicians and nurses log in with their hospital credentials.
  • Patient-facing apps use a separate consumer identity pool. Patients create their own accounts with email/password + MFA.

This separation ensures:

  • Patient credentials are never stored in the hospital’s AD
  • Staff access is centrally managed by hospital IT
  • Each app has appropriate session and MFA policies for its user type

6. Inherited Security

All apps built on Priiism inherit platform-level security:

  • Encryption at rest: All data in project databases is encrypted. Sensitive fields (env vars, signing credentials) use AES-256-GCM.
  • Encryption in transit: All traffic uses HTTPS with TLS 1.3.
  • Audit trail: Authentication events, data access, and code changes are logged.
  • Sandboxed execution: Each project runs in an isolated container. No cross-project data access.
  • Secret management: API keys and credentials are encrypted and never exposed in code or logs.

HIPAA Compliance Checklist

Use this checklist when setting up authentication for healthcare applications:

  • MFA is set to Required for all users who access PHI
  • Session idle timeout is 4 hours or less for patient apps
  • Session idle timeout is 1-2 hours for clinical workstation apps
  • Password policy enforces minimum 8 characters with complexity requirements
  • Account lockout is enabled (Auth0 default: 10 failed attempts)
  • Email verification is required before PHI access
  • Staff access uses enterprise SSO (no shared or local passwords)
  • Role mappings restrict PHI access to authorized roles only
  • Audit logging is enabled for all authentication events
  • Offboarding process is documented (AD account disable = Priiism access revoke)

Next Steps