HIMSA SSO Features and Benefits - HIMSA Member Company Introduction
Audience
This introduction has been created for HIMSA Member Companies and Employees. Some content is useful for Hearing Care Businesses (HCB) and Hearing Care Professionals (HCP), but different publications will later be prepared for these groups.
The content is prepared assuming it will be read by product/project managers, software developers, or IT specialists.
Introduction
With Noah ES, HIMSA has implemented a service that uses IT industry standards and best practices to ensure that the Hearing Care Professional (HCP) is, for example, Brian Jones, who uses the email address bjones@email.com. Once authenticated, Brian can make use of the Noah ES features. At this point, Brian's HIMSA Identity is available for other approved applications to make use of.
HIMSA SSO and Noah ES accounts were designed to be used by HCBs so that all applicable employees could be managed under one account for the HCB.
Q: Is the business that Brian works for required to subscribe to and use Noah ES to use HIMSA SSO?
A: No. HIMSA has created a new product called HIMSA SSO (Single Sign-on), which is free for Hearing Care Businesses (HCB). Current Noah ES customers already have a HIMSA SSO-based identity.
Identity
The main identity of a HIMSA SSO user is their email address.
Behind the scenes the true identity is comprised of:
A globally unique ID assigned to the user
A globally unique ID assigned to the HIMSA SSO or Noah ES account
This enables users to:
Work for more than one HCB and still be separately identified
Change their email address without destroying their connection to established HIMSA SSO compatible services
Q: A common question that HIMSA receives from HIMSA member companies is - “Is HIMSA verifying that bjones@email.com is really Brian Jones, a licensed HCP located in the United States?”
A: No, HIMSA SSO is not able to promise this. HIMSA SSO can claim that bjones@email.com is part of a business set up in Noah ES or HIMSA SSO AND has control of the email address bjones@email.com. HIMSA SSO sends a special and limited-use link to the registered email for the user to complete their user account setup.
This topic is continued in the Authorization section.
Who Benefits?
HCBs and HCPs
HCPs stand to gain the most from HIMSA SSO. With this system, they will only need to use one user account (email address), password, and possibly another MFA device when accessing other industry websites and services.
Q: Why not focus on asking HCPs to use other solutions such as Google, Apple, and Microsoft account integration that are often on many websites today?
A: HIMSA SSO is designed to be a business account. This means that it is possible for the business administrator to centrally manage the users that are associated with their business. For example, if Brian Jones resigns from HCB A, it is only necessary for the HCB to deactivate his HIMSA SSO user account. Brian Jones will also not be able to gain access to any member applications with the HIMSA SSO account + email address combination, as authentication will no longer be possible.
HIMSA Member Companies
It is fair to say that supporting HIMSA SSO will create more work for HIMSA member companies. The main focus is to remove pain points (e.g., HCPs do not need to remember user names and passwords for each web service they use. Additionally, centralizing user management for HCBs will be appreciated.)
It is envisioned that removing this pain point will make it easier for member companies to promote their web applications.
Q: Does HIMSA assume that HIMSA SSO will replace current or newly implemented identity and authentication systems a HIMSA member company implemented for their own applications (e.g., often referred to as “local accounts”).
A: No. Additionally, looking at similar systems in other industries, it is normal for the application to provide a “local account” as well.
HIMSA
HIMSA hopes to use HIMSA SSO to draw attention and grow the adoption rate of Noah ES while helping promote the use of cloud-based applications.
Authentication
Authentication of bjones@email.com is currently accomplished via Brian entering his HIMSA SSO password. Once the password is entered correctly, the user is considered authenticated.
HIMSA SSO also provides additional authentication options
Brian’s user account can be set up to require MFA codes texted to a registered phone number
Brian’s company may also subscribe to advanced identity systems (e.g., Azure AD) and still use HIMSA SSO; see the “Advanced Systems” section below
Note: HIMSA makes uses of Microsoft B2C authentication services to support authentication via password and MFA.
Authorization
Authorization is solely provided by the application provided by the HIMSA member company. Noah ES has no features that attempt to standardize authorization.
Authorizing an HCB and/or HCP can be accomplished by:
Use the HIMSA SSO API to determine if the account is a Noah ES or HIMSA SSO account
Use the API to determine if the current interactive user is set up as a Business Decision Maker, Administrator or regular user.
More likely, It is assumed that the member company application will challenge the interactive user with information that correct user would know about the company creating the application. For example, the member application can ask for account number and other identifiable information. If accurate, then the use of the HIMSA SSO user accounts for that business can be used.
The member application will also be responsible for deciding what types of features that different users may be able to use.
These two above steps could also be considered as a way to add further strength of the identity of the HCP and HCB
Easy Identification
During the day, Brian may need to use a website application provided by manufacturer A. Manufacturer A is a HIMSA member company and is a trusted integrator with the HIMSA SSO. In this example, Brian is wishing to make use of an order system.
When Brian arrives at the website, he can access protected functionality without using different credentials.
Q: Does this mean that the member companies ' websites automatically use Brian’s credentials?
A: No, Brian will most likely need to enter his HIMSA SSO credentials. This is also impacted by how recently Brain has used the member's website and how long the website has been configured to allow Brian to use it without having to be authenticated again.
Seamless Movement Between Different Systems and Companies
Brian's company also works with Manufacturer B which provides a web-based system for remote fitting/care. Even though the systems are completely separate, Brian does not need a different user account but can rather use his HIMSA SSO Identity to gain access to the remote care functionality.
Q: Since Brian can log into systems provided by manufacturers A and B does this mean that, for example, manufacturer A can gather some data or insight into the activity related to manufacturer B?
A: No, this is not possible.
Directory Features
HIMSA SSO provides for the storage of basic information about the business, such as location name, address, and other contact information.
User types, such as Business Decision Makers (i.e., can sign agreements with HIMSA) and Administrators, are also defined.
Manufacturers Benefit
Location and User Information is available to manufacturer applications to assist in onboarding a business as easily as possible. Manufacturers will also be able to determine when HIMSA SSO accounts have been disabled, signaling that the individual is most likely no longer employed. The manufacturer may take any action within their applications if they wish.
Advanced Systems
Hospitals, large chains/groups, businesses with special security needs, or advanced setups (e.g., use of a physical PIV card) have already had most of their software systems set up to use products such as Microsoft Active Directory or Azure Active Directory.
These businesses really dislike using separate identity systems as each separate system represents a level of complexity for the administration of their business. These businesses will most likely not accept to abandon their chosen solution for HIMSA products as well as other online-based systems.
To accommodate this situation, HIMSA SSO is implemented and ready to integrate with other approved systems so that HIMSA can still deliver a high-quality identity for uses with Noah ES and associated applications.
Manufacturers Benefit
HIMSA SSO supports this type of integration, so manufacturers do not need to worry about it. As far as the manufacturer is concerned, it is just working with the HIMSA SSO Identity Service. For example, if Brian's company has decided to use Azure Active Directory, this change will have no impact on manufacturer-created applications.
Future Proofing
Identity and authentication for software applications is a fast-changing field that will likely change quickly during the next few years. For example, the next large change is assumed to come with moving away from using passwords and replacing them with authentication Apps and easy-to-use hardware devices. Microsoft and other companies are working very hard on addressing this topic. Rather than forcing users to deal with the ever-increasing number of password changes and complexity, other methods are sure to become the standard in the future.
Manufacturers and HIMSA's Benefit
As this field changes, HIMSA SSO will be able to make adjustments to the Identity Management Systems to make use of new standards without causing a direct impact on the development of Noah ES or applications that integrate with Noah ES or the Identity Services.
In other words, HIMSA can perform the work once, and all companies may then enjoy the benefit of this work.