Ignacio Valdes Implementation Log: Difference between revisions

From VistApedia
Jump to navigationJump to search
No edit summary
 
No edit summary
Line 2: Line 2:


==Episode 2== [[Episode2|Multiple Sign-ons]]
==Episode 2== [[Episode2|Multiple Sign-ons]]
Ignacio Valdes 
Date: Mon, 14 Jul 2008 13:56:40 -0500
Subject: The Intracare Implementation Log Episode 2: How does one handle Active Directory ID's?
Greetings,
So we already have people with Active Directory ID's. How does one
generally manage Active Directory ID's and VistA ID's?
-- IV
I, Valdes 
I will answer for myself: There is no direct equivalent of Active
Directory Id's in VistA. While this may seem like a handicap, it is
also an advantage in that the system is independent of Active
Directory which makes it both more secure and easier in some ways to
roam to other workstations. -- IV
fred trotter 
Generally, if you want to integrate with Active Directory you should
use LDAP. This is how unix does it.
http://en.wikipedia.org/wiki/Active_Directory#Integrating_Unix_into_A...
It seems to me that you should be able to use LDAP for the VistA
authentication instead of the internal VistA user system. This is how
ClearHealth works.
Does VistA integrate with LDAP?
-FT
kdtop
I don't understand your question.  Are you wanting to have a single
sign-in situation?  Where the network access guarantees VistA
access??  I thought that Active Directory stuff had to do with access
to network drives, whereas VistA access has to do with access to an
EMR.
Aren't these separate issues?
Kevin
Steven McPhelan 
I disagree with the concept of single sign-on for the medical environment at
this time.  At such time that all people in the world are honorable and
adhering to good and safe and secure computing habits, then perhaps single
sign-on will be feasible (think of the walk-away problem).  I do believe
that LDAP can still be used.  Instead of just using a specific technology
like LDAP, I prefer the term network authentication.  VistA should still
challenge the user for sign-on credentials even though the network sign-on
has already occurred.  Where and how they authenticate those sign-on
credentials is another matter that technology can address.
--
Steve
It's so much easier to suggest solutions when you don't know too much about
the problem." -- Malcolm Forbes
r...
I find that I am in agreement with Stephen.  While the Wow and convenience
factors are high, the potential for abuse is even higher.
fred trotter 
With all due respect, we are not asking if you think it is a good
idea. We are asking if it is possible. Is it possible to use LDAP for
authentication from within VistA?
To be clear, we are not asking if we can set it up so that LDAP
authentication of an operating system/network session can be extended
to have "loginless" access to VistA by passing along credentials; we
are asking if the VistA system can be configured to check LDAP rather
than its own user database when it receives the username and password
as it normally does.
As to whether it is a good idea: Having a single username and password
has nothing to do with the "walk-away problem" that is a problem in
any case. The issue is whether users have to remember two passwords or
not. If they must remember two passwords, then they will start writing
them down. That is a serious breach. Further, having two places to
administer user accounts is an administration problem. It doubles all
of the administration work and creates a serious risk that when an
employee leaves the clinic/hospital and the administrators only
remember to remove one of the two user accounts but not the other.
I make these points not in the hopes that I would convince you that
single sign-on is a good idea, but to point out that it is a debate,
and we are not foolish for wanting to have it.
For the time being, however, we would be happy to know if it were
possible at all.
--
Fred Trotter
rga...@tampabay.rr.com 
X.500 is not implemented in VistA, nor do I think it is possible without OS intervention.
Steven McPhelan 
Of course network authentication is possible with the proper modifications
to VistA and the proper network authorization.  When has there ever been a
technical problem such as this where someone could not figure out a
solution.  Heck who would have thought that CAV could have developed a
program that would convert the M based VistA system to a Java based SQL
compliant system (non-M)?
In my response, I am using the most common definition of single sign-on
which is a user signs in ONCE and then all single signon compliant
applications automatically let the user into the application which they
launch provided that the centralized roles and privileges authorizes that
user to run that application.  That is what I do not agree with.  For an
EMR, I want the user to "reauthenicate" for that application before letting
that user into that application.
The common definition for single sign-on was around before VistA pursued
single sign-on.  That is why I prefer the term network authentication versus
single sign-on so that the hearer does not get any false assumptions about
what features would and would not be available.
--
Steve
It's so much easier to suggest solutions when you don't know too much about
the problem." -- Malcolm Forbes
fred trotter 
You are right... there do seem to be two ways to talk, and think about
this. I will try to be clearer...
--
Fred Trotter
kdtop
Steven,
As a physician, I hate multiple sign-ons.  I have never had a chance
to debate this issue with anyone, so I'd like to give you an
opportunity to convince me.
In our hospital, I have to sign in to the network, then sign into the
client that communicates with the computers.  And to sign my charts, I
have to enter my password another 1-2 times.  And each of these
passwords expires on a different schedule.  So it is a never ending
round of confusion.  And I see this as a substantial barrier to
acceptance and use.
When I see the computers up on the hospital ward, I see nurses called
away from their computers all the time.  So the solution they have is
to make windows drop to a locked screen after inactivity for about 1-2
minutes.  Then only that user or an administrator can unlock the
machine.  This seems to solve the walk-away problem.
So once you can be sure that random people don't walk up and start
using the computer, then why is it important to have to sign in
twice?  When entering a building, we usually have one locked door.
Not 2-3 locked doors in succession.  Why doesn't this security model
work for the computer?
Kevin
Greg Woodhouse 
Good for you Kevin. This is a prime example of an area where debates over
usability and functionality are easily clouded by implementation concerns.
We should start out with the customer (in this case, the healthcare
provider) and the functionality that they want or need. In the case of
single-signon, it is possible that AFTER analysis, you may conclude that it
cannot be made secure (I am not convinced). But to dismiss it a priori is
like well, dismissing MUMPS (or maybe Scheme or ML!) as an implementation
language because we simply assume is not going to be a feasible choice.
I realize that this is a sensitive subject, so let me ask the developers and
analysts out there a couple of quick questions: Are you thoroughly
considering the requirements here and performing a full analysis, or are you
following accepted convention? Are you willing to try to be innovative? Have
you performed an analysis of physician workflow? We'd never think about
building a factory automation system without first trying to understand the
processes we are trying to automate, both through consulting with SMEs and
observing the process ourselves. To the physicans and other healthcare
professionals out there: Do the people you are working with understand your
work environment? Have you considered arranging a site visit? If this is not
possible (e.g., due to privacy concerns), what about a simulated environment
similar to (but expanding upon) VeHU's  virtual hospital? Developers cannot
build systems that meet your needs unless they first understand them.
Steven McPhelan 
Kevin, those are valid questions.  There is a difference between a small (or
single) doctor's office and a large multi-physician practice or a hospital.
For instance, what should be the behavior of a common terminal at a nurse's
station where there may be 5,10,20 people who use that terminal in a one
hour period.  The item mentioned here was why could not LDAP authentication
be used.  If network authentication is being used then the problem of
different passwords expiring at different times is not an issue.  Network
authenticating applications would all validate against a single network
source.  Since it is a single source, then the timing of the change of
password would be localized and controlled by that single system.
*There is not one solution that adequately covers every situation*.  Take
that hospital nursing station, is it desirable to require each user to log
off the network on that terminal when they are done thus requiring the next
user to log onto the network?  Think about how long it takes today from
username logon to a usable desktop.  This is probably not the place to go
into this topic.
Until the technology is there for these common workstations to allow an
individuals to logon to their own partition in a matter of seconds, the way
to attempt to implement single signon will continue to be burdensome.  For
example, it may be the hospital policy that these common workstations have a
limited set of applications available to them so that individuals do not
have to log in and out of the network.  If this was the case, then it might
be prudent to require those individual applications to "reauthenicate
sign-on".  In other words, the app prompts for username and password and
authenticates against the network independent of the username that was used
to "Boot" the workstation to a desktop.
Remember the common understanding of single sign-on.  Whoever is at that
terminal has all the credentials and privileges of whomever signed onto the
network.  Obviously using locking screen savers in a private physicians
office may work but it would not work at the nurse's station.
--
Steve
It's so much easier to suggest solutions when you don't know too much about
the problem." -- Malcolm Forbes
rga...
The user signs on to the computer (enter the first door), the user then is
going to document personal health information (enter the second door), the
user then is going to send a  secure communication requiring the inclusion of
PPI (enter the third door).  All doors can have the same codes, like a card
swiped or a retina scanned.
Let's say a user authenticates on to their PC, they need to use an EHR, but
the EHR needs to know who the user is, allowing the user to enter their name
is unacceptable because I can document your patients.  There needs to be
some mechanism in place which identifies the user before they start to treat
the patient.
The signatures on notes, etc, is a safeguard to ensure the document is
reviewed before it becomes part of the official medical record.
Hey, it's a start...
kdtop
Thanks all for the replies so far.
I think the real issue here is one of verify-ability.  Right beside
the nurses computer station, with all it's passwords, is the paper
chart that has absolutely no passwords at all.  And why is this OK?
Well, the staff will notice if a stranger comes in and starts looking
at the chart.  So there is a bit of access control that might be lost
if the records are electronic and can be access from North Korea etc.
Next, every doctor has a unique handwriting.  So 5 yrs from now I
would be able to say with confidence in a court of law that I wrote
this, or didn't write that.  That's pretty much impossible with
ASCII.  But outside of legal debate when people get to pointing
fingers at each other, all this security is not so important.  We've
cared for many a sick patient with paper charts for more than a few
years now.
So here's a thought.  Why not equip the terminals with webcams and
have them take quick pictures every 15 sec or so, and marry that image
with the text.  Or perhaps combine it with  some other technology like
keystroke patterns that some say are fairly unique among various
users.  That way let the user sign the record however they want (using
the honor system, as they do in the paper chart), but still have the
ability to very the accuracy of the claimed name etc.  I'm sure there
are good reasons why this wouldn't work.  But I can dream.
On a slightly different point, let me just throw one other point out
here (wearing my physician hat now).  I feel that software engineers
have a propensity to get carried away with projects.  Or perhaps it is
the managers that hire them.  Anyway, it seems that when a
technological solution is provided, it tries to do too much.  For
example, there is a push to replace paper prescriptions.  Well it is
not good enough to allow typed prescriptions.  No, while we're at it,
let's throw in checking for drug interactions.  And let's check with
their insurance to see if the drug is covered.  And lets have the
communication channel be bidirectional with the pharmacy.  And let's
make the channels to be secure.  And so on and so on.  And suddenly we
have an amazingly complex technology that is difficult to implement,
is hard to master, may disrupt workflow, and is expensive.  So
providers stay away in droves.  When I implemented VistA for my 15-
provider group, I specifically planned for allowing physicians to
continuing practicing exactly the way they always have.  But also I
explained the tool and how it could benefit them.  So used it, other's
stayed with a transcription module.
Anyway, thanks for the feedback on the need for multiple logins.
Kevin
Joel 
There are ways in which silent logins can be used within VistA.  In
addition there were other attempts to provide this.  A Kernel patch
was set for release to implement what we then called an enterprise
single sign-on (at least to VistA) a number of years ago.  Just before
its release, we were told that OCIS would provide an enterprise single
sign-on and we should not release ours.  They still haven't provided
it.  That patch used the user's identity to Windows via an
authentication server known to the VistA system and that contacted the
VistA system to authenticate the user and match the identity with the
entry in the NEW PERSON file.
Auto Sign-On requires the user sign into VistA, but subsequent
applications connecting are signed on as the current user
automatically.  Sites that want to can turn on the Auto Sign-On and
must have the client agent (clagent.exe) active on the workstations
(although it should not be used on clients connected to terminal
servers).  Some sites use this heavily, while others seem to give it
only to the IT staff.  This can be turned on using the DEFAULT AUTO
SIGN-ON field (#218) in the KERNEL SYSTEM PARAMETERS file (#8989.3).
The possible values are 0=NO, 1=YES, and d=DISABLED.  If YES is
selected, auto sign-on is turned on for all users.  If DISABLED is
selected, auto sign-on is turned off for all users.  If NO is
selected, the use of auto sign-on is regulated by the AUTO SIGN-ON
field (#200.18) in the NEW PERSON file (#200), where the options are
YES and NO.
While requiring an investment in Infrastructure, but the use of CCOW
User Context provides for GUI applications, when compiled with one of
more recent versions of the RPCBroker to use the user's identification
in the CCOW Vault to authenticate the user on second and subsequent
connections to a VistA server.  It should be noted that CPRS added
command line arguments which would permit this functionality to be
turned off in locations, such as busy clinics, where multiple
individuals might use the same workstation, since an individual might
be identified as the user currently authenticated to the VistA server.
Groups within the VA are also evaluating other mechanisms for
authentication and authorization for the future as well.
Roy Gaber 
It is not so much the developers (I may have a bias seeing how I am one) but
the steering committees, or SME's that dictate the policy, it is the
developers job to turn those directives into code.
The bottom line is, the physician is responsible for the care and associated
documentation of the patient, it is my belief that they can approach the
issues surrounding HIPPA in whatever way they see fit.

Revision as of 21:29, 9 April 2009

Ignacio Valdez, a psychiatrist in Houston TX, has been charged with implementing VistA for a chain of psychiatric facilities. He has posted his progress on the Hardhats discussion group. Some of the threads are reproduced here.

==Episode 2== Multiple Sign-ons