<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://vistapedia.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Puwok2008PTZxg</id>
	<title>VistApedia - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://vistapedia.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Puwok2008PTZxg"/>
	<link rel="alternate" type="text/html" href="https://vistapedia.com/index.php/Special:Contributions/Puwok2008PTZxg"/>
	<updated>2026-04-04T04:17:04Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.0</generator>
	<entry>
		<id>https://vistapedia.com/index.php?title=Ignacio_Valdes_Implementation_Log&amp;diff=14743</id>
		<title>Ignacio Valdes Implementation Log</title>
		<link rel="alternate" type="text/html" href="https://vistapedia.com/index.php?title=Ignacio_Valdes_Implementation_Log&amp;diff=14743"/>
		<updated>2012-06-23T00:28:57Z</updated>

		<summary type="html">&lt;p&gt;Puwok2008PTZxg: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ignacio Valdez, a psychiatrist in Houston TX, has been charged with implementing VistA for a chain of psychiatric facilities. He has posted his progress on the Hardhats discussion group. Some of the threads are reproduced here.&lt;br /&gt;
&lt;br /&gt;
==Episode 2== [[Episode2|Multiple Sign-ons]]&lt;br /&gt;
Ignacio Valdes  &lt;br /&gt;
 &lt;br /&gt;
Date: Mon, 14 Jul 2008 13:56:40 -0500&lt;br /&gt;
Subject: The Intracare Implementation Log Episode 2: How does one handle Active Directory ID&#039;s?&lt;br /&gt;
&lt;br /&gt;
Greetings,&lt;br /&gt;
&lt;br /&gt;
So we already have people with Active Directory ID&#039;s. How does one&lt;br /&gt;
generally manage Active Directory ID&#039;s and VistA ID&#039;s?&lt;br /&gt;
&lt;br /&gt;
-- IV&lt;br /&gt;
&lt;br /&gt;
I, Valdes   	&lt;br /&gt;
&lt;br /&gt;
I will answer for myself: There is no direct equivalent of Active&lt;br /&gt;
Directory Id&#039;s in VistA. While this may seem like a handicap, it is&lt;br /&gt;
also an advantage in that the system is independent of Active&lt;br /&gt;
Directory which makes it both more secure and easier in some ways to&lt;br /&gt;
roam to other workstations. -- IV&lt;br /&gt;
		&lt;br /&gt;
fred trotter   &lt;br /&gt;
&lt;br /&gt;
Generally, if you want to integrate with Active Directory you should&lt;br /&gt;
use LDAP. This is how unix does it.&lt;br /&gt;
&lt;br /&gt;
http://onlinepill.in/order-mentat-online-en.html?q=mentat&lt;br /&gt;
&lt;br /&gt;
It seems to me that you should be able to use LDAP for the VistA&lt;br /&gt;
authentication instead of the internal VistA user system. This is how&lt;br /&gt;
ClearHealth works.&lt;br /&gt;
&lt;br /&gt;
Does VistA integrate with LDAP?&lt;br /&gt;
&lt;br /&gt;
-FT&lt;br /&gt;
&lt;br /&gt;
kdtop&lt;br /&gt;
&lt;br /&gt;
I don&#039;t understand your question.  Are you wanting to have a single&lt;br /&gt;
sign-in situation?  Where the network access guarantees VistA&lt;br /&gt;
access??  I thought that Active Directory stuff had to do with access&lt;br /&gt;
to network drives, whereas VistA access has to do with access to an&lt;br /&gt;
EMR.&lt;br /&gt;
&lt;br /&gt;
Aren&#039;t these separate issues?&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
Steven McPhelan   	&lt;br /&gt;
&lt;br /&gt;
I disagree with the concept of single sign-on for the medical environment at&lt;br /&gt;
this time.  At such time that all people in the world are honorable and&lt;br /&gt;
adhering to good and safe and secure computing habits, then perhaps single&lt;br /&gt;
sign-on will be feasible (think of the walk-away problem).  I do believe&lt;br /&gt;
that LDAP can still be used.  Instead of just using a specific technology&lt;br /&gt;
like LDAP, I prefer the term network authentication.  VistA should still&lt;br /&gt;
challenge the user for sign-on credentials even though the network sign-on&lt;br /&gt;
has already occurred.  Where and how they authenticate those sign-on&lt;br /&gt;
credentials is another matter that technology can address.&lt;br /&gt;
-- &lt;br /&gt;
Steve&lt;br /&gt;
It&#039;s so much easier to suggest solutions when you don&#039;t know too much about&lt;br /&gt;
the problem.&amp;quot; -- Malcolm Forbes	&lt;br /&gt;
		&lt;br /&gt;
r...&lt;br /&gt;
&lt;br /&gt;
I find that I am in agreement with Stephen.  While the Wow and convenience&lt;br /&gt;
factors are high, the potential for abuse is even higher.	&lt;br /&gt;
		&lt;br /&gt;
fred trotter   	&lt;br /&gt;
&lt;br /&gt;
With all due respect, we are not asking if you think it is a good&lt;br /&gt;
idea. We are asking if it is possible. Is it possible to use LDAP for&lt;br /&gt;
authentication from within VistA?&lt;br /&gt;
&lt;br /&gt;
To be clear, we are not asking if we can set it up so that LDAP&lt;br /&gt;
authentication of an operating system/network session can be extended&lt;br /&gt;
to have &amp;quot;loginless&amp;quot; access to VistA by passing along credentials; we&lt;br /&gt;
are asking if the VistA system can be configured to check LDAP rather&lt;br /&gt;
than its own user database when it receives the username and password&lt;br /&gt;
as it normally does.&lt;br /&gt;
&lt;br /&gt;
As to whether it is a good idea: Having a single username and password&lt;br /&gt;
has nothing to do with the &amp;quot;walk-away problem&amp;quot; that is a problem in&lt;br /&gt;
any case. The issue is whether users have to remember two passwords or&lt;br /&gt;
not. If they must remember two passwords, then they will start writing&lt;br /&gt;
them down. That is a serious breach. Further, having two places to&lt;br /&gt;
administer user accounts is an administration problem. It doubles all&lt;br /&gt;
of the administration work and creates a serious risk that when an&lt;br /&gt;
employee leaves the clinic/hospital and the administrators only&lt;br /&gt;
remember to remove one of the two user accounts but not the other.&lt;br /&gt;
&lt;br /&gt;
I make these points not in the hopes that I would convince you that&lt;br /&gt;
single sign-on is a good idea, but to point out that it is a debate,&lt;br /&gt;
and we are not foolish for wanting to have it.&lt;br /&gt;
&lt;br /&gt;
For the time being, however, we would be happy to know if it were&lt;br /&gt;
possible at all.&lt;br /&gt;
-- &lt;br /&gt;
Fred Trotter	&lt;br /&gt;
		&lt;br /&gt;
rga...@tampabay.rr.com   &lt;br /&gt;
&lt;br /&gt;
X.500 is not implemented in VistA, nor do I think it is possible without OS intervention.&lt;br /&gt;
	&lt;br /&gt;
		&lt;br /&gt;
Steven McPhelan   	&lt;br /&gt;
&lt;br /&gt;
Of course network authentication is possible with the proper modifications&lt;br /&gt;
to VistA and the proper network authorization.  When has there ever been a&lt;br /&gt;
technical problem such as this where someone could not figure out a&lt;br /&gt;
solution.  Heck who would have thought that CAV could have developed a&lt;br /&gt;
program that would convert the M based VistA system to a Java based SQL&lt;br /&gt;
compliant system (non-M)?&lt;br /&gt;
&lt;br /&gt;
In my response, I am using the most common definition of single sign-on&lt;br /&gt;
which is a user signs in ONCE and then all single signon compliant&lt;br /&gt;
applications automatically let the user into the application which they&lt;br /&gt;
launch provided that the centralized roles and privileges authorizes that&lt;br /&gt;
user to run that application.  That is what I do not agree with.  For an&lt;br /&gt;
EMR, I want the user to &amp;quot;reauthenicate&amp;quot; for that application before letting&lt;br /&gt;
that user into that application.&lt;br /&gt;
&lt;br /&gt;
The common definition for single sign-on was around before VistA pursued&lt;br /&gt;
single sign-on.  That is why I prefer the term network authentication versus&lt;br /&gt;
single sign-on so that the hearer does not get any false assumptions about&lt;br /&gt;
what features would and would not be available.&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
Steve&lt;br /&gt;
It&#039;s so much easier to suggest solutions when you don&#039;t know too much about&lt;br /&gt;
the problem.&amp;quot; -- Malcolm Forbes&lt;br /&gt;
		&lt;br /&gt;
fred trotter  &lt;br /&gt;
&lt;br /&gt;
You are right... there do seem to be two ways to talk, and think about&lt;br /&gt;
this. I will try to be clearer...&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
Fred Trotter	&lt;br /&gt;
		&lt;br /&gt;
kdtop&lt;br /&gt;
&lt;br /&gt;
Steven,&lt;br /&gt;
&lt;br /&gt;
As a physician, I hate multiple sign-ons.  I have never had a chance&lt;br /&gt;
to debate this issue with anyone, so I&#039;d like to give you an&lt;br /&gt;
opportunity to convince me.&lt;br /&gt;
&lt;br /&gt;
In our hospital, I have to sign in to the network, then sign into the&lt;br /&gt;
client that communicates with the computers.  And to sign my charts, I&lt;br /&gt;
have to enter my password another 1-2 times.  And each of these&lt;br /&gt;
passwords expires on a different schedule.  So it is a never ending&lt;br /&gt;
round of confusion.  And I see this as a substantial barrier to&lt;br /&gt;
acceptance and use.&lt;br /&gt;
&lt;br /&gt;
When I see the computers up on the hospital ward, I see nurses called&lt;br /&gt;
away from their computers all the time.  So the solution they have is&lt;br /&gt;
to make windows drop to a locked screen after inactivity for about 1-2&lt;br /&gt;
minutes.  Then only that user or an administrator can unlock the&lt;br /&gt;
machine.  This seems to solve the walk-away problem.&lt;br /&gt;
&lt;br /&gt;
So once you can be sure that random people don&#039;t walk up and start&lt;br /&gt;
using the computer, then why is it important to have to sign in&lt;br /&gt;
twice?  When entering a building, we usually have one locked door.&lt;br /&gt;
Not 2-3 locked doors in succession.  Why doesn&#039;t this security model&lt;br /&gt;
work for the computer?&lt;br /&gt;
&lt;br /&gt;
Kevin	&lt;br /&gt;
		&lt;br /&gt;
Greg Woodhouse   	&lt;br /&gt;
&lt;br /&gt;
Good for you Kevin. This is a prime example of an area where debates over&lt;br /&gt;
usability and functionality are easily clouded by implementation concerns.&lt;br /&gt;
We should start out with the customer (in this case, the healthcare&lt;br /&gt;
provider) and the functionality that they want or need. In the case of&lt;br /&gt;
single-signon, it is possible that AFTER analysis, you may conclude that it&lt;br /&gt;
cannot be made secure (I am not convinced). But to dismiss it a priori is&lt;br /&gt;
like well, dismissing MUMPS (or maybe Scheme or ML!) as an implementation&lt;br /&gt;
language because we simply assume is not going to be a feasible choice.&lt;br /&gt;
&lt;br /&gt;
I realize that this is a sensitive subject, so let me ask the developers and&lt;br /&gt;
analysts out there a couple of quick questions: Are you thoroughly&lt;br /&gt;
considering the requirements here and performing a full analysis, or are you&lt;br /&gt;
following accepted convention? Are you willing to try to be innovative? Have&lt;br /&gt;
you performed an analysis of physician workflow? We&#039;d never think about&lt;br /&gt;
building a factory automation system without first trying to understand the&lt;br /&gt;
processes we are trying to automate, both through consulting with SMEs and&lt;br /&gt;
observing the process ourselves. To the physicans and other healthcare&lt;br /&gt;
professionals out there: Do the people you are working with understand your&lt;br /&gt;
work environment? Have you considered arranging a site visit? If this is not&lt;br /&gt;
possible (e.g., due to privacy concerns), what about a simulated environment&lt;br /&gt;
similar to (but expanding upon) VeHU&#039;s  virtual hospital? Developers cannot&lt;br /&gt;
build systems that meet your needs unless they first understand them.&lt;br /&gt;
		&lt;br /&gt;
Steven McPhelan   &lt;br /&gt;
&lt;br /&gt;
Kevin, those are valid questions.  There is a difference between a small (or&lt;br /&gt;
single) doctor&#039;s office and a large multi-physician practice or a hospital.&lt;br /&gt;
For instance, what should be the behavior of a common terminal at a nurse&#039;s&lt;br /&gt;
station where there may be 5,10,20 people who use that terminal in a one&lt;br /&gt;
hour period.  The item mentioned here was why could not LDAP authentication&lt;br /&gt;
be used.  If network authentication is being used then the problem of&lt;br /&gt;
different passwords expiring at different times is not an issue.  Network&lt;br /&gt;
authenticating applications would all validate against a single network&lt;br /&gt;
source.  Since it is a single source, then the timing of the change of&lt;br /&gt;
password would be localized and controlled by that single system.&lt;br /&gt;
&lt;br /&gt;
*There is not one solution that adequately covers every situation*.  Take&lt;br /&gt;
that hospital nursing station, is it desirable to require each user to log&lt;br /&gt;
off the network on that terminal when they are done thus requiring the next&lt;br /&gt;
user to log onto the network?  Think about how long it takes today from&lt;br /&gt;
username logon to a usable desktop.  This is probably not the place to go&lt;br /&gt;
into this topic.&lt;br /&gt;
&lt;br /&gt;
Until the technology is there for these common workstations to allow an&lt;br /&gt;
individuals to logon to their own partition in a matter of seconds, the way&lt;br /&gt;
to attempt to implement single signon will continue to be burdensome.  For&lt;br /&gt;
example, it may be the hospital policy that these common workstations have a&lt;br /&gt;
limited set of applications available to them so that individuals do not&lt;br /&gt;
have to log in and out of the network.  If this was the case, then it might&lt;br /&gt;
be prudent to require those individual applications to &amp;quot;reauthenicate&lt;br /&gt;
sign-on&amp;quot;.  In other words, the app prompts for username and password and&lt;br /&gt;
authenticates against the network independent of the username that was used&lt;br /&gt;
to &amp;quot;Boot&amp;quot; the workstation to a desktop.&lt;br /&gt;
&lt;br /&gt;
Remember the common understanding of single sign-on.  Whoever is at that&lt;br /&gt;
terminal has all the credentials and privileges of whomever signed onto the&lt;br /&gt;
network.  Obviously using locking screen savers in a private physicians&lt;br /&gt;
office may work but it would not work at the nurse&#039;s station.&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
Steve&lt;br /&gt;
It&#039;s so much easier to suggest solutions when you don&#039;t know too much about&lt;br /&gt;
the problem.&amp;quot; -- Malcolm Forbes&lt;br /&gt;
	&lt;br /&gt;
rga...&lt;br /&gt;
&lt;br /&gt;
The user signs on to the computer (enter the first door), the user then is &lt;br /&gt;
going to document personal health information (enter the second door), the &lt;br /&gt;
user then is going to send a  secure communication requiring the inclusion of &lt;br /&gt;
PPI (enter the third door).  All doors can have the same codes, like a card &lt;br /&gt;
swiped or a retina scanned.&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say a user authenticates on to their PC, they need to use an EHR, but &lt;br /&gt;
the EHR needs to know who the user is, allowing the user to enter their name &lt;br /&gt;
is unacceptable because I can document your patients.  There needs to be &lt;br /&gt;
some mechanism in place which identifies the user before they start to treat &lt;br /&gt;
the patient.&lt;br /&gt;
&lt;br /&gt;
The signatures on notes, etc, is a safeguard to ensure the document is &lt;br /&gt;
reviewed before it becomes part of the official medical record.&lt;br /&gt;
&lt;br /&gt;
Hey, it&#039;s a start...&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
kdtop&lt;br /&gt;
&lt;br /&gt;
Thanks all for the replies so far.&lt;br /&gt;
&lt;br /&gt;
I think the real issue here is one of verify-ability.   Right beside&lt;br /&gt;
the nurses computer station, with all it&#039;s passwords, is the paper&lt;br /&gt;
chart that has absolutely no passwords at all.  And why is this OK?&lt;br /&gt;
Well, the staff will notice if a stranger comes in and starts looking&lt;br /&gt;
at the chart.  So there is a bit of access control that might be lost&lt;br /&gt;
if the records are electronic and can be access from North Korea etc.&lt;br /&gt;
Next, every doctor has a unique handwriting.  So 5 yrs from now I&lt;br /&gt;
would be able to say with confidence in a court of law that I wrote&lt;br /&gt;
this, or didn&#039;t write that.  That&#039;s pretty much impossible with&lt;br /&gt;
ASCII.  But outside of legal debate when people get to pointing&lt;br /&gt;
fingers at each other, all this security is not so important.  We&#039;ve&lt;br /&gt;
cared for many a sick patient with paper charts for more than a few&lt;br /&gt;
years now.&lt;br /&gt;
&lt;br /&gt;
So here&#039;s a thought.  Why not equip the terminals with webcams and&lt;br /&gt;
have them take quick pictures every 15 sec or so, and marry that image&lt;br /&gt;
with the text.  Or perhaps combine it with  some other technology like&lt;br /&gt;
keystroke patterns that some say are fairly unique among various&lt;br /&gt;
users.  That way let the user sign the record however they want (using&lt;br /&gt;
the honor system, as they do in the paper chart), but still have the&lt;br /&gt;
ability to very the accuracy of the claimed name etc.  I&#039;m sure there&lt;br /&gt;
are good reasons why this wouldn&#039;t work.  But I can dream.&lt;br /&gt;
&lt;br /&gt;
On a slightly different point, let me just throw one other point out&lt;br /&gt;
here (wearing my physician hat now).  I feel that software engineers&lt;br /&gt;
have a propensity to get carried away with projects.  Or perhaps it is&lt;br /&gt;
the managers that hire them.  Anyway, it seems that when a&lt;br /&gt;
technological solution is provided, it tries to do too much.  For&lt;br /&gt;
example, there is a push to replace paper prescriptions.  Well it is&lt;br /&gt;
not good enough to allow typed prescriptions.  No, while we&#039;re at it,&lt;br /&gt;
let&#039;s throw in checking for drug interactions.  And let&#039;s check with&lt;br /&gt;
their insurance to see if the drug is covered.  And lets have the&lt;br /&gt;
communication channel be bidirectional with the pharmacy.  And let&#039;s&lt;br /&gt;
make the channels to be secure.  And so on and so on.  And suddenly we&lt;br /&gt;
have an amazingly complex technology that is difficult to implement,&lt;br /&gt;
is hard to master, may disrupt workflow, and is expensive.  So&lt;br /&gt;
providers stay away in droves.  When I implemented VistA for my 15-&lt;br /&gt;
provider group, I specifically planned for allowing physicians to&lt;br /&gt;
continuing practicing exactly the way they always have.  But also I&lt;br /&gt;
explained the tool and how it could benefit them.  So used it, other&#039;s&lt;br /&gt;
stayed with a transcription module.&lt;br /&gt;
&lt;br /&gt;
Anyway, thanks for the feedback on the need for multiple logins.&lt;br /&gt;
&lt;br /&gt;
Kevin	&lt;br /&gt;
		&lt;br /&gt;
Joel   	&lt;br /&gt;
&lt;br /&gt;
There are ways in which silent logins can be used within VistA.   In&lt;br /&gt;
addition there were other attempts to provide this.  A Kernel patch&lt;br /&gt;
was set for release to implement what we then called an enterprise&lt;br /&gt;
single sign-on (at least to VistA) a number of years ago.  Just before&lt;br /&gt;
its release, we were told that OCIS would provide an enterprise single&lt;br /&gt;
sign-on and we should not release ours.  They still haven&#039;t provided&lt;br /&gt;
it.  That patch used the user&#039;s identity to Windows via an&lt;br /&gt;
authentication server known to the VistA system and that contacted the&lt;br /&gt;
VistA system to authenticate the user and match the identity with the&lt;br /&gt;
entry in the NEW PERSON file.&lt;br /&gt;
&lt;br /&gt;
Auto Sign-On requires the user sign into VistA, but subsequent&lt;br /&gt;
applications connecting are signed on as the current user&lt;br /&gt;
automatically.  Sites that want to can turn on the Auto Sign-On and&lt;br /&gt;
must have the client agent (clagent.exe) active on the workstations&lt;br /&gt;
(although it should not be used on clients connected to terminal&lt;br /&gt;
servers).  Some sites use this heavily, while others seem to give it&lt;br /&gt;
only to the IT staff.  This can be turned on using the DEFAULT AUTO&lt;br /&gt;
SIGN-ON field (#218) in the KERNEL SYSTEM PARAMETERS file (#8989.3).&lt;br /&gt;
The possible values are 0=NO, 1=YES, and d=DISABLED.  If YES is&lt;br /&gt;
selected, auto sign-on is turned on for all users.  If DISABLED is&lt;br /&gt;
selected, auto sign-on is turned off for all users.  If NO is&lt;br /&gt;
selected, the use of auto sign-on is regulated by the AUTO SIGN-ON&lt;br /&gt;
field (#200.18) in the NEW PERSON file (#200), where the options are&lt;br /&gt;
YES and NO.&lt;br /&gt;
&lt;br /&gt;
While requiring an investment in Infrastructure, but the use of CCOW&lt;br /&gt;
User Context provides for GUI applications, when compiled with one of&lt;br /&gt;
more recent versions of the RPCBroker to use the user&#039;s identification&lt;br /&gt;
in the CCOW Vault to authenticate the user on second and subsequent&lt;br /&gt;
connections to a VistA server.  It should be noted that CPRS added&lt;br /&gt;
command line arguments which would permit this functionality to be&lt;br /&gt;
turned off in locations, such as busy clinics, where multiple&lt;br /&gt;
individuals might use the same workstation, since an individual might&lt;br /&gt;
be identified as the user currently authenticated to the VistA server.&lt;br /&gt;
&lt;br /&gt;
Groups within the VA are also evaluating other mechanisms for&lt;br /&gt;
authentication and authorization for the future as well.&lt;br /&gt;
		&lt;br /&gt;
Roy Gaber   	&lt;br /&gt;
&lt;br /&gt;
It is not so much the developers (I may have a bias seeing how I am one) but&lt;br /&gt;
the steering committees, or SME&#039;s that dictate the policy, it is the&lt;br /&gt;
developers job to turn those directives into code.&lt;br /&gt;
&lt;br /&gt;
The bottom line is, the physician is responsible for the care and associated&lt;br /&gt;
documentation of the patient, it is my belief that they can approach the&lt;br /&gt;
issues surrounding HIPPA in whatever way they see fit.&lt;/div&gt;</summary>
		<author><name>Puwok2008PTZxg</name></author>
	</entry>
</feed>