Epic Apps and Mobile Access Management

Mobile Access Management integrates with Epic apps, including Epic Rover, for simplified login and logout of users on shared devices.

Epic is a registered trademark of Epic Systems Corporation.

Configure Epic Rover for Password Autofill

Applies to iOS devices only.

  • The Imprivata Locker app allows users to easily check out a device, quickly access Rover with Password AutoFill, then have their data securely removed during check in.

  • Users can set a personalized device PIN during checkout to encrypt and secure all apps on the device. This allows users to repeatedly access the whole device and alleviates the need for frequent re-authentication in Epic Rover.

    The PIN is automatically removed and Epic Rover data cleared when the device is returned.

When configured for username and password authentication, Epic Rover works seamlessly with Password Autofill. Mobile Access Management can even check that Epic Rover is successfully installed when provisioning iOS devices to ensure they are ready to be checked out.

Requirements

On iOS, Mobile Access Management requires disabling the local Keychain when enabling Password AutoFill from the Imprivata Locker iOS app.

Epic admins can define the Epic Rover user experience and set environment specific configurations in the Rover app using a managed AppConfig delivered by the MDM.

IMPORTANT:

For Password AutoFill to work on Epic Rover version 10.4.1 or later, Epic admins must configure the setting LOGIN.ENABLE_AUTOFILL to Yes.

For detailed Rover configuration options and instructions, Imprivata recommends working directly with Epic.

Configure Imprivata Enterprise Access Management for Rover Password Autofill

Applies to iOS devices only.

Enterprise Password Autofill with the Imprivata Locker (iOS) app uses profiles in Enterprise Access Management to allow users to select from a list of securely stored credentials when logging into apps.

Apps with associated domains like Epic Rover also support 1 tap autofill for an even faster login.

For the best user experience, the Epic Rover profile should be configured to prompt for 1 tap autofill using the iOS quicktype keyboard.

An example profile is provided.

For more information, see Create Imprivata Enterprise Access Management Profiles.

Copy
<SSO> 
    <global verCreate="6.0" verLastMod="6.0"/> 
        <app nm="epic.com" desc="Epic Rover" profileType="2" appType="0"> 
            <env type="200" nm="iOS"> 
                <scn nm="" auto="0" dgs="1"> 
                    <ctl var="USR"/> 
                    <ctl var="PWD"/> 
                </scn> 
            </env> 
        </app> 
    <containers/> 
</SSO> 
IMPORTANT:

Setting the nm="epic.com" allows users to use 1 tap autofill and does not require the user to select from a list of credentials.

Configure Force Quit of the Epic Rover App

Applies to iOS devices.

Mobile Access Management supports logout of Epic Rover by force quitting the app to clear the current user session.

For iOS, select the Epic Rover item in the Check In action app list to force quit Epic Rover during a check in.

Epic Rover will be logged out, and on the next check out will prompt the next user to log in.

This supported logout method affects the device only, and does not communicate the logout to the Epic environment.

Click to enlarge

Configure Epic API Logout

Applies to iOS and Android devices.

Use the Epic API logout feature to disassociate a user from a device in Epic and prevent push notifications (messages, alerts, or calls) from being sent to the device after check in.

Supported Epic Apps

This feature is compatible with Epic Rover, Epic Haiku, and Epic Canto apps on iOS and Android and should be used together with a force quit logout action.

Epic Documentation

For more information, see the Epic Galaxy documentation:

Interconnect User Case Guide – Disassociate a Mobile Device.

Requirements

  • The Epic environment (Interconnect Server) must be reachable from the MAM server and have a valid TLS certificate.

  • Minimum Epic version. The integration requires Epic November 2023 release and later.

  • Create and Associate a New Background User. Steps apply to Epic February 2024 or later.

    1. In Epic, create a new background user for the Interconnect OAuth2 back-end service-no specific security points or classes are required.

    2. Associate the new background user with the Interconnect OAuth2 back-end service:

      1. On the Interconnect Administrator's menu in text, select OAuth2 Management, then Environment-Specific Client Settings.

      2. Select Create/Edit Settings and enter Imprivata Mobile Access Management Connector in the “Client” field.

      3. Specify the background user that you created in the “Background user” field.

    3. Specify the background user that you created in the “Associated User” column.

  • App Configuration. In your MDM, assign the Epic mobile apps three AppConfig keys. See below.

  • This feature utilizes the DisassociateMobileDevice Epic API which is often included in customers existing Epic licensing. Customers are encouraged to check with their Epic representative to confirm.

Step 1: Configure MDM AppConfigs for Epic App

In your MDM, for the Epic app, configure the app and set the following AppConfig key/value pairs.

Configuration Key Value Type Configuration Value Description
EpicMobileDeviceID string {DeviceSerialNumber} *

Sets a unique MDM device ID for use with Epic API logout.

EpicMobileDeviceIDAppName Boolean true

Enables the Epic App name to be appended to the unique install ID.

This allows for different app installations running on the same device to be uniquely identified.

EpicMobileConfigurationURL string epicrover://handheld/config/XXXX

The unique Epic configuration URL.

To obtain the EpicMobileConfigurationURL for your environment, contact your Epic administrator.

* The unique value configuration value for EpicMobileDeviceID will be based on how your MDM treats device serial numbers.

To validate the Epic app AppConfig has been applied:

  • Open the mobile app, tap the environment selector at the top of the login window, tap the Back button in the top left, then tap the Identifier button in the bottom left.

    This should display the Install ID in a format of the device's serial number with the app name directly after. For example, J4X7X22WGARover.

    If the Install ID is still a long alphanumeric string, try reinstalling the app. The Install ID must match the device’s serial number with the app name appended, or the logout action will fail with the error “…Install ID not found.”

Step 2: Request the MAM Connector

NOTE:

Some steps in this procedure require assistance and coordination between the Imprivata Epic team and Epic, and may take some time to complete.

In the Epic Showroom, click Request Imprivata Mobile Access Management Connector to request access to the Imprivata Connector from the Imprivata Epic team.

The Imprivata Epic team receives a notification of your access request and approves it. During this time, you will see a Pending status on your request in Epic Showroom.

When the request is complete, your Epic Showroom displays a status of Ready.

Step 3: Configure Epic API Logout in MAM

To configure Epic API Logout:

  1. In the MAM admin console, navigate to Admin > App Logout. In the Epic API Logout section, click Add Epic Environment.

  2. In the Add Epic Environment dialog, supply the settings for your Epic environment:

    1. In the Epic Environment Display Name, type a descriptive name.

    2. In the Epic Environment Type, select either Non-production or Production.

    3. In the Epic App Name, type the Epic app name, for example: Rover. Epic App Name name is case sensitive.

    4. In the Epic Interconnect Server URL, type the URL of the Epic Interconnect Server.

    5. In the Epic Interconnect Instance, type the instance name, for example: APIProxyPRD or APIProxyTST.

    6. In the Tests section, click Test connection to test the connection between the Mobile Access Management and Epic Interconnect servers. Authentication failures are expected until step 3 is complete.

    7. Click Save to save the configuration.

      The MAM server generates a JWK URL that the Imprivata Epic team will use in the next step.

    8. Imprivata recommends setting up both Production and Non-production environments at the same time. No actions will be taken in either environment until 'Step 5: Add Logout Actions To The Check In Device Workflow’ is configured.

  3. The Imprivata Epic team uploads the JWK URL generated by the MAM server to Epic.

    NOTE:

    It may take up to 12 hours to sync the JWK URL. During this time, authentication to your Epic environment will not succeed.

    Click to enlarge

  4. The Mobile Access Management server now has access to communicate securely with your Epic environment.

    Access to Epic Showroom is limited to your organization’s Epic administrators.

Step 4: Test the Epic Logout API

After Imprivata has approved the connection and the environments sync, perform a logout test. This tests the logout API call on a device without performing a Check In workflow.

  1. In the Add Epic Environment dialog, in the Tests section, type a device serial number in the Device Serial Number box.

  2. Click Test Epic API Logout.

    If successful, the Epic app is immediately logged out and returns to its login screen. This simulates the behavior that will take place during a Check In Workflow.

Step 5: Add Logout Actions to the Check In Device Workflow

For devices with Epic apps, add a Check In Device workflow with logout actions for Epic API Logout.

In the Check In Device dialog, select Epic API Logout.

Click to enlarge

NOTE:

API requests to Epic may fail with ‘…Install ID not found…’ if no user has yet logged into the app after applying the EpicMobileDeviceID and EpicMobileDeviceIDAppName AppConfig.

This API failure will not fail the Check In workflow and the force quit app action will proceed normally.