Mobile Access Management integrates with Epic apps, including Epic Rover, for simplified login and logout of users on shared devices.
Epic is a registered trademark of Epic Systems Corporation.
Configure Epic Rover for Password Autofill
- The Imprivata Locker app allows users to easily check out a device, quickly access Rover with Password AutoFill, then have their data securely removed during check in.
- Users can set a personalized device PIN during checkout to encrypt and secure all apps on the device. This allows users to repeatedly access the whole device and alleviates the need for frequent re-authentication in Rover.
The PIN is automatically removed and Rover data cleared when the device is returned.
When configured for username and password authentication, Epic Rover works seamlessly with Password Autofill. Mobile Access Management can even check that Rover is successfully installed when provisioning iOS devices to ensure they are ready to be checked out.
Requirements
On iOS, Mobile Access Management requires disabling the local Keychain when enabling Password AutoFill from the Imprivata Locker iOS app.
Epic admins can define the Rover user experience and set environment specific configurations in the Rover app using a managed AppConfig delivered by the MDM.
IMPORTANT: For Password AutoFill to work on Epic Rover version 10.4.1 or later, Epic admins must configure the setting LOGIN.ENABLE_AUTOFILL to Yes.
For detailed Rover configuration options and instructions, Imprivata recommends working directly with Epic.
Configure Imprivata EAM for Rover Password Autofill
Applies to iOS devices only.
Enterprise Password Autofill with the Imprivata Locker app uses profiles in Imprivata Enterprise Access Management (formerly Imprivata OneSign) to allow users to select from a list of securely stored credentials when logging into apps. Apps with associated domains like Rover also support 1 tap autofill for an even faster login. For the best user experience, the Rover profile should be configured to prompt for 1 tap autofill using the iOS quicktype keyboard. An example profile is provided.
For more information, see Create Imprivata EAM Profiles.
IMPORTANT: Setting the nm=”epic.com” allows users to use 1 tap autofill and does not require the user to select from a list of credentials.
Configure Force Quit of the Epic Rover App
Mobile Access Management supports logout of Epic Rover by force quitting the app to clear the current user session.
For iOS, select the Epic Rover item in the Check In action app list to force quit Epic Rover during a check in.
Epic Rover will be logged out, and on the next check out will prompt the next user to log in.
This supported logout method affects the device only, and does not communicate the logout to the Epic environment.
Configure Epic API Logout
This feature is in controlled availability in MAM 6.4 (May 2024) and will be available to all customers in a future release.
Use the Epic API logout feature to disassociate a user from a device in Epic and prevent push notifications (messages, alerts, or calls) from being sent to the device after check in.
Supported Epic Apps
This feature is compatible with Epic Rover, Epic Haiku, and Epic Canto apps on iOS and Android and should be used together with a force quit logout action.
Requirements
- The Epic environment (Interconnect Server) must be reachable from the MAM server and have a valid TLS certificate.
- Minimum Epic version. The integration requires Epic November 2023 release and later.
- Create and Associate a New Background User. Steps apply to Epic February 2024 or later.
-
- In Epic, create a new background user for the Interconnect OAuth2 back-end service-no specific security points or classes are required.
- Associate the new background user with the Interconnect OAuth2 back-end service:
- On the Interconnect Administrator’s menu in text, select OAuth2 Management, then Environment-Specific Client Settings.
- Select Create/Edit Settings and enter Imprivata Mobile Access Management Connector in the “Client” field.
- Specify the background user that you created in the “Background user” field.
- Specify the background user that you created in the “Associated User” column.
- App Configuration. In your MDM, assign the Epic mobile apps two AppConfig keys. See below.
- This feature utilizes the DisassociateMobileDevice Epic API which is often included in customers existing Epic licensing. Customers are encouraged to check with their Epic representative to confirm.
Step 1: Configure MDM AppConfigs for Epic App
In your MDM, for the Epic app (ex. Epic Rover), configure the app and set the following two AppConfig key/value pairs.
Configuration Key | Value Type | Configuration Value | Description |
---|---|---|---|
EpicMobileDeviceID | string | {DeviceSerialNumber} * | Sets a unique MDM device ID for use with Epic API logout. |
EpicMobileDeviceIDAppName | Boolean | true | Enables the Epic App name to be appended to the unique install ID. This allows for different app installations running on the same device to be uniquely identified. |
* The unique value configuration value for EpicMobileDeviceID will be based on how your MDM treats device serial numbers.
Microsoft Intune
- In the Microsoft Intune admin console, select the app to configure from the Associated app.
- Click Configuration settings and select Use configuration designer from the Configuration settings format list.
- Add a new key for EpicMobileDeviceID AppConfig. Set the Value Type to String, and set the Configuration Value to {{serialnumber}}.
- Add a new key for the EpicMobileDeviceIDAppName. Set the Value Type to Boolean and set the Configuration Value to true.
Omnissa Workspace ONE
- In the Workspace ONE UEM console, specify the user groups that will receive the Epic app.
- On the distribution screen, name the assignment and in the Assignment Groups field, enter the name of the user group or smart group.
- From the menu on the left, click Application Configuration.
- Add a new key for EpicMobileDeviceID AppConfig. Set the Value Type to String, and set the Configuration Value to {DeviceSerialNumber}.
- Add a new key for the EpicMobileDeviceIDAppName. Set the Value Type to Boolean and set the Configuration Value to true.
To validate the Epic app AppConfig has been applied:
- Open the mobile app, tap the environment selector at the top of the login window, tap the Back button in the top left, then tap the Identifier button in the bottom left.
This should display the Install ID in a format of the device’s serial number with the app name directly after. For example, J4X7X22WGARover.
If the Install ID is still a long alphanumeric string, try reinstalling the app. The Install ID must match the device’s serial number with the app name appended, or the logout action will fail with the error “…Install ID not found.”
Step 2: Configure Epic API Logout in MAM
NOTE: Some steps in this procedure require assistance and coordination between the Imprivata Epic team and Epic, and may take some time to complete.
To configure Epic API Logout:
- In the MAM admin console, navigate to Admin > App Logout. In the Epic API Logout section, click Add Epic Environment.
- In the Add Epic Environment dialog, supply the settings for your Epic environment:
- In the Epic Environment Display Name, type a descriptive name.
- In the Epic Environment Type, select either Non-production or Production.
- In the Epic App Name, type the Epic app name, for example: Rover. Epic App Name name is case sensitive.
- In the Epic Interconnect Server URL, type the URL of the Epic Interconnect Server.
- In the Epic Interconnect Instance, type the instance name, for example: APIProxyPRD or APIProxyTST.
- In the Tests section, click Test connection to test the connection between the Mobile Access Management and Epic Interconnect servers, and then click Next.
The MAM server generates a JWK URL that will be used by the Imprivata Epic team to request vendor access to Epic Showroom.
- Click Request Imprivata Mobile Access Management Connector in Epic Showroom to request access to the Imprivata Connector from the Imprivata Epic team.
Access to Epic Showroom is limited to your organization’s Epic administrators.
The Imprivata team receives a notification of your access request, approves the request, and uploads the JWK URL to Epic. After approved by Imprivata, the Mobile Access Management server will have access to communicate securely with your Epic environment.
During this time, you will see a Pending status on your request in Epic Showroom.
NOTE: It may take up to 12 hours to sync the JWK URL. During this time, authentication to your Epic environment will not succeed.
- When the request is complete, your Epic Showroom displays a status of Ready.
Step 3: Test the Epic Logout API
After Imprivata has approved the connection and the environments sync, perform a logout test. This tests the logout API call on a device without performing a Check In workflow.
- In the Add Epic Environment dialog, in the Tests section, type a device serial number in the Device Serial Number box.
- Click Test Epic API Logout.
If successful, the Epic app is immediately logged out and returns to its login screen. This simulates the behavior that will take place during a Check In Workflow.
Step 4: Add Logout Actions to the Check In Device Workflow
For devices with Epic apps, add a Check In Device workflow with logout actions for Epic API Logout.
In the Check In Device dialog, select Epic API Logout.
NOTE: API requests to Epic may fail with ‘…Install ID not found…’ if no user has yet logged into the app after applying the EpicMobileDeviceID and EpicMobileDeviceIDAppName AppConfig.
This API failure will not fail the Check In workflow and the force quit app action will proceed normally.