HealthCast

HealthCast EPCS Server Installation and Configuration
HealthCast EPCS Server Core Infrastructure Installation and Configuration

Installation of the HealthCast EPCS Server requires numerous Microsoft® technologies to be previously installed.

These technologies are called the RapidIdentity Server Core Infrastructure and may include the following items as desired by the organization.

  • Microsoft Windows Standard or Enterprise Server 2008 R2 or higher running IIS 7.0 or higher

  • Microsoft Active Directory

  • Microsoft SQL Server or SQL 2016 or higher

  • Microsoft Windows Server 2008 Certificate Services or higher (Required for PKI contact smart card Only)

RapidIdentity MFA Server may be deployed on Windows® domain controllers and member servers. For the purposes of this installation guide, a non-domain controller server is joined to a pre-existing domain, MFAServer.local.

Once the required technologies are installed, proceed with the HealthCast EPCS Server core infrastructure installation steps.

Installing core infrastructure components will include the following steps:

  1. Installing IIS

  2. Installing SQL Server

  3. Core Infrastructure Post-Installation Procedures

Installing IIS

In order to begin set up for HealthCast EPCS solution components, IIS must be installed to the RapidIdentity MFA Server.

Proceed with the following steps to install IIS.

  1. From the Start Menu, type Server Manager and select it.

    IIS1_copy.png
  2. Within the Server Manager Dashboard menu, click Add roles and features.

    Screen_Shot_2017-02-01_at_10_10_52_AM.png

    A wizard opens to explain roles, role services, and features. After reading the description, click Next.

  3. In the Installation Type menu, select Role-based or feature-based installation and click Next.

    Screen_Shot_2017-02-01_at_10_18_56_AM.png
  4. Within the Server Selection menu, click Select a server from the server pool.

    Screen_Shot_2017-02-01_at_10_22_48_AM.png

    Verify the local server is selected and click Next.

  5. In the Server Roles menu, check the Web Server (IIS) box.

    Screen_Shot_2017-02-01_at_10_25_25_AM.png

    Checking the Web Server Box triggers an additional window to open. Click Add Features and then click Next.

    Screen_Shot_2017-02-01_at_10_30_57_AM.png
  6. The Features menu requires two focus points.

    1. First, expand the .NET Framework 3.5 Features and click HTTP Activation.

      IIS8.png

      This selection triggers a new window stating the requirements for HTTP activation. Click Add Features.

      IIS9.png
    2. Second, expand the .NET Framework 4.6 Features and then expand WCF Services.

      IIS10.png
      1. Check HTTP Activation, Message Queuing (MSMQ) Activation, Named Pipe Activation and TCP Activation.

        IIS11.png
      2. As additional dialog boxes open, click Add Features. After the additional four boxes are checked, click Next.

  7. Read the Web Server Role (IIS) menu content and then click Next.

    Screen_Shot_2017-02-01_at_10_52_41_AM.png
  8. The Role Services submenu requires three focus points.

    1. First, scroll to the Security category and check the boxes for Basic Authentication and Windows Authentication.

      IIS13.png
    2. Second, expand the Application Development category and check the .NET Extensibility 3.5.NET Extensibility 4.x, ASP .NET 3.5, and ASP .NET 4.x boxes.  

      IIS14.png
    3. Third, scroll to Management Tools and verify that the IIS Management Console box is checked.

      IIS15.png

      Click Next.

  9. Confirm the installation selections and then click Install.

    Screen_Shot_2017-02-01_at_11_06_18_AM.png
  10. Wait for the installation to complete successfully.

    Screen_Shot_2017-02-01_at_12_04_45_PM.png

    Click Close to complete the installation.

Installing the RapidIdentity MFA Server

In order to continue the setup, download the RapidIdentity MFA Server files and complete the proceeding steps.

  1. Right-click on the RapidIdentity MFA Server and select Run as administrator.

  2. The RapidIdentity MFA Server – InstallShield Wizard will open, click Next.

    RI_Server_Install_1.png
  3. The License Agreement will appear. Read the License Agreement, accept the terms of the license agreement, and click Next.

    RI_Server_Install_2.png
  4. The next screen, Email Configuration Parameters, is related to email reporting. Complete if set-up is desired. If not setting this up at the time, leave it on the default information and click Next.

    RI_Server_Install_3.png
  5. The Database Configuration window will appear. Enter the server and instance name into the proper fields. Leave the Database Name as is. Enter the SQL Account ID or Windows Credentials and the Password, along with Password Confirmation and click Next.

    RI_Server_Install_4.png

    This will generate a new window that will confirm the new database creation; click Next.

  6. If a SQL Account ID was entered, the screen will now ask for Windows Credentials required for setup. Enter the Windows Credentials and the Password, along with Password Confirmation and click Next.

    RI_Server_Install_6.png

    A window will generate to inform that the new database has been created; click Next.

  7. The Database Configuration window will appear again to ensure the fields entered represent the account that will be used for connection in the RapidIdentity MFA Server. Click Next to confirm.

  8. The Choose Destination Location will appear. Select a folder in which the setup will install the files through the Change button or maintain the recommended default server location. Click Next.

    RI_Server_Install_7.png
  9. The server is now ready to install. Click Install to proceed with installation.

    RI_Server_Install_8.png
  10. Wait for the installation to complete successfully.

  11. The InstallShield Wizard Complete screen will appear when installation is complete. Click Finish.

    RI_Server_Install_9.png

The RapidIdentity MFA Server is successfully installed. Proceed to the steps to install the client-side components.

Installing the RapidIdentity MFA Client-Side Components

To complete the RapidIdentity MFA Server installation, there are client-side components that require installation on the HealthCast EPCS Server.

Notice

Download the RapidIdentity MFA Client-Side Components files:

RapidIdentity_Client-Side-Components_v4939.exe - additional install use on the MFA server

https://identityautomation.force.com/support/s/downloads

Once downloaded, proceed with the following steps to install the components.

  1. Right-click on the RapidIdentity Client-Side Components folder and select Run as administrator.

    RI_Client_Comp_1.png
  2. On the welcome screen, click Next.

  3. The License Agreement will appear. Read the License Agreement, accept the terms of the license agreement, and click Next.

    RI_Client_Comp_2.png
  4. The Choose Destination Location window will appear. Select a folder in which the setup will install the files through the Change button or maintain the recommended default server location. Click Next.

    RI_Client_Comp_3.png
  5. The server is now ready to install. Click Install.

    RI_Client_Comp_4.png
  6. Wait for the installation to complete successfully.

  7. The InstallShield Wizard Complete screen will appear when installation is complete. Click Finish.

    RI_Client_Comp_5.png

The installation steps for the RapidIdentity MFA Server are now complete.

Configuring the RapidIdentity MFA Server

Now that the installation steps for the RapidIdentity MFA Server are completed, it is necessary to configure the web services in IIS.

  1. Go to Windows > Administrative Tools and locate and click on the Internet Information Services IIS Manager.

    Config_RI_Server_2.png
  2. Within the Connections field, select where the RapidIdentity MFA Server was installed.

    This generates a window that offers notification of the latest Web Platform Components. Select Yes to opt in.

  3. Within the Connections field, select Application Pools and right-click on oneAppPool to go to the Advanced Settings.

    Config_RI_Server_4.png
    1. Under the General section, change the .NET CLR Version to v2.0.

      Config_RI_Server_5.png
    2. Under the Process Model section, ensure that the Identity is set to Network Service.

      Config_RI_Server_6.png
    3. Change Load User Profile status to True.

      Config_RI_Server_9.png

      Click OK.

  4. Minimize windows and go to Windows Explorer. Open Control Panel and navigate to C:\Program Files\2FA.

    Config_RI_Server_10.png
  5. On the local disc drive, go to Program Files > 2FA Server and right-click on the downloaded RapidIdentity MFA Server to go to Properties.

    Config_RI_Server_11.png
  6. In the Security tab, click on Edit to change permissions.

  7. Then, click on Add when the permissions for the server window generates.

    Config_RI_Server_12.png
  8. In the Enter the object names to select field, type in network and click the Check Names button.

    This generates a window that will display multiple files with the same name, select NETWORK SERVICE and click OK.

  9. Within the Permissions for NETWORK SERVICE, check the box under Allow for Full Control.

    Click Apply and then OK.

  10. Click OK on the server properties window.

  11. Open a command window and right-click and select Run as administrator.

  12. Type in iisreset and press enter to restart the web server.

A return command will state, “Internet services successfully restarted,” which completes the server configuration.

Configuring the Data Tables for the RapidIdentity MFA Server

Complete these seven steps to create the RapidIdentity MFA Server Database tables.

  1. On the RapidIdentity MFA Server, open a browser and navigate to http://[servername]/One/install/build_cm_tables.aspx

    The servername is the name of the server instance created previously and the authentication credentials are those configured for that server instance.

    Note

    The first attempt to access the newly created RapidIdentity MFA Server may require more time than anticipated. This experience is normal.

    Once the RapidIdentity MFA Server configuration sequence below is completed, the access time should be faster.

  2. After authentication, leave the SysAdmin Role Name, Username, and LDAP Unique Identifier as the default ONE_sys_admin – do not input a different Role Name, Username, or LDAP Unique Identifier.

    Screen_Shot_2017-11-27_at_9_46_46_AM.png

    Complete the password fields as shown and then click Build RapidIdentity.

  3. A pop-up message will appear stating that all the data in the repository will be replaced with the default settings.

    Screen_Shot_2017-11-27_at_9_47_38_AM.png

    Important

    During the first RapidIdentity MFA Server installation, click OK.

    During subsequent RapidIdentity MFA Server upgrades, click Cancel.

  4. When the server tables are completed, a confirmation message appears.

    Screen_Shot_2017-11-27_at_9_48_23_AM.png
  5. Click Home.

  6. It is necessary to authenticate to RapidIdentity MFA Server using the credentials created in Step 2. In the Username field, enter ONE_sys_admin.

    Screen_Shot_2017-11-27_at_9_49_10_AM.png

    Leave the Domain field blank. Click OK.

    Screen_Shot_2017-11-27_at_9_49_51_AM.png
  7. Enter the password chosen in Step 2 in the Password field and the click Validate.

A successful authentication to RapidIdentity MFA Server directs users to the Home screen.

Screen_Shot_2017-11-27_at_9_50_37_AM.png
Configuring Authentication Device in Hyperspace for EPCS

To create and configure Identity Automation's authentication devices in Hyperspace please have your Hyperspace and Desktop TS user follow the directions in the "3rd Party Authentication Setup" section in the "Authentication Setup and Support Guide".  This Guide is maintained and supported by Epic and has directions on setting up a 3rd party authentication device E0G record and configuring it in Authentication Administration to allow Hyperspace to use an authentication device.

These ProgIDs can be used to support an EPCS workflow authentication in Hyperspace:

  • Use RIBiometric.riBio ProgID to support Fingerprint authentication.

  • Use RIPingMe.RIToken ProgID to support PingMe and OTP authentication.

The following sections are provided for clarity and may be covered in the Epic documentation.

After configuring our EPCS-supported Program IDs in the Epic back-end system, customers will need to configure the following two contexts in Hyperspace's Authentication Administration:

  • E-prescribing Controlled Medications - First Context [41]

  • E-prescribing Controlled Medications - Second Context [42]

    Note

    Although Hyperspace has the functionality to require multiple authentication devices for a single context using Primary and Secondary device settings, this is not used for the EPCS workflow configuration. Instead, the two contexts listed above are used to configure the two-factor authentication needed.

Configuring E-prescribing Controlled Medications - First Context [41]

In Hyperspace's Authentication Administration, after selecting the above context for the needed level (system, workstation, etc.), add RIBiometric.riBio and RIPingMe.RIToken devices - in that order - to the Primary Device setting. Leave the Secondary Device setting empty, as it is not used. One of the devices configured will be the first authentication factor that the user will have to pass to complete a controlled medication order.

In this configuration, the user has to authenticate with one of the devices configured, but not both. This configuration allows the user to use the Fingerprint reader to authenticate, if available, or use PingMe if Fingerprint is not available or the user cancels.

Configuring E-prescribing Controlled Medications - Second Context [42]

After selecting the above context for the needed level (system, workstation, etc.), add Hyperspaces Default Login[0] to the Primary Device setting, leaving the Secondary Device setting empty. This will be the second authentication factor the user will have to pass to complete a controlled medication order.

Note

If you want to require the user to use both Fingerprint and PingMe authentication, then add only one device like RIBiometric.riBio for Fingerprint in the Primary Device setting for the first context, and then add RIPingMe.RIToken device in the second context's Primary Device setting.

Tip

Use the “Change Challenge Questions” Context for proof of concept setup to test using the above authentication devices.

Contact your Epic Client Systems – Hyperspace and Desktop TS for detailed instructions and more information about adding authentication devices.

Installing the HealthCast ExactAccess Server

To continue the HealthCast EPCS setup, download the HealthCast ExactAccess Server msi file and proceed with the following steps.

Notice

These instructions are for installing and configuring the Audit Server where the full ExactAccess Server is not being used.

  1. Right-click on the HealthCast ExactAccess Server and select Run as administrator.

  2. When the InstallShield Wizard appears, click Next.

    eXactAccess_Audit_Server_1.png
  3. In the Choose Destination Location window, select a folder in which the setup will install the files through the Change button or maintain the recommended default server location. Click Next.

    eXactAccess_Audit_Server_2.png
  4. At this point, services can be configured to run under a domain account. This step can also be skipped at this time by clicking Next.

    Notice

    If skipped, a window will be generated to notify of an invalid username or password entry. Click Cancel to proceed with the setup without the username and password.

    eXactAccess_Audit_Server_3.png
  5. The program is now ready to install.

    Press Install.

    eXactAccess_Audit_Server_4.png
  6. Wait for the program to install, configure, and process. Click Finish on the generated completion screen.

    eXactAccess_Audit_Server_5.png
  7. The system will need to be restarted for the configuration changes to be made to the HealthCast ExactAccess Server to take effect. Click Yes to restart now or No to restart later.

    eXactAccess_Audit_Server_6.png

Continue to follow the steps on creating and configuring the database for auditSERVER. Once completed, it will be recommended to restart the system at that time.

Creating the ExactAccess Server Database for auditSERVER

Now that the HealthCast ExactAccess Server is set up, follow these steps to create the database for the auditSERVER.

  1. Access the database server by going to Microsoft SQL Server Management Studio and under the Object Explorer section, click on Databases and select New Database.

  2. Name the database and click Enter.

  3. Go to File > Open > File and locate the database script that was created through the downloaded of the HealthCast ExactAccess Server msi file. Click Open.

    The default location is PC > Local Disk (C:) > Program Files (86) > HealthCast > ExactAccess > SQL > MSSQL > audit > database.sql under the coordinating server it was installed in.

    XA_Server_auditSERVER_Database_2.png
  4. In the workstation of the opened script, select Execute.

    XA_Server_auditSERVER_Database_3.png
  5. A command will return in the message section indicating a successful completion.

    XA_Server_auditSERVER_Database_4.png
  6. In the Object Explorer menu, click on the + sign next to the Security folder to expand the directory. Repeat for the Logins folder and right-click on hcisql to click on Properties.

    Note

    This step assumes that the domain service account in the active directory of the environment for SQL setup is preexisting.

  7. This generates The Login Properties window. Select User Mapping in the Select a Page menu to ensure that the box is selected under Map for the hciAudit Database.

    eXactAccess_Audit_Server_7.png

    Click OK.

The database is now created.

Configuring the ExactAccess Server Database for auditSERVER

Once the database is created, configure it for the auditSERVER with these steps.

  1. Go to Windows > HealthCast and locate and click on ExactAccess Server Configuration.

    XA_Server_audit_DB_Config_1.png
  2. This populates the HCI Server Configuration Window populates. Click on the Database tab.

    XA_Server_audit_DB_Config_2.png

    This generates a Database window. Select Audit Server.

  3. Click the + button on the right-side of the screen.

    XA_Server_audit_DB_Config_3.png
    1. This populates the Data Link Properties (FireDAC) window. Using the drop-down menu for the Select a driver section, select SQL Server Native Client 11.0.

    2. Select or enter the server name and use the dropdown to select it.

    3. Enter information to log on to the server.

      XA_Server_audit_DB_Config_4.png
    4. Use the dropdown menu to select the hciAudit database and click Test Connection.

      XA_Server_audit_DB_Config_5.png
    5. Click OK once successfully connected.

  4. Click OK on the Data Link Properties (FireDAC) widow.

  5. Click OK on the HCI Server Configuration Window.

  6. Now, complete the service restart that was required previously and click Yes to confirm.

    XA_Server_audit_DB_Config_6.png
  7. Select Close on the HCI Server Configuration Window.

  8. The system will need to be restarted to complete all of the updates to the HealthCast ExactAccess Server to take effect. Click Yes to restart now.

  9. From the Start menu, Run services.msc.

  10. Find the entry for HCI auditServer Service, right-click on it , and click on File Properties.

  11. On the logon tab, Select the service account by clicking on Browse....

    HCI.png
    1. Type in the password for the service account.

    2. Click Apply and then, click the Ok button.

  12. In services window, right-click on HCI auditSERVER Service and select restart.

The system will now restart and this will conclude the HealthCast ExactAccess Server.

Installing the SSO Audit Monitor

To ensure the HealthCast SSO Audit Monitor Reporting Tool is ready to use, follow the proceeding steps to install and set up this tool.

Important

Install the server certificate or verify that the certificate is present. (The certificate must have the Full Qualified Doman Name as the subject field.)

Notice

User and Admin Groups should be created on the AD and users added.

  1. Right-click on the setup.exe file and Run as administrator.

  2. Click Next on the InstallShield Wizard for SSO Audit Monitor Welcome screen.

    SSO_Monitor_1.png
  3. Click Next on the Destination Folder screen that populates to utilize the default folder for installation or configure to preferred folder and then click Next.

    SSO_Monitor_2.png
  4. The program is ready to install; click Install. Wait for the program to successfully install.

    SSO_Monitor_3.png
  5. Click Finish on the install completion screen.

    SSO_Monitor_4.png

The SSO Audit Monitor is now installed. Proceed with the post-installation procedures to complete setup of the tool.

Setting up the SSO Audit Monitor

To ensure the HealthCast SSO Audit Monitor Reporting Tool is ready to use, follow the proceeding steps to properly set up this tool.

  1. Open PowerShell as Administrator.

  2. Execute the following script: (C:\Program Files (x86)\HealthCast\SSO Audit Monitor\Config\SsoAudit- MonitorSetup.ps1) on the server that will be hosting the SSO Audit Monitor application.

  3. Exit PowerShell

    SSO_Monitor_5.png
  4. Navigate to C: > Program Files (x86) > HealthCast > SSO Audit Monitor > Config and use Notepad to open CreateDb.sql.

  5. On the second line, replace the content of [your_audit_db] with the name of the database to be used and save the file.

    SSO_Monitor_6.png
  6. In SQL Server, navigate to and open the script you just edited. Click Execute to apply the script to the database.

    SSO_Monitor_7.png
  7. Navigate to C: > Program Files (x86) > HealthCast > SSO Audit Monitor and open appsettings.json.

  8. On the "defaultconnection" line, change (localdb) to the name of the server, MSSQLLocalDB to the name of the instance, and database= to the name of the database. Save and close the file.

    SSO_Monitor_8.png
  9. From the Start menu, Run services.msc.

    SSO_Monitor_9.png
  10. Find the entry for HCI SSO Audit Monitor Service, right-click on it, and click File Properties.

  11. On the Log On tab, Select the service account by clicking on Browse....

    SSO_Monitor_11.png
    1. Type in the password.

    2. Click Apply and then, click the OK button.

  12. In a browser, navigate to the URL of the audit reporting website: https://computername:5000.

    SSO_Monitor_12.png
  13. Log in with your system credentials to see the different audit reports available. There is a search functionality within the audit report site which can be used to find users that did an authentication for an EPCS transaction.

The installation and setup of the SSO Audit Monitor is now complete.