Epic EHR Delivered via VDI and Application Virtualization to Thin/Zero Clients

This configuration is used in settings where there is direct interaction between the patient and the provider. It gives users fast access to the workstation and the Epic EHR:

  • The EHR is not closed on user switch.

  • Other applications, such as web browsers and email, are closed on user switch.

This topic details how each component in the following environment is configured.

Click to enlarge.

In this workflow:

  • The Epic EHR (Epic) is delivered to a shared thin or zero client endpoint (thin client) via an Omnissa Horizon or Citrix DaaS VDI image (virtual desktop).

  • Epic is delivered to the virtual desktop via Citrix DaaS application virtualization.

This type of configuration is also known as a double hop. For a summary of this architecture and Imprivata license requirements, see Epic EHR Delivered via VDI and Citrix to Thin Clients.

Before You Begin

Review the following before you begin:

  • Verify that your thin clients are supported. For more information, see "Endpoint Device Matrix" in the Imprivata Enterprise Access Management Supported Components guide.

  • If you are using both Citrix Virtual Desktops and Citrix Virtual Apps, at least two Delivery Controllers are required.

    One to manage access to the virtual desktop; and the other to manage the delivery of Epic.

Imprivata Enterprise Access Management Configuration

In this section you configure the Imprivata user and computers policies:

  • An Imprivata user policy is the means by which you define authentication methods and rules to a specific group of users.

  • An Imprivata computer policy is the means by which you define security parameters to a specific set of workstations. This workflow requires three computer policies:

    • The first policy is assigned to the shared thin clients.

    • The second policy is assigned to the virtual desktops.

    • The third policy is assigned to the Citrix servers that are delivering Epic.

NOTE:

The following steps detail the required settings to achieve this workflow. For complete details on user and computer policies, see the Imprivata Enterprise Access Management Help.

Thin Client Configuration

In this section, you configure your shared thin client workstations to automatically log into and connect to a persistent virtual desktop using generic workstation–based credentials.

The generic user credentials are only used to log into the workstation.

Virtual Desktop Configuration

In this section, you install the Imprivata agent and configure your virtual desktops to automatically boot and authenticate to Windows using generic workstation–based credentials:

  • The generic credentials are only used to log into the workstation.

    Use the same credentials that were used to configure the thin client connection to the virtual desktop.

  • Citrix Workspace app uses the generic credentials to connect to the Citrix server that is delivering Epic.

  • When the Imprivata agent detects the user switch, the Imprivata user is logged into Epic.

NOTE:

If you are using both Citrix Virtual Desktops and Citrix Virtual Apps, at least two Delivery Controllers are required. One to manage access to the virtual desktop; and the other to manage the delivery of Epic.

Citrix Server Configuration

In this section, you:

  • Install the Imprivata agent on the Citrix servers that are delivering Epic.

    Installing the Imprivata agent enables Imprivata to communicate between the virtual environment and the shared workstations.

  • Install the Imprivata Connector for Epic Hyperdrive.

    Installing the Connector enables Fast User Switching for Epic Hyperdrive.

NOTE:

If you are using both Citrix Virtual Desktops and Citrix Virtual Apps, at least two Delivery Controllers are required. One to manage access to the virtual desktop; and the other to manage the delivery of Epic.

Epic Configuration

In this section, you configure the Imprivata Connector for Epic Hyperdrive.