The HTTP request
Redox will send an HTTP
POST request to an endpoint you have configured in the dashboard.
- Verify the JSON Web Token (JWT) signature using the secret also set up in your endpoint
- Verify that the token is not expired (normally each SSO request will be a new token)
- Respond to the HTTP
POSTin one of two ways:
302response with a redirect to where the user should be directed
200response with html that should be returned to the EHR
Redox will vouch that the SSO request coming to your application are indeed valid, authenticated users. Your application needs to handle a few other security details:
- Validate the token as described above
- Establish a user session via the redirect or HTML method described above
- It may be helpful to review the OWASP Session Cheat Sheet
- Redox can help you design a strategy for getting session information back to the EHR browser, but your application owns the security of the sessions
- Expire the sessions as appropriate.
- The JWT will provide an expiration time, but this may need to be shortened based on your application policies
- Redox may at some point in the future provide a Singe Logout solution, but many EHR vendors do not support it by default
- Don’t use relative URLs. You don’t know what the url the browser will actually be set to when your content is loaded. For example it could be about:blank, or the initial Redox URL. Relative URLs will not redirect to your content in both of those cases.
- Set cookies after you redirect. Cookies are attached to the domain that they are set on, so if your content is inserted into a frame with about:blank, and then you redirect to your URL, the cookie will be inaccessible.