ONC
Documentation per 45 CFR § 170.315(d)(13)
4D EMR Version 6.0 — 4th Dimension EMR, Inc.
4D EMR Version 6.0 implements multi-factor authentication (MFA) to provide an additional layer of security beyond traditional username and password credentials. MFA requires users to verify their identity using a second authentication factor before accessing protected health information within the system.
This documentation describes the MFA capabilities, configuration options, enrollment process, and authentication workflow as required by 45 CFR § 170.315(d)(13).
4D EMR uses Time-based One-Time Password (TOTP) as the multi-factor authentication method, conforming to RFC 6238. TOTP generates a unique six-digit verification code that changes every 30 seconds, based on a shared secret key and the current time.
Users authenticate with a TOTP-compatible authenticator application installed on their mobile device or computer. Supported authenticator applications include:
Additionally, Twilio SendGrid is integrated as a communication service to deliver email-based MFA verification codes for users who require an alternative to authenticator applications.
4D EMR provides flexible MFA configuration to accommodate different practice security requirements. MFA can be managed at both the administrative and individual user levels.
Practice administrators can configure MFA policies for staff members through Practice > Settings > Staff Management:
| Setting | Description |
|---|---|
| Two-Factor Authentication Required | When enabled, the selected user must configure and use MFA to access 4D EMR. The user will be prompted to enroll in MFA upon their next login and cannot bypass the enrollment step. |
| Reset Two-Factor Authentication | Allows an administrator to reset a user's MFA enrollment, clearing their stored TOTP secret. The user will need to re-enroll with a new authenticator setup on their next login. |
Individual users can manage their own MFA settings through the Account Security section of their user profile:
| Setting | Description |
|---|---|
| Enable Two-Factor Authentication | Users can voluntarily enable MFA for their own account, even if it is not required by their administrator. |
| Disable Two-Factor Authentication | Users can disable MFA for their account, unless the administrator has set MFA as required for their role. |
The following steps describe how a user enrolls in multi-factor authentication within 4D EMR:
The user navigates to their Account Security settings and clicks Enable to begin the two-factor authentication setup process.
The system generates a unique TOTP secret key for the user. This secret is used to produce the time-based one-time passwords. The secret is presented in two formats:
The user opens their preferred authenticator application and either scans the QR code or enters the manual key. The authenticator application will then begin generating six-digit verification codes for the 4D EMR account.
To confirm that the authenticator is correctly configured, the user enters the current six-digit code displayed by their authenticator application into the verification field. The system validates the code against the stored secret to confirm a successful enrollment.
Upon successful code verification, MFA is activated for the user's account. All subsequent logins will require both the user's password and a valid TOTP code.
Once MFA is enabled, the login process follows this sequence:
The user navigates to the 4D EMR login page and enters their username and password. The system validates these credentials against the stored identity using ASP.NET Identity. If the credentials are invalid, the login attempt is rejected.
Upon successful credential validation, the system detects that MFA is enabled for the account and redirects the user to the Verify Code page. The user opens their authenticator application and enters the current six-digit code. The system validates the code using the TOTP algorithm (RFC 6238) against the user's stored secret key and the current time window.
If the TOTP code is valid, the user is fully authenticated and granted access to 4D EMR with all privileges associated with their role. If the code is invalid, the user is prompted to try again.
| Component | Detail |
|---|---|
| MFA Standard | Time-based One-Time Password (TOTP) per RFC 6238 |
| Code Length | 6 digits |
| Time Step | 30 seconds |
| Identity Framework | ASP.NET Identity with custom TOTP token provider |
| TOTP Provider | AspnetTotpTokenProvider (custom implementation) |
| QR Code Generation | Net.Codecrete.QrCodeGenerator library (SVG output) |
| Secret Storage | Encrypted in the application database (ApplicationUser.TotpSecret) |
| Email Delivery | Twilio SendGrid for email-based MFA code delivery |
| Transport Security | All MFA communications secured via TLS 1.2/1.3 (HTTPS) |
The 4D EMR multi-factor authentication implementation satisfies the requirements of 45 CFR § 170.315(d)(13), which states that a Health IT Module must support multi-factor authentication for users with access to electronic health information. Specifically:
4th Dimension EMR, Inc.
10300 W Charleston Blvd, Suite 13-146, Las Vegas, NV 89135
Phone: (844) 878-2434
Email: support@4d-emr.com
Website: https://4d-emr.com
Get the latest news from 4D EMR
© 2022-2026 4th Dimension EMR Inc