Person or Entity Authentication
The HIPAA Security Rule’s Person or Entity Authentication requirement means you must have procedures that verify every user or system accessing ePHI is truly who (or what) it claims to be. Operationally, that means defined authentication standards, consistent technical enforcement across systems, and auditable proof that accounts, credentials, and integrations are issued and used under controlled identity checks. 1
Key takeaways:
- You need documented procedures plus technical enforcement that ties identity proofing to account issuance and login behavior for ePHI systems. 1
- “Entity authentication” covers integrations, service accounts, APIs, and third-party connections, not just workforce logins. 1
- Auditors look for consistency: one-off exceptions, shared accounts, and unmanaged service credentials are common failure points. 1
Person or Entity Authentication is one of the HIPAA Security Rule’s Technical Safeguards requirements. The text is short, but the operational surface area is large because “seeking access to ePHI” includes employees, clinicians, contractors, third-party support, cloud administrators, EHR integrations, interfaces, batch jobs, and devices that connect to systems storing or transmitting ePHI. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to compliance is to treat this as an access path inventory plus an authentication standard: identify every place ePHI can be accessed, define how identity is verified for each access path, and then prove the controls are implemented consistently. Your deliverables are not only policy language; you need system configurations, logs, access records, and exception handling that show the “one claimed” requirement is met in practice. 1
This page translates the requirement into concrete steps, evidence to retain, and the exam questions you should be ready to answer. It focuses on making the control real across workforce and third-party access, including non-human access like service accounts and integrations. 1
Regulatory text
Requirement (45 CFR § 164.312(d)): “Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.” 1
Operator interpretation (what you must do):
- You must define and follow procedures that verify identity at the point access is granted to ePHI systems and each time access is requested (authentication at login or session establishment). 1
- “Person” includes members of the workforce and any other human users with access. “Entity” includes systems, applications, devices, and integrations that access ePHI. 1
- The rule is technology-neutral. It does not prescribe a specific mechanism, but you must be able to demonstrate that your chosen mechanisms reliably verify claimed identity for the risk and context. 1
Plain-English requirement
If someone (or something) tries to access ePHI, your organization must be able to prove that the identity behind that access request is legitimate. In practice, this means you control how accounts are created, how credentials are issued, what authentication methods are allowed, and how you detect and respond to suspicious or invalid authentication activity. 1
Who it applies to (and where it shows up operationally)
Applies to:
- Covered Entities and Business Associates that create, receive, maintain, or transmit ePHI. 1
Operational contexts (where auditors will test you):
- Workforce access: EHR/EMR, billing, imaging, care management, secure messaging, HR systems that contain ePHI, data warehouses containing clinical datasets. 1
- Privileged/admin access: system administrators, cloud console access, database admins, IT support tooling that can reach ePHI systems. 1
- Third-party access: outsourced billing, hosted EHR support, call centers, MSPs, data analytics providers, interface engine support. 1
- Non-human access (“entities”): service accounts, API clients, HL7/FHIR interfaces, batch jobs, ETL pipelines, RPA bots, device-to-system authentication. 1
What you actually need to do (step-by-step)
1) Map every access path to ePHI
Create (or refresh) an inventory of:
- Systems that store/transmit ePHI.
- User populations (workforce roles, contractors, third parties).
- Authentication entry points (SSO, local login, VPN, API keys, certificates, shared mailbox access, EDI connections, remote support channels). 1
Output: “ePHI Access Path Register” with system owner, auth method, and whether the access is human or non-human. 1
2) Set an authentication standard by access type
Write an Authentication Standard that, at minimum, defines:
- Approved identity sources (HR feed, IAM directory, partner identity, device identity).
- Rules for unique user IDs vs. shared accounts (shared accounts should be prohibited or tightly controlled with documented exceptions).
- Requirements for privileged access, remote access, and third-party access.
- Requirements for “entity” credentials (service accounts, API credentials): issuance, storage, rotation, and ownership. 1
Keep it implementable: a table works better than prose. Example structure:
- Access type → required auth method → required approvals → logging requirements → recertification/attestation trigger. 1
3) Tie identity proofing to account provisioning
Auditors often focus on how you know “John Smith” is John Smith when the account is created, not only at login.
Minimum operational steps:
- Require a documented request and approval for new access to ePHI systems.
- Validate the requester’s identity through your authoritative process (e.g., HR onboarding for employees, contract/statement of work and sponsor verification for contractors/third parties).
- Bind the identity to a unique account in your IAM/directory and enforce naming conventions.
- For third parties, ensure access is issued to an individual identity (or documented, controlled “entity” identity), owned by a sponsor at your organization. 1
4) Enforce authentication technically across systems
Your written procedure must match system reality.
Operational checklist:
- Centralize authentication where feasible (SSO/IAM) for ePHI systems to reduce drift.
- Disable local accounts or document why they cannot be disabled and how they are controlled.
- Implement strong controls for privileged accounts (separate admin accounts, restricted login paths, tight membership management).
- For integrations and service accounts:
- Assign a business owner.
- Store credentials in an approved secret store.
- Restrict scope/permissions to minimum needed.
- Monitor usage patterns and failures.
- Remove credentials when the integration is decommissioned. 1
5) Monitor, detect, and respond to authentication anomalies
Authentication is also an operational signal.
Define:
- What logs you collect (SSO logs, system auth logs, VPN logs, API gateway logs).
- Who reviews them, how often, and what constitutes an actionable event.
- Response steps for suspected compromised credentials (disable account, reset credentials, review access, document incident handling). 1
6) Run periodic access reviews focused on authentication exceptions
You are looking for:
- Dormant accounts still enabled.
- Shared accounts.
- Service accounts with unknown owners.
- Direct logins bypassing your standard control.
- Third-party accounts with expired contracts. 1
A practical tactic: maintain an “exceptions register” for anything that deviates from your authentication standard, with compensating controls and an owner/date for remediation. 1
Required evidence and artifacts to retain
Keep evidence that proves both design (procedures exist) and operation (controls run).
Policy and procedure artifacts
- Authentication Standard (by access type, including “entity” access). 1
- Account provisioning procedure, including identity verification steps. 1
- Third-party access procedure (sponsorship, approvals, termination triggers). 1
Technical configuration evidence
- IAM/SSO configuration exports or screenshots showing required methods and system coverage. 1
- Privileged access group membership reports and change history. 1
- Service account inventory with owners, purpose, permissions, and secret storage location. 1
Operational records
- Samples of access requests and approvals tied to named identities and roles. 1
- Access review/recertification results and remediation tickets. 1
- Authentication logs and alert triage records (showing investigation and closure). 1
- Offboarding/termination evidence (accounts disabled promptly per your procedure). 1
Tip for audits: keep a “walkthrough packet” per major ePHI system with the above items. It reduces scramble and keeps answers consistent.
Common exam/audit questions and hangups
Expect questions like:
- “Show me how a new user gets access to the EHR. Where is identity verified?” 1
- “List all ways a third party can access ePHI and show the authentication method for each.” 1
- “Do you have shared accounts? If yes, why, and what compensating controls exist?” 1
- “How do you authenticate service accounts and integrations? Who owns them?” 1
- “Provide evidence of monitoring for repeated failed logins or suspicious access.” 1
Hangups that stall audits:
- Inconsistent authentication across systems (SSO for some, local passwords for others) with no exception documentation.
- No single inventory of service accounts, API keys, or certificates that access ePHI.
Frequent implementation mistakes (and how to avoid them)
-
Treating authentication as “password policy only.”
Fix: cover identity proofing, provisioning, and non-human identities in the same standard. 1 -
Ignoring “entity” authentication.
Fix: inventory integrations and service accounts, assign owners, document issuance and credential controls. 1 -
Allowing shared or generic accounts without guardrails.
Fix: prohibit by default; if unavoidable, document sponsor, purpose, access limits, and monitoring, then track remediation to eliminate them. 1 -
Third-party remote support shortcuts.
Fix: require named accounts for third-party personnel, sponsor approvals, and termination when the engagement ends. 1 -
No evidence package.
Fix: pre-assemble system-level walkthrough packets and keep samples current. Tools like Daydream can help centralize evidence collection and keep an exception register tied to control owners, so audits become retrieval, not reconstruction.
Enforcement context and risk implications
The regulation’s risk is straightforward: weak authentication allows unauthorized access to ePHI, which drives confidentiality and integrity failures. Your operational goal is defensible identity verification across all entry points, especially third-party and non-human access paths that often escape standard IAM governance. 1
Practical execution plan (30/60/90-day)
First 30 days (stabilize and inventory)
- Build the ePHI Access Path Register.
- Identify high-risk exceptions: shared accounts, unknown service account owners, unmanaged third-party access paths.
- Draft the Authentication Standard table and get system owner buy-in.
Next 60 days (implement and align)
- Expand SSO/IAM coverage for top ePHI systems where feasible.
- Stand up a service account governance process: ownership, secret storage, and approval workflow.
- Implement consistent onboarding/offboarding controls for workforce and third parties, including sponsor validation.
By 90 days (prove operation)
- Run an access review focused on authentication exceptions and remediate findings.
- Assemble audit packets for each major ePHI system with policy, configs, and operational samples.
- Operationalize monitoring and incident response playbooks for authentication anomalies, and retain investigation records.
Frequently Asked Questions
Does HIPAA require multi-factor authentication (MFA) for Person or Entity Authentication?
45 CFR § 164.312(d) requires procedures to verify identity but does not specify a particular technology. Choose authentication methods that reliably verify identity for each access path and document why they fit your environment. 1
What counts as an “entity” that needs authentication?
Any non-human actor that accesses ePHI qualifies, such as service accounts, APIs, integrations, interface engines, and devices. You need procedures that tie those credentials to an approved owner and purpose. 1
Are shared accounts automatically a HIPAA violation?
The rule does not explicitly ban shared accounts, but shared credentials make it hard to verify “the one claimed” and to prove accountability. If you have them, document the exception, add compensating controls, and plan elimination. 1
How should we handle third-party access for support or troubleshooting?
Require sponsored, individually assigned accounts for third-party personnel where possible, and limit access duration and scope to the engagement. Keep approvals, access logs, and termination evidence. 1
What evidence is most persuasive in an audit?
Auditors respond well to a per-system walkthrough: authentication architecture, config evidence, sample access requests/approvals, service account inventory, and recent access review outputs. The goal is to show the procedure is implemented consistently. 1
We can’t put one legacy system behind SSO yet. How do we stay compliant?
Document it as an exception, tighten local authentication controls, restrict network access, and increase monitoring around that system. Track a remediation plan with an owner so the exception does not become permanent by default. 1
Footnotes
Frequently Asked Questions
Does HIPAA require multi-factor authentication (MFA) for Person or Entity Authentication?
45 CFR § 164.312(d) requires procedures to verify identity but does not specify a particular technology. Choose authentication methods that reliably verify identity for each access path and document why they fit your environment. (Source: 45 CFR Parts 160, 162, 164)
What counts as an “entity” that needs authentication?
Any non-human actor that accesses ePHI qualifies, such as service accounts, APIs, integrations, interface engines, and devices. You need procedures that tie those credentials to an approved owner and purpose. (Source: 45 CFR Parts 160, 162, 164)
Are shared accounts automatically a HIPAA violation?
The rule does not explicitly ban shared accounts, but shared credentials make it hard to verify “the one claimed” and to prove accountability. If you have them, document the exception, add compensating controls, and plan elimination. (Source: 45 CFR Parts 160, 162, 164)
How should we handle third-party access for support or troubleshooting?
Require sponsored, individually assigned accounts for third-party personnel where possible, and limit access duration and scope to the engagement. Keep approvals, access logs, and termination evidence. (Source: 45 CFR Parts 160, 162, 164)
What evidence is most persuasive in an audit?
Auditors respond well to a per-system walkthrough: authentication architecture, config evidence, sample access requests/approvals, service account inventory, and recent access review outputs. The goal is to show the procedure is implemented consistently. (Source: 45 CFR Parts 160, 162, 164)
We can’t put one legacy system behind SSO yet. How do we stay compliant?
Document it as an exception, tighten local authentication controls, restrict network access, and increase monitoring around that system. Track a remediation plan with an owner so the exception does not become permanent by default. (Source: 45 CFR Parts 160, 162, 164)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream