Setting up an Identity Server to support Single Sign On raises accessibility and enables future medical product integrations


Abbott Park, IL

Enterprise Architecture
Legacy System Modernization

Identity Server
Azure DevOps
Component Space SAML 2.0


The story

Our client is a multinational medical devices company that supports medical providers and other institutions with a wide variety of product offerings. As they partner with more and more customers, they have been looking for a way to streamline their digital offerings and provide exceptional user experiences.

One of the company’s most successful products is a widely adopted occupational drug screening management solution. They wanted to upgrade the product with Federated Identity Management (FIM) login support to enable users to access features via Single Sign On (SSO). We partnered with their team to set up the Identity Server and build a singular system that users could leverage in multiple scenarios, with the goal of enabling ongoing integration with more products, with less user management overhead.


  •  The client’s drug screening management product didn’t support Single Sign On (SSO), instead relying on manual user administration in a proprietary account system ​
  • The existing application had been built over many years, and adding SSO would be a complex undertaking
  • The client’s technical team members were responsible for different pieces of the product, but none were familiar with SSO implementation strategies
  • Various usage scenarios were presenting challenges to implementation based on the user’s access patterns and clinic workspace configurations
  • Their team needed guidance in visioning what the end-product should look like, balancing a simple goal with many real world complexities


  • Worked with the team to develop multiple infrastructure solutions until the final Identity Server-based implementation was agreed upon
  • Worked closely with client testers, taking a methodical approach to assessing the many interactions and connections between the application and Identity Server for SSO support
  • Consistently communicated with the client and embedded ourselves in development discussions to make sure we understood the goals of all team members
  • Iterated on every possible way a user might interact with the system, exposing unusual user flows and implementing best-practice routing and error handling


  • Identity Server has been successfully integrated into the application and supports partner SSO systems​
  • We’ve begun work on a second project that will leverage this FIM system to streamline user management
  • Working through multiple infrastructure solutions has provided the client with the greatest amount of flexibility for future expansion

Let's work together. Connect with us today.