Sign-Up & Onboarding
Secure, invite-only onboarding flows for staff with guided organization setup for administrators.
Staff Onboarding Flow
Security starts at the invitation. Staff cannot self-register; they must be provisioned through the admin-controlled process.
Invitation Phase
Administrators initiate the process by sending secure invitations:
- Email Invitation: Admin selects recipient and sends tokenized invite via secure admin email
- Token Generation: Cryptographically secure, time-limited tokens (24h expiry)
- Role Pre-assignment: Provisional role assignment included in invite
2
Verification Phase
Recipients receive and validate their invitation:
Email Verification: Click secure link to access registration portal
Token Validation: Server-side token verification with expiry checks
Identity Confirmation: Email address ownership verification
3
Credentialing Phase
New users establish their account credentials:
Password Creation: Enforced complexity requirements (12+ chars, mixed case, symbols)
2FA Enrollment: Optional but recommended multi-factor authentication setup
Profile Completion: Required fields including license numbers, department assignments
Compliance Acknowledgment: HIPAA/GDPR compliance agreements
Activation Phase
Final role confirmation and system access:
- Role Finalization: Admin review and approval of assigned permissions
- Access Grant: Automatic provisioning of role-based permissions
- Welcome Sequence: Guided tour and training module recommendations
Administrator Organization Setup
When administrators create new organizations, they follow a structured 5-step wizard that configures the complete digital infrastructure.
3
4
5
Organization Structure
Select your operational model to auto-configure workflows and permissions.
Existing users can link multiple organizations to their account, maintaining separate contexts while sharing authentication credentials.

