Skip to content
PryzmaTechPRYZMATECH

Pryzma Connect

Claude Code is the interface.

Connect your EHR, your analytics pipeline, your HIE — any data source. No web forms. No configuration portals. One person with Claude Code manages what used to require an integration team.

Why

One platform. Every data source.

Whether you're connecting a single EHR or onboarding an entire health information exchange — one operator with Pryzma Connect does what used to require a dedicated integration team.

Traditional Integration

  • Custom integration UI for every EHR and data source
  • Separate portals for EHR ops, HIE feeds, and cloud pipelines
  • Training documentation for each interface
  • Support tickets for every configuration change
  • Months of development per new connector

Pryzma Connect

  • One interface for EHR, HIE, cloud, and analytics connections
  • Natural language configuration — ask, don't click
  • Claude discovers available connectors dynamically
  • Full audit trail, role-based access at every layer
  • One person scales from a single EHR to an entire exchange

How It Works

Natural language. Real commands.

Setup

User: "Set up an Epic FHIR connection for Regional Medical"

$ pryzma connector add --type epic_fhir

Connector created (PENDING approval)

Monitoring

User: "Are all our interfaces healthy?"

$ pryzma connector list

$ pryzma connector status

3 ACTIVE, 1 DEGRADED, 1 PENDING

Diagnostics

User: "The Cerner SFTP connection stopped working"

$ pryzma connector logs

$ pryzma connector test

$ pryzma org diagnostic

TLS certificate expired 2026-02-23

Architecture

The CLI is the permission boundary

Operator + Claude Code

  • CLAUDE.md scopes available commands
  • .claude/settings.json enforces Bash(pryzma *) only
  • File edits, curl, git, arbitrary Python all blocked

Pryzma API — The Permission Boundary

  • Role enforcement: hie < staff < admin
  • Every call audited to cli_audit_log
  • Client-side fast reject + server-side canonical check

Pryzma Engine (private)

  • BigQuery, Lambda pipelines, anomaly detection
  • Completely invisible to CLI users
  • Source code never exposed

Role Tiers

hie

HIE Operations

Configure connectors, view member org data, run diagnostics

staff

Pryzma Support

Approve/reject connectors, system health, escalation

admin

Pryzma Engineering

Key management, org provisioning, crosswalk, audit

Connectors

Connect to any data source

EHR Systems

Epic Interconnect

epic_fhir

OAuth 2.0FHIR R4

Oracle Health (Cerner)

cerner_sftp

SSH KeyHL7 v2.x

athenahealth

athena_fhir

OAuth 2.0FHIR R4

MEDITECH

meditech_sftp

SSH KeyHL7 / CSV

NextGen Healthcare

nextgen_fhir

OAuth 2.0FHIR R4 / HL7

Qualifacts CareLogic

qualifacts_carelogic

API KeyJSON / CSV

Credible (Qualifacts)

credible_bh

API KeyJSON / CSV

Streamline Healthcare

streamline_hc

API Key / SFTPHL7 / CSV

Echo & Legacy EHR

legacy_ehr

SFTP / Direct DBHL7 / CSV / Fixed-width

HIE Platforms & Networks

Orion Health (Rhapsody)

orion_health

OAuth 2.0 / TLSFHIR / CDA

InterSystems HealthShare

intersystems

OAuth 2.0FHIR R4 / HL7

IMAT (Audacious Inquiry)

imat

Mutual TLSCCD / ADT

Zen Healthcare IT

zen_hcit

Mutual TLSHL7 / CDA

Smile Digital Health (Smile CDR)

smile_cdr

OAuth 2.0FHIR R4

CommonWell Health Alliance

commonwell

Mutual TLSCCD / FHIR

Carequality

carequality

Mutual TLSC-CDA / XCA

eHealth Exchange

ehealth_exchange

SAML / Mutual TLSC-CDA / XCA

PCDH / State HIEs

pcdh_hie

Mutual TLSCCD / ADT

Integration Engines

NextGen Connect (Mirth)

hl7_mirth

TLS CertHL7 ADT/ORU

Rhapsody Integration Engine

rhapsody_engine

TLS CertHL7 / FHIR

Any SFTP Server

sftp_generic

SSH KeyCSV / Flat file

Cloud Services

AWS S3

aws_s3

IAM / Access KeyAny (S3 objects)

Google Cloud Platform

gcp_storage

Service AccountGCS / BigQuery

Microsoft Azure

azure_blob

Service PrincipalBlob / FHIR Server

AI & Analytics

Google Gemini

gemini

API Key / OAuthMulti-modal

Google Vertex AI

vertex_ai

Service AccountML Pipelines

Google NotebookLM

notebooklm

OAuth 2.0Documents / Audio

Business Platforms

Zoho CRM

zoho_crm

OAuth 2.0JSON

Zoho Desk

zoho_desk

OAuth 2.0JSON

Zoho Books

zoho_books

OAuth 2.0JSON

Monday.com

monday_com

API TokenJSON (GraphQL)

Microsoft Power BI

powerbi

Service PrincipalREST / OData

Google Drive

google_drive

OAuth 2.0Docs / Sheets / Files

New connector types added server-side — Claude discovers them dynamically.

Security

Trust architecture

API Key Auth

SHA-256 hashed, role-prefixed keys, shown once at creation. No plaintext ever persisted.

Credential Vault

Connector secrets stored in GCP Secret Manager. Never in config tables — only reference names.

Full Audit Trail

Every CLI op logged with timestamp, key, role, command, and result. Queryable by admins.

Claude Sandboxing

.claude/settings.json blocks everything except pryzma *. No file edits, no curl, no escape.

Ready?

Connect faster. Scale instantly.

New data sources onboarded in minutes, not months. Natural language configuration with full audit trails and role-based security at every layer.