Skip to content
PryzmaTechPRYZMATECH

Pryzma Connect

Claude Code is the interface.

No web forms. No configuration portals. No OAuth wizards. Your integration team talks to Claude — and Claude configures the connection.

Why

Integration without the UI

Traditional Integration

  • Custom UI for every connector type
  • Organization-specific configuration portals
  • Training documentation for each interface
  • Support ticketing for config issues
  • Months of development per new connector

Pryzma Connect

  • One CLI tool — Claude Code is the UX
  • Natural language configuration
  • Claude discovers connector types dynamically
  • Full audit trail, role-based access at every layer
  • New connector type = one database row

How It Works

Natural language. Real commands.

Setup

User: "Set up an Epic FHIR connection for Regional Medical"

$ pryzma connector add --type epic_fhir

Connector created (PENDING approval)

Monitoring

User: "Are all our interfaces healthy?"

$ pryzma connector list

$ pryzma connector status

3 ACTIVE, 1 DEGRADED, 1 PENDING

Diagnostics

User: "The Cerner SFTP connection stopped working"

$ pryzma connector logs

$ pryzma connector test

$ pryzma org diagnostic

TLS certificate expired 2026-02-23

Architecture

The CLI is the permission boundary

Operator + Claude Code

  • CLAUDE.md scopes available commands
  • .claude/settings.json enforces Bash(pryzma *) only
  • File edits, curl, git, arbitrary Python all blocked

Pryzma API — The Permission Boundary

  • Role enforcement: hie < staff < admin
  • Every call audited to cli_audit_log
  • Client-side fast reject + server-side canonical check

Pryzma Engine (private)

  • BigQuery, Lambda pipelines, anomaly detection
  • Completely invisible to CLI users
  • Source code never exposed

Role Tiers

hie

HIE Operations

Configure connectors, view member org data, run diagnostics

staff

Pryzma Support

Approve/reject connectors, system health, escalation

admin

Pryzma Engineering

Key management, org provisioning, crosswalk, audit

Connectors

Connect to any data source

EHR Systems

Epic Interconnect

epic_fhir

OAuth 2.0FHIR R4

Oracle Health (Cerner)

cerner_sftp

SSH KeyHL7 v2.x

athenahealth

athena_fhir

OAuth 2.0FHIR R4

MEDITECH

meditech_sftp

SSH KeyHL7 / CSV

NextGen Healthcare

nextgen_fhir

OAuth 2.0FHIR R4 / HL7

Qualifacts CareLogic

qualifacts_carelogic

API KeyJSON / CSV

Credible (Qualifacts)

credible_bh

API KeyJSON / CSV

Streamline Healthcare

streamline_hc

API Key / SFTPHL7 / CSV

Echo EHR

echo_ehr

API KeyJSON / CSV

Kepler

kepler_ehr

FHIR / API KeyFHIR R4 / HL7

Legacy EHR Transform

legacy_ehr

SFTP / Direct DBHL7 / CSV / Fixed-width

HIE Platforms & Networks

Orion Health (Rhapsody)

orion_health

OAuth 2.0 / TLSFHIR / CDA

InterSystems HealthShare

intersystems

OAuth 2.0FHIR R4 / HL7

IMAT (Audacious Inquiry)

imat

Mutual TLSCCD / ADT

Zen Healthcare IT

zen_hcit

Mutual TLSHL7 / CDA

Smile Digital Health (Smile CDR)

smile_cdr

OAuth 2.0FHIR R4

CommonWell Health Alliance

commonwell

Mutual TLSCCD / FHIR

Carequality

carequality

Mutual TLSC-CDA / XCA

eHealth Exchange

ehealth_exchange

SAML / Mutual TLSC-CDA / XCA

PCDH / State HIEs

pcdh_hie

Mutual TLSCCD / ADT

Integration Engines

NextGen Connect (Mirth)

hl7_mirth

TLS CertHL7 ADT/ORU

Rhapsody Integration Engine

rhapsody_engine

TLS CertHL7 / FHIR

Any SFTP Server

sftp_generic

SSH KeyCSV / Flat file

Cloud Services

AWS S3

aws_s3

IAM / Access KeyAny (S3 objects)

Google Cloud Platform

gcp_storage

Service AccountGCS / BigQuery

Microsoft Azure

azure_blob

Service PrincipalBlob / FHIR Server

AI & Analytics

Google Gemini

gemini

API Key / OAuthMulti-modal

Google Vertex AI

vertex_ai

Service AccountML Pipelines

Google NotebookLM

notebooklm

OAuth 2.0Documents / Audio

Business Platforms

Zoho CRM

zoho_crm

OAuth 2.0JSON

Zoho Desk

zoho_desk

OAuth 2.0JSON

Zoho Books

zoho_books

OAuth 2.0JSON

Monday.com

monday_com

API TokenJSON (GraphQL)

Microsoft Power BI

powerbi

Service PrincipalREST / OData

Google Drive

google_drive

OAuth 2.0Docs / Sheets / Files

New connector types added server-side — Claude discovers them dynamically.

Security

Trust architecture

API Key Auth

SHA-256 hashed, role-prefixed keys, shown once at creation. No plaintext ever persisted.

Credential Vault

Connector secrets stored in GCP Secret Manager. Never in config tables — only reference names.

Full Audit Trail

Every CLI op logged with timestamp, key, role, command, and result. Queryable by admins.

Claude Sandboxing

.claude/settings.json blocks everything except pryzma *. No file edits, no curl, no escape.

Ready?

Replace your integration UI.

The CLI took a day to build. The UX is natural language. Adding a new connector type means adding a row to a database table.