System jHIS™ Login

jHIS™ Login

To use the application, launch the browser, in the address bar enter the address and go to the entered address. Then you see the login page to the system jHIS™.

Access to the application requires an individual login username and password. Logins and passwords are given by system administrator. After entering the login and password and click "log" one of the following pages is displayed:

  • re-login page with information about the incorrect login username / password (this means that you made a mistake when entering username / password - in this case, enter the correct username and password and then click "login")
  • ponownie strona logowania z informacją że użytkownik jest zablokowany (oznacza to, że administrator zablokował użytkownikowi dostęp do systemu)
  • form of change the password if the user's password has been changed more than 30 days ago (in this case, enter in the form of your current password and twice repeated new password, which you want to use, and then confirm by pressing the button- then the password will be changed and you can log in to application with the new password, the new password must fulfill the following requirements of security policy: it must be at least 8 characters, must contain lowercase and uppercase letters and numbers or special characters, must be different from the most recently used passwords at least by three characters, must be different from each of the three most recently used passwords by at least one character)
  • home page of application specific to the logging user if the log was properly

Homepage of application includes:

  • header repeated on each side of the system, and in it:
    • system’s logo - click on the logo takes you to the user’s homepage (regardless of the page the user is currently in when he clicks on the logo)
    • menu allowing access to each system’s functionality
    • links to language versions enables switching between different language versions of the user’s interface
    • user’s login
    • icon of access to the Nemo-Q queuing system (if the jHIS system has been integrated with the Nemo-Q queuing system)
    • icon of warnings of impending expiration date of password to the accounts of the eWUŚ
    • a blinking warning icon about the impending expiration date of WSS and TLS certificates used for communication with P1 platform (by default, two weeks before the expiry of the certificate validity)
    • icon of messages - only if there are messages addressed to the user
    • timer counting down the time remaining to the end of the session - only if the system has an automatic session expiration time set; it should be borne in mind that the user may have several tabs with various functionalities of the jHIS system open at the same time in the browser, and the countdown time is reliable only in the active tab
    • link that allows logging out of applications
  • content specific to the logged user
    • list of cautions about ending of expiry dates of vaccines if user has privilege to be warned about ending of expiry dates of vaccines and if there exist expiring vaccines and/or list of cautions about ending of means for bailouts if such a situation takes place
    • logged user start page or empty page if logged user does not have start page defined
  • footer repeating on each side of the system, and in it:
    • system’s name and version - click on the name of the system opens a window with information about the changes introduced in previous versions of the system
    • link to jHDR™ medicinal product repository
    • logo of jPALIO™ technology – if you click on the logo in a new window / tab, the browser will open the software manufacturer's website

The application consists of the following functional modules whose names are corresponding to the positions of menu:

  • Account
  • Administration
  • Registration
  • Staff
  • Visits
  • Surgery
  • NHF
  • Hospital
  • CTC

The "Account" module is available for every logged user, regardless of their permissions. The availability of other modules for registered users is dependent on its permissions.