For technical buyers · 5 min read

Where does Valyd fit in your stack?

Pick what you need to verify. We'll show the integration path, real effort estimates, and exactly what your team owns versus what we handle.

The 60-second answer

3 paths
SSO, OIDC, MCP — pick one or combine
0.5–2 days
First integration shipped, end-to-end
Standards-only
OAuth 2.0, OIDC, MCP — no proprietary SDK lock-in
Modular
Start with one workflow. Expand without re-platforming.

Pick your path

Most healthcare orgs start with one of these. You can run all four side-by-side once the first is live.

Where you don't need us

Honest scope: Valyd is identity, verification, and authorization. It is not these things, and we'll tell you upfront.

CapabilityValyd does thisYou'll need elsewhere
Verify a clinician's identity at login✓ Yes
Check a license is current at point of care✓ Yes
Require human approval before AI acts✓ Yes
Audit who did what, when, with proof✓ Yes
Patient EHR storageNoYour EHR vendor
Clinical decision support logicNoYour CDS layer
HIPAA-compliant infrastructure hostingNoYour cloud (we run inside it via API)
HR / credentialing source-of-truthNoWe verify against it, don't replace it

What every integration looks like

All four paths share the same five-step shape. Once you've done one, the rest are variations on the same flow.

Your app Valyd User / device Audit log 1. trigger verification 2. challenge user (face, consent) 3. biometric proof returned 4. APPROVED + signed receipt 5. immutable log entry

What your team actually does

Realistic effort, not marketing math. Numbers assume one familiar dev, no surprises.

PathFirst integrationPer workflow afterSecurity review
SSO sign-in~30 min~10 minStandard OAuth review
OIDC enterprise~1 hourConfig-onlyExisting SSO review
MCP approval~2 hoursAdd tool to agentWebhook + agent policy
Step-up verify~3 hours~1 hour per actionAction-binding review

Ready to scope this against your stack?

30-minute architecture call. We'll map your integration in a shared doc you keep.