The buyer problem: access is no longer the hard part, trust is
If you’re building a patient-facing or provider-facing app, the old question was, “How do we get data out of the EHR?” That question is getting replaced by something harder: “How do we get the right data, for the right patient, with the right permission, across a national exchange framework that is still being operationalized?”
With CommonWell and Carequality converging under TEFCA, app developers now have to think in terms of a broader QHIN-connected universe instead of isolated network relationships. The upside is obvious: more reach, fewer custom point-to-point agreements, and a clearer path to national interoperability. The downside is just as real: identity resolution gets more complicated, consent expectations vary by use case, and your product can break if you hard-code assumptions about where “the patient record” lives.
We’ve built FHIR interfaces and EMR-connected products across enough healthcare environments to know the pattern: the technical team usually underestimates the operational complexity and the product team overestimates what “national access” actually means. TEFCA doesn’t remove friction. It relocates it.
What TEFCA changes for FHIR app developers
The biggest shift is that CommonWell and Carequality aren’t just two channels anymore. They are becoming part of a broader Trust Framework and Common Agreement model that changes how data is requested, authorized, and routed. For app developers, that means your architecture has to handle three layers at once: the app layer, the exchange layer, and the trust/identity layer.
This matters because the patient access problem is not only a standards issue. It’s a product issue. If your app is doing patient matching, record aggregation, or longitudinal retrieval, you have to plan for coverage gaps, duplicate identities, source-specific response shapes, and policy enforcement that can differ by participant and by use case.
AST’s view from the field
When our team built clinical software for a network spanning 160+ respiratory care facilities, the biggest lesson was simple: data access is easy to demo and hard to operationalize. The friction was never just “can we get the chart?” It was “can we get the right chart, reliably, in a workflow a clinician will trust?”
We see the same pattern in interoperability work. The teams that succeed aren’t the ones chasing every new endpoint. They’re the ones that design a resilient data acquisition layer and then keep the rest of the product calm when the exchange layer behaves like healthcare does: inconsistently.
Common architectural approaches for TEFCA-era patient access
There are four patterns we keep seeing. None is universally right. The right choice depends on whether you’re building a consumer app, a provider workflow tool, a platform product, or a data aggregation service.
| Approach | Strength | Tradeoff |
|---|---|---|
| Direct TEFCA/QHIN integration | ✓ Most aligned with national exchange direction | ✗ Highest operational and legal complexity |
| Aggregator via network partner | ✓ Faster to market, fewer contracts | ✗ Less control over routing and identity logic |
| Hybrid access layer with fallback sources | ✓ Resilient to incomplete matches and partial data | ✗ More engineering upfront |
| Source-specific EHR connectors only | ✓ Predictable for a narrow customer base | ✗ Poor national scale and brittle expansion path |
1) Direct TEFCA/QHIN integration. This is the most future-aligned path if your product depends on broad patient record retrieval. You’ll need a routing layer that can handle QHIN participation, patient discovery, response normalization, and tight audit controls. In practice, this means more legal and operational overhead, but less strategic dependence on a single partner.
2) Network partner aggregator. This is the fastest path for teams that need to launch without building exchange infrastructure from scratch. The partner handles some of the complexity, but you need to understand what is abstracted away. If the partner’s normalization layer is opaque, your app can inherit quality issues you can’t troubleshoot.
3) Hybrid access layer with fallback sources. This is usually the strongest architecture for serious products. Use TEFCA-connected access as the primary channel, but keep source-specific connectors or alternate retrieval paths for gaps, failures, or facilities not yet reachable through the same route. That gives you a graceful degradation model instead of a broken search screen.
4) Source-specific EHR connectors only. This still works for narrow workflows and single-customer deployments. But if you expect national scale, this becomes technical debt fast. You end up rebuilding identity and consent logic in every connector, which is exactly what TEFCA is trying to reduce.
Designing patient access for the new identity layer
The phrase “one national patient identity framework” sounds simpler than it is. What it really means is that app developers need an identity strategy that can tolerate ambiguity. You need to think about deterministic matching, probabilistic matching, and user-mediated confirmation as separate tools, not one magic algorithm.
For FHIR R4 app developers, the practical architecture usually includes:
- A patient discovery service that supports multi-key lookup and confidence scoring.
- A canonical identity record that stores source provenance, not just the latest match.
- A consent-aware access layer that returns explicit denial, partial success, or deferred authorization states.
- An audit/event log that captures who requested what, when, from which source, and under which policy boundary.
That last item matters more than teams admit. TEFCA-era access is not just about retrieval; it’s about proving that retrieval happened correctly. If your app is going into provider workflows or consumer-access scenarios, the audit trail becomes part of the product, not a compliance afterthought.
Decision framework: what to build first
- Map your access use case. Determine whether you are supporting patient-directed access, provider-mediated retrieval, care coordination, or data aggregation. TEFCA implications differ by workflow.
- Define your identity strategy. Decide how you will handle exact matches, probable matches, and unmatched records. Do not hide ambiguity behind UI polish.
- Choose your exchange model. Direct integration, partner aggregation, or hybrid architecture are valid options. Pick based on speed to market versus long-term control.
- Build consent and audit as first-class services. Policy enforcement must sit in the request path, not in spreadsheets or manual ops processes.
- Instrument the failure modes. Measure match rate, retrieval success, source latency, denial reasons, and normalization errors. If you can’t see the failure, you can’t improve the product.
Why AST builds TEFCA-ready FHIR architecture differently
Our team does not treat interoperability as a one-off integration sprint. We treat it as platform engineering. That means the pod includes backend, QA, and DevOps from day one, because the failure modes here are usually cross-functional: a match algorithm that works in staging, a consent rule that fails in prod, or an audit log that no one can reconstruct under pressure.
AST has spent 8+ years in US healthcare IT building clinical software, EMR-connected products, and HIPAA-compliant infrastructure. We’ve worked across Epic, Cerner, and PointClickCare integration patterns, and the pattern is always the same: healthcare systems do not reward assumptions. They reward clear contracts, explicit state, and boring reliability.
If you are building a TEFCA-aware patient access app, the winning architecture is usually not the fanciest one. It’s the one that can survive partial data, inconsistent identity, policy changes, and real-world ops without forcing your product team to rewrite core flows every quarter.
FAQ
Need a TEFCA-ready patient access architecture?
If you are deciding between direct exchange, a network partner, or a hybrid FHIR architecture, our team can help you map the real tradeoffs before you lock in the wrong model. Book a free 15-minute discovery call — no pitch, just straight answers from engineers who have done this.


