Written by Technical Team | Last updated 30.09.2025 | 15 minute read
NHS login has become the standard way to let people in England access digital health and care services securely. If you provide an app or website that needs to verify a patientâs identity and then authenticate them on repeat visits, integrating NHS login can remove friction for users and raise trust with commissioners. It can also avoid the cost and risk of building your own identity stack. Yet NHS login is not a free-for-all: you will need to meet strict eligibility and commissioning criteria, prove your technical and governance maturity, and follow a multi-stage onboarding process before any live traffic flows.
Tl;DR – Want to apply to integrate with NHS Login quickly? Start your NHS Login integration journey on the NHS England website here đ https://digital.nhs.uk/services/nhs-login/nhs-login-for-partners-and-developers/nhs-login-integration-toolkit/apply-for-nhs-login.
Understanding what isâand is notâin scope is half the battle. NHS login verifies and authenticates people; it does not grant clinical privileges or authorise access to a clinicianâs system on its own. It is designed for ongoing authentication, not a one-off grab of GP credentials. It also assumes your service is free at the point of use, is sponsored or commissioned appropriately, and is deployed for users in England. Getting these fundamentals right early will save months later.
This guide explains, in depth, how to check whether your service is eligible, what prerequisites you must satisfy before you apply, and how the end-to-end onboarding works from first enquiry through to go-live. It also covers identity proofing levels, scopes and claims, and offers a practical readiness checklist that teams can use to de-risk the journey.
NHS login is designed for digital services that provide a clear health or social care benefit to people in England. At its simplest, that includes patient-facing apps that surface health information, help people manage conditions, support wellbeing, or connect patients to NHS services. A bedrock requirement is that your service uses NHS login to verify users and authenticate them on repeat visits; it must not rely on NHS login for a single-use identity check and then revert back to private credentials.
Your service must be accessible free of charge to the user at the point they receive it. Normal NHS charges, such as prescription fees, are compatible, but paywalls that gate core functionality are not. Just as important is commissioning: being listed on a procurement framework is not the same as being commissioned or sponsored. You will need a bona fide NHS organisation or a local authority to commission or sponsor your use case. That link anchors your service in the public interest and creates an accountability chain for information governance.
There is also a geographical boundary. NHS login is for services delivered to people in England, and your eligibility will be assessed on that basis. If you serve users registered with GP practices in Englandâor receiving NHS services in Englandâyouâre in scope. If you hope to cater for users primarily outside England, the fit is unlikely to be right.
The simplest predictor of a smooth integration is your readiness across security, privacy, and identity. NHS login is built on modern identity protocols and an explicit risk model aligned to national standards. Before you even open the application form, get aligned on how you will design your sign-in journey, how you will protect tokens, and what personal data you will request and why.
If you offer a native sign-in flow alongside NHS login, the applicable national information standard for authentication and verification comes into play. In practice, that means demonstrating clear identity assurance levels matched to the risk of the transactions you enable, limiting the personal data you collect to what is strictly necessary, and ensuring robust technical controls: TLS everywhere, secure token storage, server-side session management, and appropriate logging with tamper resistance. Your privacy notices, consent mechanisms, and data protection impact assessment should be drafted and owned by named stakeholdersânot written on the fly during onboarding.
Data residency is non-negotiable for many health contexts. You will need to disclose where you host and process data, including sub-processors and failover regions. Expect close scrutiny of any transfers outside the UK. Transfers into the EU/EEA may be considered with appropriate safeguards; transfers beyond the UK and EU/EEA are generally out of scope for live patient data. Multi-region cloud designs should be carefully architected to avoid accidental replication of personal data into non-UK regions, including where observability tools and backups are configured. If you rely on global vendor support arrangements, confirm that diagnostic access is constrained and auditable.
Identity by design matters as much as privacy by design. Your user journey should keep NHS login as the front door for repeat authentication, not as a one-time proofing step. Avoid any pattern that extracts GP system credentials or re-uses them in a way that bypasses NHS login on subsequent visits. If your product integrates with other NHS servicesâsuch as an IM1 Partner-Facing Service (PFS) interface or the PDS FHIR APIâmap those dependencies early. For example, you cannot use a GP surgery information scope within NHS loginâs integration test or live environments until your IM1 route is live (either directly or via an approved third-party connector). Those dependencies are gating items for scopes; building your timeline around them prevents last-minute surprises.
From a protocol perspective, implement OpenID Connect with a conservative security posture: standard code flow with PKCE, nonce checking to mitigate replay, and short-lived tokens. Treat ID tokens as sensitive and never persist them in client-side storage. On the back end, adopt strict audience checks, rotate keys, and monitor token use. Your session model should align with the identity proofing level you request: higher-risk actions merit tighter re-authentication prompts and shorter sessions. Where your app runs on multiple device types (web, iOS, Android), ensure consistent behaviour and shared security expectationsâan uneven experience is a common source of assessment feedback.
Artificial intelligence is increasingly part of product roadmaps, but AI in health contexts needs careful governance. You will be asked to declare any AI use, including third-party models, where they are hosted, and the data they process. If models are trained or fine-tuned on personal data, document your legal basis, explain your safeguards, and show how users can understand the role of automation in outcomes that affect them. Even when AI does not touch personal data directly, be ready to evidence how you prevent leakage of sensitive prompts or outputs to uncontrolled regions or vendors.
Once your prerequisites are in good shape, you will create a developer account and start the digital onboarding flow. Treat this as more than a formality: the quality of your submission sets the tone for the evaluation. Provide a clear, concise description of your service, the user journeys that require NHS login, the claims you intend to request, and the exact lawful basis for personal data processing. Include your commissioning or sponsorship context and identify the NHS or local authority partner who will vouch for the use case.
If the initial review suggests your service is within scope, you will be invited to an Application Review Call. This is a working session to validate the use case and surface any red flags early. Expect to cover how NHS login will be integrated in your product, your target timescales, the hosting and processing locations for all data (including telemetry, backups, and content delivery), where your service will be deployed geographically, current commissioners and any live commissioning discussions, and dependencies on other NHS APIs such as IM1 PFS or PDS FHIR. You will also be asked about the identity verification and authentication level your product needs, using the transaction risk examples from the national standard as a reference point. Finally, you will be asked what user information you needâfor example contact details or the NHS numberâbased on the published scopes and claims guidance. Come prepared: ambiguity here usually results in follow-up actions.
Following the call, the integration team will decide whether your use case should be put forward to the Partner Integration Board. Think of the board as a cross-functional gate that checks the public value, compliance posture and operational readiness of your proposal. The board can approve the use case to proceed, reject it if it is out of scope, or defer the decision pending additional information. Approval to proceed is not permission to go live; itâs permission to enter the next development and testing stages. Deferral is common where data residency, commissioning, or identity risk alignment is unclear; treat it as an opportunity to tighten your artefacts rather than a setback.
Assuming approval, you will move into technical integration, testing and assurance. This phase generally includes environment setup, configuration of test and integration endpoints, and alignment with the identity journey requirements. Many teams underestimate non-functional testing: plan for performance baselines, resilience tests, error handling for edge cases in the sign-in flow, and accessibility conformance. If you are requesting higher identity proofing levels, be ready to demonstrate that your UI patterns help users complete photo ID and liveness checks successfully, and that you manage drop-offs gracefully with clear support routes.
Timelines vary according to complexity, but most partners complete the overall process in three to four months; a well-prepared, straightforward use case can move faster. Communication is typically run through Microsoft Teams, and you should expect iterative feedback rather than a single pass/fail moment. Progress depends on your responsiveness to actions, the maturity of your governance documents, and the lead time for any linked APIs. If your use case relies on an IM1 integration or a PDS FHIR capability, sequence your work so that those dependencies land before you request the related NHS login scopes.
The final stretch towards live status includes operational checks. You will need to evidence monitoring, alerting, incident response and user support pathways that are proportionate to the risk of your service. If you operate out-of-hours, your support model should reflect that. Make sure you have a rollback plan for identity-related releases and that your change process prevents accidental changes to sign-in behaviour. When all gates are met, you can proceed to live. Continue to treat identity as a living service: track metrics such as sign-in success, abandonment in verification steps, and support contact drivers; use those insights to iterate without compromising security.
One of the most consequential decisions in your application is the identity proofing level you request. The national standard provides transaction-level examples to help map risk to proofing requirements. A wellbeing app that lets a user record mood may be satisfied with a lower assurance level; an app that lets a user view or manage sensitive clinical information, or initiate transactions with financial or safety implications, will demand stronger verification such as photo ID and liveness checks. The art is in choosing the minimum level that appropriately mitigates risk; over-proving identity can hurt completion rates and generate support queries, while under-proving identity can leave you exposed.
Consider how identity proofing interacts with session management. If your app exposes mixed-risk features, design re-authentication prompts that appear only when a user performs higher-risk actions, rather than interrupting low-risk browsing. Use short-lived tokens and server-side sessions to avoid long windows of exposure, and make it easy for users to see when they are signed in. If a family member or carer might use the same device, consider explicit sign-out prompts after sensitive actions. These patterns often deliver more real-world safety than a blanket increase in proofing level.
Scopes and claims should be ruthlessly minimal. The default profile and email claims may suffice for many apps; requesting the NHS number should be justified by a business process that truly needs it, such as matching to records in a safe, consent-driven way. Similarly, if you intend to show details about a userâs GP practice, plan for the fact that the related scope is contingent on your IM1 route being live. The more ambition you have in scope, the more dependencies you invite; sequenced deliveryâlaunching with the minimum viable claims and then expandingâis a pragmatic way to get value to users sooner while still meeting governance expectations.
Technical implementation choices affect your ability to uphold these decisions. Avoid storing tokens on the client; use secure server-side session stores with rotation and revocation, and ensure that any analytics scripts are isolated from identity artefacts. Build a strong consent experience that explains why a claim is requested and what value it unlocks. If you later decide that you no longer need a claim, remove it proactively and communicate the change in your privacy notice. Finally, keep a tidy audit trail: when scopes change, record the rationale, approval and any downstream impact so you can answer questions crisply during assessments or audits.
The fastest integrations are rarely the ones with the fewest features; they are the ones that arrive with a clear story, minimal surprises and a team that uses the onboarding phases to validate, not to discover. Treat the eligibility check as a gate, not a hoop. Secure a commissioning or sponsorship letter that is specific about your use case, your user base and the intended benefits. This provides the backbone for decisions later and pre-empts questions about public value. Be candid about data residency. If your preferred vendor configuration replicates logs or telemetry outside the UK, either redesign it or come prepared with a robust mitigation that keeps personal data at home.
On the technical side, lean into reference implementations and harden them. OpenID Connect with code flow and PKCE, strict nonce checking, short-lived tokens and back-end session management is a well-trodden path; do not invent your own patterns. Build your sign-in UI to handle verification edge cases gracefullyâtimeouts, camera permissions, poor connectivityâand set expectations with users without oversharing about the identity providerâs internal processes. Prepare environment parity: staging should mirror production sufficiently for meaningful performance and accessibility checks.
Assurance artefacts are a frequent source of delay. Draft your DPIA, security model, and user-facing privacy communications early. Name your accountable owners and, where needed, your Senior Responsible Officer. If you use AI, describe the role it plays and where models run; if it touches personal data, explain your legal basis, minimisation approach, and how individuals can understand and challenge outcomes. Keep your engineering and legal teams in the same loop; unanswered questions from one side will stall the other.
Plan the onboarding cadence: allocate a product owner for the Microsoft Teams channel, respond promptly to actions, and sequence dependencies (e.g., IM1) ahead of scope requests; define go-live criteria and rollback plans.
By approaching NHS login as a strategic capabilityânot merely a compliance boxâyou improve both user experience and organisational resilience. Eligibility, commissioning and data residency are the foundations; identity proofing and scopes are the structure; and your operational readiness is the roof that keeps the rain out. Do the groundwork well and the rest of the build proceeds quickly.
There is real user value in getting this right. People expect to sign in with confidence, to know what information they are sharing and why, and to trust that their data remains in safe locations. Commissioners and clinical partners expect clear governance and robust incident response. NHS login integration, done well, gives you a credible, modern sign-in experience and frees your team to focus on the unique value your service bringsâbe that better condition management, faster access to care, or more effective prevention.
Most of what slows teams down is avoidable. Over-asking for claims, loose session models, unclear data maps, and late discovery of third-party transfers are self-inflicted wounds. The remedy is deliberate scoping, early documentation, and a security-first technical design. If your roadmap includes deeper NHS integrations, tackle their prerequisites in parallel so you do not end up waiting on external gates to unlock identity scopes. And remember that âapproved to proceedâ is the start of the real work: treat every integration test, accessibility fix and performance tweak as a rehearsal for live operations.
Is your team looking for help with NHS Login integration? Click the button below.
Get in touch