Questions / Understanding CHIME

Using SSL/TTL with CHIME

Occasionally, CHIME clients and other users notice that, when onsite at their own clinic, they are accessing CHIME via HTTP instead of HTTPS. Asking why, and whether there are any privacy / security risks is a reasonable question.


CHIME is a web-based application designed for use within secure, private networks at client locations. It does not use traditional username and password authentication; instead, it relies on network-level access control. If a device is on the same local network as the CHIME server, it’s access to CHIME should be controlled by internal firewalls / routing / VLANs, etc…, not application level security. This simplifies deployment and management while maintaining appropriate levels of access control for the intended use environment.

Because CHIME is only accessible from within a client’s trusted network, deploying HTTPS does not meaningfully increase security. Any user capable of intercepting traffic on the network would already have direct access to the application itself. In this context, SSL/TLS encryption does not prevent any real-world threats beyond those already mitigated by existing network security.

Implementing HTTPS would also introduce operational complexity. Automated certificate deployment and renewal typically require inbound internet access, which is intentionally disabled on CHIME servers for security and reliability reasons. Enabling external connectivity to support HTTPS would create a broader attack surface and go against the design philosophy of minimizing dependencies and potential vulnerabilities.

For these reasons, CHIME is served over plain HTTP within controlled environments, where security is enforced at the network level. This approach is consistent with its role as an internal tool and reflects a deliberate balance between security, simplicity, and reliability.