Frequently Asked Questions (FAQs) SIPRNet Hardware Token
|
|
|
- Cornelius Ferguson
- 10 years ago
- Views:
Transcription
1 Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: / DSN: Web: Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated: March What is a hardware token? 2. Why use a hardware token? 3. What is the purpose of the SIPRNet hardware token? 4. Is the SIPRNet hardware token a classified item? 5. What are the PIN rules for the SIPRNet hardware token and how often do I have to change the PIN? 6. Which PKI certificates are on the SIPRNet hardware token? 7. Who is issued a SIPRNet hardware token? 8. How do SIPRNet account users obtain a hardware token? 9. How is the SIPRNet hardware token similar to or different from the CAC and Alternative Token? 10. Can the SIPRNet hardware token be used as an ID card? 11. When will the token be available to SIPRNet account users? 12. What type of equipment do I need on my SIPRNet workstation to use the token? 13. What should I do if the SIPRNet hardware token is lost or stolen? 14. Can the SIPRNet hardware token be reused / reissued? 15. What happens if I inadvertently insert the SIPRNet hardware token into a card reader connected to a NIPRNet workstation? 16. What happens if I inadvertently insert my CAC into a card reader connected to a SIPRNet workstation? 17. Why isn't the SIPRNet token classified after using on SIPRNet workstation? 18. When will the SIPRNet token and CAC be merged into one token to be used on either NIPRNet or SIPRNet workstations? 19. What is the difference between the SIPRNet hardware token microchip and the CAC microchip? 20. Can a SIPRNet card reader be connected to a NIPRNet workstation for use with the CAC? 21. Can a card reader used on a NIPRNet workstation be connected to a SIPRNet workstation for use with the SIPRNet hardware token? 22. Why does the SIPRNet hardware token use a different middleware than the CAC? 23. What if I forget the SIPRNet hardware token PIN or lock the token? Can I reset the PIN at a CAC PIN Reset workstation? 24. Does setting the SIPRNet Active Directory account to smart card logon enabled allow only username/password OR only smart card authentication, or will it allow either method of authentication?
2 SIPRNet Hardware Token Frequently Asked Questions March What is a hardware token? In general, a security token is a physical device, typically small and portable, that acts like an electronic key to access computer services. It is used to electronically prove one s identity and may be used in place of or in conjunction with a password or personal identification number (PIN). The term hardware refers to token types where credentials are cryptographically encoded and stored on a dedicated hardware device, such as a smart card containing a microchip. This is in contrast to a software token, which stores credentials on general purpose electronic devices (e.g., a desktop, laptop, mobile device, and removable storage media). Credentials stored on hardware tokens cannot be exported and are only accessible via specialized software, called middleware, and a card reader connected to a computing device. 2. Why use a hardware token? Hardware tokens provide a secure means of network authentication. In the DoD, PKI credentials stored on hardware tokens are protected by a user s personal identification number (PIN). When presented to a network device, the combined use of the hardware token (something you have) and the PIN (something you know) provides what is known as two-factor authentication, a method far more robust than just a username and password. Unlike the username/password method, use of hardware tokens avoid the possibility of passing clear-text passwords over the network, providing stronger assurance that login details are not captured and used illicitly. 3. What is the purpose of the SIPRNet hardware token? The primary purposes of the SIPRNet hardware token are to provide trusted user identification and authentication on SIPRNet and to provide improved interoperability across the DoD enterprise through PK-enabled applications. Target applications include smart card logon to the SIPRNet, Web site authentication, and secure . Currently, authentication to the SIPRNet is accomplished with a username/password. This single-factor authentication method creates security gaps for users, and difficult password generation schemes, complex password rules, and the requirement to frequently change the password hampers the end user s ability to effectively use the network. Additionally, because the SIPRNet hardware token is populated with a full complement of PKI certificates (i.e., identity, signing, and encryption), it may be used to digitally sign and encrypt on the SIPRNet, thereby providing PKI assurances of identification, data integrity, non-repudiation, and confidentiality to electronic transactions. 4. Is the SIPRNet hardware token a classified item? Yes and no. The SIPRNet hardware token architecture is uniquely designed to be classified (to the classification level of the workstation in which it is used) only when it is inserted into a SIPRNet card reader attached to a SIPRNet workstation AND when the user has unlocked it with the associated Personal Identification Number (PIN). The PIN is referred to as activation data. The token, therefore, is classified only when the hardware and software come together in concert with activation data, thereby allowing the SIPRNet hardware token to be UNCLASSIFIED when removed from the card reader. This enables the user to securely carry their credentials from location to location without special requirements. To the warfighter, this is especially advantageous during highly mobile missions and in operations where securing a credential is impractical and a burden on their ability to rapidly respond to the mission. Another benefit of a secure, portable hardware token is that the warfighter s credentials are always available for use.
3 SIPRNet Hardware Token Frequently Asked Questions March What are the PIN rules for the SIPRNet hardware token and how often do I have to change the PIN? The PKI credentials encoded in the microchip of the SIPRNet hardware token are protected by a personal identification number (PIN); not a password. The 8-16 digit numeric PIN is chosen by and known only to the token holder. The PIN is encoded and stored only in the token s microchip; it is not cached, stored in a database on the network, or to be shared with anyone else. Currently, policy considers the PIN to be classified and does not require the PIN to be changed unless it has been compromised, but the user can easily change the PIN at their discretion from their SIPRNet workstation. 6. Which PKI certificates are on the SIPRNet hardware token? The SIPRNet hardware token contains three PKI certificates: the Identity certificate and the E- mail Signing certificate, both of which facilitate the PKI assurances of identification and authentication, data integrity, and non-repudiation; and the Encryption certificate, which facilitates confidentiality. The Identity certificate is also used for smart card logon to the SIPRNet. The PKI certificates on the Common Access Card (CAC) and the Alternative Token are issued by Department of Defense (DoD) Medium Assurance PKI Certification Authorities (CAs). They are for use on unclassified systems only. The PKI certificates on the SIPRNet hardware token, however, are issued by the National Security System (NSS). NSS CAs are approved by the National Security Agency to issue PKI certificates for use on DoD classified systems. 7. Who is issued a SIPRNet hardware token? The SIPRNet hardware token is only issued to users who have a valid account on the SIPRNet and an active smil.mil address. 8. How do SIPRNet account users obtain a hardware token? Unlike the Common Access Card (CAC), the SIPRNet hardware token is not issued at a personnel center or other CAC issuance facility; however, issuance does employ a secure version of the Defense Eligibility Enrollment Reporting System (S-DEERS) to obtain the user s personal identification information. The user s identity information is then bound to the PKI certificates to facilitate identification, authentication, and non-repudiation. A Local Registration Authority (LRA) obtains the user s identity information via a dedicated workstation. The vast majority of SIPRNet account users will obtain their token through an LRA-managed kiosk workstation described above. The LRA verifies the user s identity face to face and initiates the enrollment process. The LRA issues the token, provides the user a one-time password, and then directs the user to a kiosk workstation to complete the enrollment and set their 8-16 digit numeric PIN. SIPRNet account users at smaller, geographically separate locations may receive their tokens through a centralized issuance process via a remote Trusted Agent (TA). The TA verifies the user s identity face to face and submits a token request to an LRA. The LRA issues the token, and then securely ships the token and sends an initial PIN via encrypted to the TA. The TA distributes the token and PIN to the SIPRNet account user, who is then required to change the PIN. The centralized issuance process may take 10 business days or more to complete.
4 SIPRNet Hardware Token Frequently Asked Questions March How is the SIPRNet hardware token similar to or different from the CAC and Alternative Token? The SIPRNet hardware token is a new token in the hardware token inventory. It is a separate card, distinct from the Common Access Card (CAC) and the Alternative (Alt) Token. However, the SIPRNet hardware token is like both the CAC and Alt Token in that it is also a hardware token cryptographically encoded with PKI credentials that are used for secure and smart card logon to a DoD network. That s where the similarities end. The CAC and Alt Token are for unclassified use only and are populated with PKI certificates issued by DoD Medium Assurance PKI Certification Authorities (CAs). The SIPRNet hardware token is for use on the SIPRNet only and uses PKI certificates issued by the National Security System (NSS) CA. NSS CAs are approved by the National Security Agency to issue PKI certificates for DoD classified systems. Additionally, the CAC is the DoD identification card. The SIPRNet hardware token does not have a photo of the card holder, does not include printed personal data (not even the name of the card holder), contains no biometrics, and does not have bar codes. As such, it cannot be used as an identification card of any kind or used to access military installations or secure facilities, and it cannot be used at facilities that rely on bar code data for identification purposes to access sensitive records, such as at medical and personnel facilities. Since the SIPRNet hardware token does not facilitate common access, it is NOT referred to as a SIPRNet CAC. 10. Can the SIPRNet hardware token be used as an ID card? No, the SIPRNet hardware token cannot be used as an identification card of any kind or used to access military installations or secure facilities. It does not have a photo of the card holder, does not include printed personal data (not even the name of the card holder), contains no biometrics, nor does it have bar codes, so it may not be used at facilities that rely on bar code data for identification purposes, such as at medical and personnel facilities. 11. When will the token be available to SIPRNet account users? 1 March through 15 April 2011, the Air Force will participate in activities in support of DoD s Initial Operational Test and Evaluation (IOT&E). During the IOT&E, DoD components will evaluate token issuance, management, and usage at select locations and collect valuable information toward full production. Under the current schedule, the Air Force will begin issuing tokens to all SIPRNet account users during the Initial Operational Capability (IOC) in mid Full Operational Capability (FOC) is projected by the end of What type of equipment do I need on my SIPRNet workstation to use the token? The SIPRNet hardware token microchip is set to a voltage level different from the Common Access Card (CAC) and Alternative Token. Therefore, to leverage the unique design features and secure architecture of the SIPRNet hardware token, SIPRNet workstations must be equipped with an approved card reader and reader driver compatible with the SIPRNet hardware token AND must have an approved middleware loaded. The only approved reader is the Omnikey 3121 reader, which must be ordered through the Air Force PKI SPO. The 90-Meter Smart Card Manager (SCM), a client-based application that provides token use services for smart card logon, secure , and Web site authentication, is the approved middleware for SIPRNet user workstations. 90meter Certificate Issuance Workstation, a client-based application that formats,
5 SIPRNet Hardware Token Frequently Asked Questions March enrolls, and resets and unblocks PINs on the SIPRNet token, is the approved middleware for LRA workstations. NOTE: ActivClient 6.2 Air Force Release (AFR) middleware installed on NIPRNet workstations is NOT approved for use with the SIPRNet hardware token. 13. What should I do if the SIPRNet hardware token is lost or stolen? The SIPRNet hardware token should be considered and treated like a high-value, unclassified item; protect it as you do the Common Access Card (CAC). In other words, don t leave it unattended in the SIPRNet card reader, and keep it out of possession of unauthorized users. In fact, it s highly recommended that the user keep it in their control at all times. If it is lost or stolen, do not report it to the personnel facility or other CAC issuance location. The user must report it as soon as possible to a Local Registration Authority (LRA), Trusted Agent (TA), or the Air Force Registration Authority (RA) to initiate certificate revocation and token reissuance. This action renders the lost/stolen card useless to anyone who may find it or try to use it for illicit purposes. 14. Can the SIPRNet hardware token be reused/reissued? Yes. Because the face of the token is not personalized, it can be recycled, providing a significant cost benefit to the DoD. When a SIPRNet hardware token user no longer needs the card or is permanently transferred to a new location, they are required to return it to a Local Registration Authority (LRA) or Trusted Agent (TA), who then requests certificate revocation and reinitializes the token. The re-initialization process eliminates encoded data from the microchip and prepares the card for issuance to another user. 15. What happens if I inadvertently insert the SIPRNet hardware token into a card reader connected to a NIPRNet workstation? Introduction of SIPRNet tokens on unclassified workstations is not authorized. If a SIPRNet token is inserted into an unauthorized workstation, do not enter the PIN. If the PIN is entered, it is a potential security violation. In such instances, the token shall be returned to an NSS LRA where the certificates will be revoked, and the incident shall be reported to the local information security officer for investigation. (Ref: CNSS Decision Memorandum, Approval of Continued Use of SC650 Token, 17 Feb 11) 16. What happens if I inadvertently insert my CAC into a card reader connected to a SIPRNet workstation? Introduction of NIPRNet tokens (i.e., CAC and Alternative Token, PIV, or PIV-I) on SIPRNet is not authorized. When properly configured on SIPRNet workstations, domain middleware only reads SIPRNet tokens; therefore, inserting a NIPRNet token into a card reader connected to a SIPRNet workstation is not a security violation unless it is apparent the NIPRNet token becomes active (by the entrance and acceptance of the token PIN). Correctly configured middleware would detect the NIPRNet token as unauthorized and block PIN entry as well as block any service applets that don t require PIN entry. Middleware that is not properly configured on a SIPRNet workstation is not capable of blocking activation; therefore, introduction of a NIPRNet token into the SIPRNet is a potential security violation, regardless of whether the PIN is entered. Such instances shall be reported to the local information security officer and the incident investigated to determine if classified data was written to the token or if malicious code was introduced into the network.
6 SIPRNet Hardware Token Frequently Asked Questions March (Ref: CNSS Decision Memorandum, Approval of Continued Use of SC650 Token, 17 Feb 11) 17. Why isn't the SIPRNet token classified after using on SIPRNet workstation? Due to the uniquely-designed SIPRNet hardware token architecture and card operating system, the National Security Agency (NSA) determined sufficient security capabilities are provided and released the following statements: The token is considered a high-value unclassified item. It should be maintained in the user's possession at all times; and The token is classified Secret when unlocked and in use and is considered unclassified when removed from its reader and not in use. (Ref: CNSS Decision Memorandum, Approval of Continued Use of SC650 Token, 17 Feb 11) 18. When will the SIPRNet token and CAC be merged into one token to be used on either NIPRNet or SIPRNet workstations? Providing all the Common Access Card (CAC) capabilities and the SIPRNet hardware token capabilities in a single token with appropriate separation is not yet available from industry at an affordable price. The requirement for a single token is in the DoD PKI Increment 2 Capability Development Document (CDD) Key Performance Parameters (KPP) as an objective requirement. Currently, the SIPRNet hardware token is a capability requirement in Increment 2, Spiral 1; a token capable of supporting more than one domain will be addressed in a later spiral and evaluated as the technology evolves. 19. What is the difference between the SIPRNet hardware token microchip and the CAC microchip? The SC650 microchip on the SIPRNet hardware token and the microchip on the Common Access Card (CAC) are different physical architectures. This difference and the difference in the token s operating system permit the use of the SC650 token as a SIPRNet token. 20. Can a SIPRNet card reader be connected to a NIPRNet workstation for use with the CAC? Yes; with the appropriate middleware and drivers, a SIPRNet card reader can technically be used on a NIPRNet workstation, but this is neither advised nor supported. 21. Can a card reader used on a NIPRNet workstation be connected to a SIPRNet workstation for use with the SIPRNet hardware token? Possibly; certain card readers with appropriate middleware and drivers installed on the SIPRNet workstation may work. However, card readers used on NIPRNet workstations are not authorized for use on SIPRNet workstation. In addition to evaluating various tokens and different vendors middleware during the pilot and operational assessment, card readers were also extensively tested and evaluated. They will be evaluated further during the Initial Operational Test and Evaluation (IOT&E) scheduled for early part of In preparation for the initial deployment of SIPRNet hardware tokens to Air Force SIPRNet account holders, approved card readers for the SIPRNet will be provided by the DoD PKI Program Management Office.
7 SIPRNet Hardware Token Frequently Asked Questions March Why does the SIPRNet hardware token use a different middleware than the CAC? ActivClient middleware is not authorized for use with the SIPRNet hardware token. One reason is the microchips on the SIPRNet hardware token and the Common Access Card (CAC) are of different architectures. 90-Meter Smart Card Manager (SCM), a client-based application that provides token use services for smart card logon, secure 2-mail, and Web site authentication, is the approved middleware for user workstations. 90meter Certificate Issuance Workstation, a client-based application that formats, enrolls, and resets and unblocks PINs on the SIPRNet token, is the approved middleware for LRA workstations. 23. What if I forget the SIPRNet hardware token PIN or lock the token? Can I reset the PIN at a CAC PIN Reset workstation? CAC PIN Reset workstations do not support the National Security System (NSS) PKI-issued certificates encoded on the SIPRNet hardware token. If you forget your SIPRNet hardware token PIN or you inadvertently lock the token by entering the PIN erroneously five consecutive times, you must report to a NSS-certified Registration Authority, Local Registration Authority, or designated Trusted Agent. If the PIN is known, but you simply wish to change it, the 90-Meter Smart Card Manager (SCM) middleware installed on your SIPRNet workstation supports a PINchange function. You can do this yourself without the assistance of outside personnel. 24. Does setting the SIPRNet Active Directory account to Smart Card Logon enabled allow only username/password OR only smart card authentication, or will it allow either method of authentication? If an account is simply "enabled" for smart card logon (SCL) (i.e., the user logon name is populated with the EDI-PI and the domain is changed then a user can either log on with a username and password or with a smart card without restrictions UNLESS: 1) Administrators, when configuring the network, check the option "Smart card is required for interactive logon" and then uncheck it. This results in the system resetting the user's password to a 256-character password that the user does not know; thus he/she is unable to logon with a username and password; or 2) Administrators set a local policy at the workstation that requires smart card logon. In either of those two cases, users may not continue to log onto the SIPRNet with their username and password. During the IOT&E, the SIPRNet at participating organizations location will be enabled for SCL so that SIPRNet hardware token usage can be properly evaluated, yet still allow non-iot&e participants to conduct business as usual.
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Department of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO [email protected] UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)
Frequently Asked Questions (FAQ s) November, 2013 This list of FAQs is a subset of a larger list derived by the Agency. This list is tailored to meet the needs of users at Headquarters. If you do not find
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Deploying Smart Cards in Your Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The merging of physical access technology with public key-enabled smart card technology has been an emerging trend that has occurred in the security industry
Frequently Asked Questions
Frequently Asked Questions Naval VAMOSC Public Key Infrastructure/ Common Access Card (PKI/CAC) Registration and Log in Please Note: A PKI-enabled browser is required for certificate registration and to
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Instructions for completing USFK Theater Specific Required Training
Welcome Welcome to the website designed to facilitate completion of mandatory training that arriving personnel and units assigned to, rotating to, or in temporary duty status to USFK must complete prior
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector
Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Administration Guide ActivClient for Windows 6.2
Administration Guide ActivClient for Windows 6.2 ActivClient for Windows Administration Guide P 2 Table of Contents Chapter 1: Introduction....................................................................12
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
User Guide Remote PIV to VDI Using a PIV Card
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
Smart Card Two Factor Authentication
January 2013 Page 1 Smart Card Two Factor Authentication The combination of a smart card and PIN provides Two-Factor Authentication, where two items are needed: something physical the user has (a smart
Microsoft Windows Server 2003 Integration Guide
15370 Barranca Parkway Irvine, CA 92618 USA Microsoft Windows Server 2003 Integration Guide 2008 HID Global Corporation. All rights reserved. 47A3-905, A.1 C200 and C700 December 1, 2008 Crescendo Integration
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
RAPIDS Self Service User Guide
Page 1 RAPIDS Self Service User Guide https://www.dmdc.osd.mil/self_service Page 2 Introduction The RAPIDS Self Service (RSS) application provides sponsors with the capability to generate a DD Form 1172-2
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
What Are They, and What Are They Doing in My Browser?
Digital Certificates, p.1 07/29/02 Digital Certificates What Are They, and What Are They Doing in My Browser? By Judith V. Boettcher and Amanda Powell Digital certificates provide a means to authenticate
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
One-Time Password Contingency Access Process
Multi-Factor Authentication: One-Time Password Contingency Access Process Presenter: John Kotolski HRS Security Officer Topics Contingency Access Scenarios Requesting a Temporary One-Time Password Reporting
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
AKO Email Shutdown Quick Reference Guide
AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.
CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA
SENDING AND RECEIVING PROTECTED INFORMATION VIA ELECTRONIC MAIL. Naval Medical Center Portsmouth IMD Training Division
SENDING AND RECEIVING PROTECTED INFORMATION VIA ELECTRONIC MAIL Naval Medical Center Portsmouth IMD Training Division INTRODUCTION The following slides will help you set up your computer and Microsoft
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.02 May 24, 2011 ASD(NII)/DoD CIO SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling References: See Enclosure 1 1. PURPOSE. This Instruction:
Passlogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
IT Governance Committee Review and Recommendation
IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and
How To Configure An Activcard Smart Card With An Hp Powerbook On A Pc Or Ipa (Powerbook) On A Powerbook 2 (Powercard) On An Hpla 2 (Ahemos) Or Powerbook (Power Card
Implementing ActivIdentity Smart Cards for Use with HP Compaq t5720 Thin Clients and HP Blade PCs Introduction............................................................ 2 Prerequisites............................................................
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
How to Use Your LincPass Credential
Your LincPass is your USDA personal identity verification (PIV) card. This guide explains how to use your card and PIN to access and protect USDA network and computer resources. What You ll Need to Get
How to Publish Your Smart Card Certificates Using Outlook 2010
How to Publish Your Smart Card Certificates Using Outlook 2010 To send or receive (and read) digitally signed or encrypted email messages with colleagues at NIH, you must first publish your PIV certificate
GNB RSA Token Standards and Procedures
Client Authentication Standards GNB RSA Token Standards and Procedures Concept The client authentication standard provides a formalized, secure and efficient methodology for proper identification of the
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
User Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
Phone: 703.769.4500 Fax: 703.769.7605 http://setdweb.belvoir.army.mil
CAC/PKI TRAINING GUIDE Common Access Card/ Public Key Infrastructure Phone: 703.769.4500 Fax: 703.769.7605 http://setdweb.belvoir.army.mil Table of Contents 1 GENERAL...4 2 INTRODUCTION...4 3 WHAT IS PUBLIC
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4
GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING
NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview
HOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
Georgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
SPOT FAQ S Frequently Asked Questions
Signing up for SPOT Training 1. How can I sign up for training? 2. I am having trouble accessing the training site, what do I do? Our training department can help you. Please contact them via email at:
Strong Authentication for Healthcare
Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services
Secure Access Portal Getting Started Guide for using the Secure Access Portal Information Services 1. Introduction The Secure Access Portal enables the authority to provide simple but secure remote access
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Department of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA [email protected] General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
