Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016

Size: px
Start display at page:

Download "Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016"

Transcription

1 Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version

2 Document Approval Document Approved By Date Approved Name: Brian Purdy??/??/2016 ii

3 Revision History Table 2. Revision History VERSION DATE PRIMARY AUTHOR(S) REVISION/CHANGE PAGES AFFECTED July 2016 Mike Lacher Initial Draft All August 2016 Greg Lane Customized for MSC September 2016 Greg Lane Updated to include AC7 9, 10 iii

4 Table of Contents Document Approval... ii Revision History... iii Abbreviations, Acronyms, and Definitions... vi 1. INTRODUCTION PURPOSE SCOPE PREREQUISITES DUAL PERSONA DEPS SETUP DMDC Self-Service and Activating PIV Auth Cert Resetting the state of your cards in ActivClient Selecting the correct Certificate Appendix 1: Troubleshooting Dual Persona PIV Auth Cert Process iv

5 DISCLAIMER This supplement is provided as a tool to support Mission Partner Migration Project Managers and their Dual Persona end-users. The steps for managing DUAL Persona certification are based on the experience gathered from previous migrations. These steps may differ somewhat from a specific Mission Partner s configuration, but they should be of use the end users and their Level I Service Desk. OVERVIEW Some individuals may have two or more personas (active identities) in the Defense Manpower Data Center (DMDC) database. This is commonly known as having a Dual Persona for instance, someone who is a DoD civilian employee or contractor and in the Army Reserve. As part of DISA s implementation of DoD Enterprise Portal Service (DEPS), there is a requirement for users with Dual Personas to activate the personal identity verification authentication certificate (PIV Auth Cert) on each of their CACs. This PIV Auth Cert will then be used during login to DEPS. There are also people who may have a surprise Dual Persona. This can happen when someone has transitioned from one DoD role to another (for instance, from being a contractor to becoming a civilian employee). There is a grace period that keeps the person s old CAC recognized: if this overlaps with the new active role, a Dual Persona will be seen in the system. This document provides detailed information on how to activate the PIV Auth Cert. These steps need to be performed by end users with a Dual Persona. Most problems with starting DEPS access will occur when someone is unaware of his or her Dual Persona status. The key here is to be aware of the possibility and go through the steps required for those who are bona fide Dual Persona. The most common indicator that a user may be dual persona is if he or she receives an F5 Access Policy Module error page with a session ID number when accessing DEPS after selecting the Certificate. v

6 Abbreviations, Acronyms, and Definitions The following abbreviations, acronyms, and definitions aid in the understanding of this document. Abbreviations and Acronyms Description CAC DMDC DNS DoD DSC DSLogon FASC-N JDM JRE PCC PIV Common Access Card Identification and sometimes benefits and privilege card produced by the DoD, which contains an Integrated Circuit Chip (ICC) holding demographic data and digital certificates Defense Manpower Data Center Domain Name System Department of Defense DMDC Support Center Unique Logon ID and Password given to DoD Beneficiaries to access DoD web applications in lieu of a CAC Federal Agency Smart Credential Number Joint Data Model Java Runtime Environment Personnel Category Code Personal Identity Verification RAPIDS Real-time Automated Personnel Identification System Application used to update data on the DEERS Person Data Repository (PDR) and create DoD Identification cards RSS UMP UPN RAPIDS Self Service User Maintenance Portal User Principle Name vi

7 1. INTRODUCTION This guide provides instructions on how Dual Persona end users coming onboard to DoD Enterprise Portal Service (DEPS) can use the DMDC RAPIDS Self-Service web application to update the firmware on their CAC to display the PIV Auth cert. This must be done because DEPS leverages the DISA Enterprise Applications Services Forest (EASF) for authentication control. For DoD personnel with one persona e.g., one of the following: Military (.mil); Civilian (civ); or Contractor (.ctr) the login token is their Common Access Card Signing Certificate. Users with multiple personas (e.g. civilian employee and reservist) have a CAC for each persona, however the login token is the personal identity verification authentication certificate (PIV Auth Cert) located on each CAC. CAC cards do not, by default, display the PIV Auth cert; they must be updated by the card-holder. Even when activated they will still look like your other (non- ) certificates until you roll the cursor over your name. A regular cert will display 10 numbers and the PIV Auth Cert will show 16 numbers. When logging in to DEPS, the PIV cert needs to be selected. PIV Auth Cert 16 digits 1

8 1.1 PURPOSE With a mission partner managed SharePoint environment, accounts are typically provisioned as needed, and restricted to the specific identity associated with that mission partner (civilian, contractor, military, etc.). The DISA EASF, leveraged by many of DISA s Enterprise Services, automatically provisions accounts for all DoD CAC users. But only one digital identity is recognized until an individual who has two CACs activates the PIV Auth cert on both cards. The PIV Auth certificates have a field that is unique for the CAC-holder called the Federal Agency Smart Credential Number (FASC-N).This lets a Dual Persona apply the PIV Auth cert to login with either CAC, depending on which account is to be accessed. The FASC-N number is added to the 10 digit EDIPI; when logging into DEPS, the system passes the unique number from the PIV certificate and matches it to the correct account and authenticates the user (the number is the EDIPI plus a much longer FASC-N, of which only 16 numbers are displayed when the cursor is rolled over the certificate). The end user will need to ensure the correct CAC is used for the particular account he or she wants to access. 1.2 SCOPE The reason for activation of this certificate is to support multiple personas in the EASF Domain with a simplified CAC login (once properly set up) to DEPS. 1.3 PREREQUISITES In order to update your CAC, your laptop or work station must be CAC-enabled (a DEPS requirement). WARNING Only people with Dual Personas should proceed with these steps; those who aren t sure, but think they may qualify, should check open a ticket with their support team for escalation to DISA to verify. 2

9 2 DUAL PERSONA DEPS SETUP 1. Setting up your Dual Persona PIV Auth Cert requires a number of steps: 2. Connecting to DMDC RAPIDS Self-Service 3. Activating each CAC s PIV Auth Cert 4. Having the system forget your individual certificates 5. Resetting your CAC identities in ActivClient 2.1 DMDC Self-Service and Activating PIV Auth Cert In order to access DEPS, you need to activate your PIV authentication certificate for each CAC and then have ActivClient forget the previous state of all your CACs. Go to RAPIDS Self and sign on. Welcome to RAPIDS Click Ok. DEERS 3

10 Log in with your CAC. Login with CAC Select your identity certificate (this is NOT the certificate), enter your PIN if asked, and click OK. NOTE: When you complete activation for one CAC, insert the other CAC and repeat the process. Select certificate 4

11 Select Activate PIV certificate. 5

12 Make certain you select your MSC CAC here and not an Active Duty, Reservist, or previously used CAC. Your MSC CAC must be in the card reader to load the PIV Certificate. Any mismatch (i.e. selecting the wrong CAC, not having the right CAC in the reader will result in an error message. Select Activate PIV The PIV Update will process through JAVA. Java processing activation 6

13 PIV Update will continue to process: This might take a few minutes. Reading data from CAC Java needs approval to move forward. Click No. Java message When the process is complete the system will tell you the PIV Authentication Certificate is active. PIV is active 7

14 2.2 Resetting the state of your cards in ActivClient Now that your PIV cert is active you need to tell the system to reset (forget) the state of all cards in ActivClient; it also lets you see the properties associated with your CAC and certificates. The ActivClient Agent is accessed from the System Tray (lower right of your computer screen) and may appear differently according to how a computer is set up. Below are two examples. In the example below (left), the ActivClient is in a group of hidden icons that are visible when you click on the triangle on the left side of the System Tray. In the example below (right), the ActivClient is on the left in the System Tray. ActivClient Locate the icon for your ActivClient Agent and click it. Then click Open. Open ActivClient Note: MSC is currently using two versions of ActivClient 6.xx and 7.xx. Instructions for both follow. 8

15 ActivClient 6.xx (See below for ActivClient 7) Select: Tools; Advanced; and then click Forget state for all cards. Forget state for all cards Select: Tools; Advanced; and then click Make Certificates Available to Window. ActivClient 7.xx Select: Tools; Advanced; and then click Reset optimization cache Once completed you must reboot your computer to make the Certificates visible. 9

16 Close ActivClient and the re-open it. Double-click the My Certificates icon. Note: Views lets you select how you see the certificates as icons, as a list, or as a detailed list. View my Certificates For both versions of ActivClient- Confirm that you see four certs. Click on View and select Details to understand which certs you have. LastName.First... LastName.First... LastName.First... LastName.First... Certificates NOTE: The reason for exposing the PIV Auth Cert is that Dual-Persona users are now required to use this Piv Auth Cert to authenticate to DEPS. The cert will be used only for signing and encrypting. Sites that you have been using your certificate to authenticate to do not change, continue to use the certificate. Only DISA DEPS sites will require the PIV Certificate for authentication. 10

17 2.3 Selecting the correct Certificate When the browser prompts the user to select a certificate, three selections will be available Placing the cursor on each certificate reveals the hyperlink Click Here to view certificate prope Select the Hyperlink and on the General Tab find the certificate that says DOD PIV that is the correct one to use for authentication In the event the type of Certificate is not visible in the General Tab, select the Certification Path Tab and scroll in the window to find the information on the last item 11

18 Use the scroll bar to see DOD Identity or DOD PIV Certificate to determine which is the PIV Certificate needed for login. 12

19 Appendix 1: Troubleshooting Dual Persona PIV Auth Cert Process A.1 Compatibility Conflict: 32-bit vs 64-bit settings Some people receive a RAPIDS Self Service (RSS) error message regarding a compatibility conflict that exists between settings related to 32-bit and 64-bit desktop installations? As more users upgrade their Operating System (OS) to 64-bit compatibility, issues may arise if using ActivClient, Internet Explorer (or other browsers), and JRE versions that are not the same bit level. Please confirm that your ActivClient Middleware, JRE, and browser (Internet Explorer or an alternative) are all set to the same bit: ActivClient (32-bit), JRE (32-bit), and Internet Explorer (32-bit) or ActivClient (64-bit), JRE (64-bit), and Internet Explorer (64-bit). Any inconsistency among those three components means that you will not be able to use RSS and/or other smart card-enabled applications. A.2 Problem accessing RAPIDS Self-Service If there is a problem accessing the RAPIDS Self Service web site, contact the DMDC Support Center (DSC) at A.3 PIV Auth Cert is enabled, problem accessing DEPS If someone's PIV Auth Cert is enabled, but there are problems accessing DEPS- for guidance or help checking their provisioned account try contacting the DEPS team via the Mission Partner local help desk. A.4 Personnel data seems to be incorrect If someone's personnel data seems to be incorrect and not reflect their affiliations correctly, try the DMDC Support Office at

Application Virtualization Hosting Environment

Application Virtualization Hosting Environment Infrastructure and Operations Division Engineering, Design and Deployment Branch Application Virtualization Hosting Environment June 15, 2016 Version: 16 Unclassified/For Official Use Only (FOUO) Document

More information

How to Update your Information in the DoD Enterprise (DEE), Global Address List (GAL). Army users know it as Enterprise

How to Update your Information in the DoD Enterprise  (DEE), Global Address List (GAL). Army users know it as Enterprise How to Update your Information in the DoD Enterprise Email (DEE), Global Address List (GAL). Army users know it as Enterprise Email Presented by: Michael J. Danberry Last Revision / review: 12 March 2017

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

How to Update your Information in the DoD Enterprise (DEE), Army users know it as mail.mil Global Address List (GAL)

How to Update your Information in the DoD Enterprise  (DEE), Army users know it as mail.mil Global Address List (GAL) How to Update your Information in the DoD Enterprise Email (DEE), Army users know it as mail.mil Global Address List (GAL) Presented by: Michael J. Danberry Last Revision / review: 15 February 2015 This

More information

Accessing DoD Enterprise , AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer

Accessing DoD Enterprise  , AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer Accessing DoD Enterprise Email, AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer Presented by: Michael J. Danberry Last Revision / review: 17 September 2017 Performing

More information

DoD Identity & Access Management (IdAM) Portfolio Overview

DoD Identity & Access Management (IdAM) Portfolio Overview DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview

More information

Accessing DoD Enterprise , AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer

Accessing DoD Enterprise  , AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer Accessing DoD Enterprise Email, AKO, and other DoD websites with Internet Explorer & Edge on your Windows computer Presented by: Michael J. Danberry Last Revision / review: 05 February 2018 Performing

More information

Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS)

Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS) Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS) DEFENSE INFORMATION SYSTEMS AGENCY COMMON USER SERVICES VERSION 1.0 DRAFT 1 JANUARY 2013 Page 1 of 11 Revision History

More information

SOF U OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL

SOF U OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts II (SITECII) SOF U OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

Managed Access Gateway Third-Party Credential User Guide August 2017

Managed Access Gateway Third-Party Credential User Guide August 2017 Managed Access Gateway Third-Party Credential User Guide August 2017 Copyright 2017 Exostar, LLC All rights reserved 1 Contents Audience... 3 How to Register for a New MAG Account with your Third-Party

More information

AMPS Snapshot: User Registration External Users

AMPS Snapshot: User Registration External Users Do You Need an AMPS Account? How to Prepare for AMPS Account Registration Not an employee of DLA or DFAS? If you cannot authenticate your identity with a smart card, you can still obtain an AMPS account

More information

DoD Common Access Card Authentication. Feature Description

DoD Common Access Card Authentication. Feature Description DoD Common Access Card Authentication Feature Description UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

Defense Security Service

Defense Security Service Office of the Chief Information Officer National Industrial Security Program (NISP) Central Access Information Security System (NCAISS) Project HS0021-15-F-0111 CICN: 0000-DOC-GD-27588-00 November 29,

More information

VMware PIV-D Manager Deployment Guide

VMware PIV-D Manager Deployment Guide VMware PIV-D Manager Deployment Guide AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected

More information

Guardium UI Login using a Smart card

Guardium UI Login using a Smart card IBM Security Guardium Guardium UI Login using a Smart card Overview Guardium Smart card support meets the United States government mandate that all vendors must support multi-factor authentication for

More information

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager Using Workspace ONE PIV-D Manager VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Instructions for completing USFK Theater Specific Required Training. Welcome

Instructions for completing USFK Theater Specific Required Training. Welcome Welcome Welcome to the website designed to facilitate completion of mandatory training that arriving personnel and units assigned to, rotating to, or in temporary duty status to USFK must complete prior

More information

EMMA Provisioning errors and FAQs

EMMA Provisioning errors and FAQs Issue #1 - When you are provisioning a user and enter their EDIPI number, the status in the User s Information section must be active. If it is not, as shown below, you will need to contact the PCOLS help

More information

e-leave User Guide (SAAR Only)

e-leave User Guide (SAAR Only) Navy Standard Integrated Personnel System (NSIPS), Operations & Maintenance e-leave User Guide (SAAR Only) 31 July 2010 Version 1.0 Program Executive Office, Enterprise Information System (PEO-EIS) 2251

More information

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

There is an increasing desire and need to combine the logical access and physical access functions of major organizations. Introduction There is an increasing desire and need to combine the logical access and physical access functions of major organizations. This can be as simple as merely having an access card that can be

More information

Making DoD Enterprise , AKO, and other DoD websites work with Internet Explorer on your Windows computer.

Making DoD Enterprise  , AKO, and other DoD websites work with Internet Explorer on your Windows computer. Making DoD Enterprise Email, AKO, and other DoD websites work with Internet Explorer on your Windows computer. Presented by: Michael J. Danberry Last Revision / review: 22 February 2015 Performing these

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide

Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide Army Information Assurance CAC/PKI Division 2530 Crystal Drive Arlington,

More information

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Copyright 2018 Exostar LLC All rights reserved. 1 Version Impacts Date Owner Enterprise Access Gateway (EAG) Guide Revised June

More information

Workspace Desktop Edition Deployment Guide. Installing The Workspace SIP Endpoint

Workspace Desktop Edition Deployment Guide. Installing The Workspace SIP Endpoint Workspace Desktop Edition Deployment Guide Installing The Workspace SIP Endpoint 11/20/2017 Installing The Workspace SIP Endpoint [Modified: 8.5.109.16, 8.5.114.08] The Workspace SIP Endpoint is an optional

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between. <<Component>> and

Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between. <<Component>> and Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between and DISA Enterprise Services Directorate Enterprise Infrastructure Division 27 December

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Smart Card Configuration Guide August 2018 (release 18.8) Centrify Corporation Legal Notice This document and the software described in this document are furnished under

More information

Tactics, Techniques and Procedures (TTP): BitLocker End-User Guide

Tactics, Techniques and Procedures (TTP): BitLocker End-User Guide Tactics, Techniques and Procedures (TTP): BitLocker End-User Guide VERSION 1.0.6 April 2015 FOR US Army Reserve Command (USARC) DISTRIBUTION IS LIMITED TO U.S. GOVERNMENT AGENCIES AND THEIR CONTRACTORS.

More information

Amway Remote Access Blue Book By Blue Buschert help.amwayconnect.com

Amway Remote Access Blue Book By Blue Buschert help.amwayconnect.com Amway Remote Access By Blue Buschert help.amwayconnect.com Contents Amway Remote Access Help Portal... 3 General Information... 4 Disclaimer... 4 Requirements... 4 Two-Factor Authentication... 4 MobilePass

More information

AIM Application v. 2.4 User Manual

AIM Application v. 2.4 User Manual AIM Application v. 2.4 User Manual Prepared by: HP Enterprise Services/DMDC 1600 N. Beauregard Street Alexandria, VA 22311 Abstract This guide describes how to use the AIM system, which provides for managing

More information

Instructions for completing ICAN Request using the DD2875

Instructions for completing ICAN Request using the DD2875 Instructions for completing ICAN Request using the DD2875 Type of Request Check the INITIAL box to request a NEW Account, be sure to include your EDIP number in the USER ID box. This can be found on the

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

Login & Registration Quick Start Guide

Login & Registration Quick Start Guide Login & Registration Quick Start Guide Prepared by: Joint Contingency & Expeditionary Services (JCXS) Defense Logistics Agency (DLA) https://www.jccs.gov/ casm v2.1.12 Last Modified August 13, 2018 Total

More information

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017 October 2017 IT Department Basic WIFI Troubleshooting on ACC SSID Many times WIFI issues can be solved with a few simple fixes. Some of the most common example are below: Symptom 1 Desired Wireless network

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

PISA 2018 COMPUTER-BASED SCHOOL QUESTIONNAIRE: PRINCIPAL S MANUAL

PISA 2018 COMPUTER-BASED SCHOOL QUESTIONNAIRE: PRINCIPAL S MANUAL P 2 I S A 0 1 8 PISA 2018 COMPUTER-BASED SCHOOL QUESTIONNAIRE: PRINCIPAL S MANUAL Doc.: CY7_CBA_ScQPrincipalManual.docx Produced by ETS, Core A Contractor TABLE OF CONTENTS Part 1 Introduction Introduction

More information

Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures

Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Defense Manpower Data Center Personnel Security & Assurance Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Version 3.2 July 20, 2016 CONTRACT NUMBER GS00Q09BGD0027

More information

Department of Defense Past Performance Information Retrieval System- Statistical Reporting Next Generation (PPIRS-SR NG)

Department of Defense Past Performance Information Retrieval System- Statistical Reporting Next Generation (PPIRS-SR NG) Department of Defense Past Performance Information Retrieval System- Statistical Reporting Next Generation (PPIRS-SR NG) PPRS-SR NG User Access Naval Sea Logistics Center Portsmouth Bldg. 153-2 Portsmouth

More information

Help Desk New Users Requester Guide

Help Desk New Users Requester Guide CMR-DOC-002 Help Desk New Users Requester Guide December 2011 CMR-Doc-002 History of Revisions This table contains a history of revisions made to this document Revision Date Initial Section Type* Remarks

More information

Yubico with Centrify for Mac - Deployment Guide

Yubico with Centrify for Mac - Deployment Guide CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component

More information

Hollins University VPN

Hollins University VPN Hollins University VPN Hollins is now using Palo Alto for its network security and VPN gateway. You will need to install the new VPN client called GlobalProtect to gain access to the Hollins network remotely.

More information

NAMI Affiliate Profile Center Contact Manual

NAMI Affiliate Profile Center Contact Manual NAMI Affiliate Profile Center Contact Manual Standards of Excellence/Center for Excellence November 2013 Table of Contents Chapter Page I. NAMI Affiliate Profile Center Contact Training Timetable 3 II.

More information

VPN/RDP Laptop Usage instructions:

VPN/RDP Laptop Usage instructions: VPN/RDP Laptop Usage instructions: This document details how to use the laptops provided to users which connect to the secure NEST environment using VPN connectivity. Note that these instructions do not

More information

Client Installation Guide

Client Installation Guide GENView Provisioning and Portals Portal Server Client Installation Guide Release: 9.4 Document revision: 03.01 Describes the steps for installing the GVPP-PS client application. www.genband.com 630-01903-01

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

VA REMOTE ACCESS (updated 12/20/16)

VA REMOTE ACCESS (updated 12/20/16) VA REMOTE ACCESS (updated 12/20/16) (PROBLEMS: CALL PIV NATL HELP DESK @ 855-673-4357, choose Option 6 and then Option 2) 1. REQUEST VA REMOTE ACCESS (YOU MUST BE AT THE DALLAS VA TO REQUEST): Go to https://vpnportal.vansoc.va.gov/selfservice/userlogin.aspx

More information

Velocity Certificate Checking Service Installation Guide & Release Notes

Velocity Certificate Checking Service Installation Guide & Release Notes Copyright 2017-2018, Identiv. Last updated April 5, 2018. Velocity Certificate Checking Service 3.6.7.197 Installation Guide & Release Notes Overview This document provides information about version 3.6.7.197

More information

Oracle Enterprise Single Sign-on Authentication Manager

Oracle Enterprise Single Sign-on Authentication Manager Oracle Enterprise Single Sign-on Authentication Manager Installation and Setup Guide Release 10.1.4.0.4 E10559-01 November 2007 , Release 10.1.4.0.4 E10559-01 Copyright 2006-2007, Oracle. All rights reserved.

More information

FH Remote Access Last Updated: July 3, 2013

FH Remote Access Last Updated: July 3, 2013 FH Remote Access Last Updated: July 3, 2013 1. Remote Access at Fraser Health... 1 2. Cisco VPN Client Software on an FH Laptop... 1 3. Cisco VPN Client Software on a Non-FH Computer/Laptop... 1 1. Download

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

Defense Civilian Personnel Data System (DCPDS) DCPDS Portal User Guide

Defense Civilian Personnel Data System (DCPDS) DCPDS Portal User Guide Defense Civilian Personnel Data System (DCPDS) DCPDS Portal User Guide 1 Introduction Defense Civilian Personnel Data System (DCPDS) Portal Registration is designed to allow Human Resources (HR)/My Biz/My

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

TWIC / CAC Wiegand 58 bit format

TWIC / CAC Wiegand 58 bit format This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart

More information

Getting started with the ISIS Community Portal-

Getting started with the ISIS Community Portal- Getting started with the ISIS Community Portal- Creating an ISIS account- 1. In your web browser navigate to the ISIS portal site- http://www.isis.org and click Register in the upper right corner. If you

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

RSA Authentication Manager Adapter User Guide

RSA Authentication Manager Adapter User Guide IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04 IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04

More information

Web CCaR Login Troubleshooting Guide

Web CCaR Login Troubleshooting Guide Web CCaR Login Troubleshooting Guide Web CCaR Login Troubleshooting Guide ALTESS Implementation Copyright 2015 by Integrated Data Services, Inc. All rights reserved. No part of this copyrighted work may

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2 Cisco - Installing and Configuring Extension Mobility Using Either: Extended Services 2... Page 1 of 90 Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS

More information

Security Cooperation Information Portal

Security Cooperation Information Portal June 2017 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 5 Warning

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc. ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet

More information

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 New in Release: Secomea Release 8.0 This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 Table of Contents Change log 4 1. Release 8.0 4 Highlights 4 2. General 6 2.1. New

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Regular User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information is

More information

Rating Chain Tool. User s Guide. Version 4.2

Rating Chain Tool. User s Guide. Version 4.2 Rating Chain Tool User s Guide Version 4.2 Fort Knox, KY 19 SEPTEMBER 2017 UNCLASSIFIED 1 THIS USER S GUIDE WILL UPDATE AS THE RATING CHAIN TOOL CONTINUES TO DEVELOP, WITH ENHANCEMENTS AND FEATURES ADDED.

More information

DLA J62D Information Operations DSS Mainframe CAC Registration Guide for (MUA) Production End-Users September 2016

DLA J62D Information Operations DSS Mainframe CAC Registration Guide for (MUA) Production End-Users September 2016 CONTROLLED UNCLASSIFIED INFORMATION DLA J62D Information Operations DSS Mainframe CAC Registration Guide for (MUA) Production End-Users September 2016 Table of Contents ABOUT THIS DOCUMENT... 3 1.0 INTRODUCTION...

More information

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

Deployment User Guide

Deployment User Guide Deployment User Guide Version: 010319-2 Contents STEP 1: (Windows Users Only): Determine if your PC is running the 32-bit or 64-bit version of Windows. If you are not a PC user, please proceed to step

More information

Velocity Certificate Checking Service Installation Guide & Release Notes

Velocity Certificate Checking Service Installation Guide & Release Notes Copyright 2017, Identiv. Last updated August 14, 2017. Overview Velocity Certificate Checking Service 3.6.6.184 Installation Guide & Release Notes This document provides information about version 3.6.6.184

More information

Identity and Access Management (IAM) Platform User Guide

Identity and Access Management (IAM) Platform User Guide Identity and Access Management (IAM) Platform User Guide July 2018 Copyright 2018 Exostar LLC. All rights reserved 1 Version Impacts Date Owner Identity and Access Management View Complete Email Address

More information

Premium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape)

Premium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape) Premium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape) This guide is to be used if you intend on installing enterprise as a stand alone application on one

More information

NIC Portal eauthentication System Integration: A Transition Guide for NIC Portal Users

NIC Portal eauthentication System Integration: A Transition Guide for NIC Portal Users NIC Portal eauthentication System Integration: A Transition Guide for NIC Portal Users Background The National Information Center Application Portal (NIC Portal) is integrating with the USDA eauthentication

More information

Persistent Data Transfer Procedure

Persistent Data Transfer Procedure This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or 5.6 data into Cisco ISE, Release 1.4 system using the migration tool. Exporting Data from Cisco Secure ACS, page 1 Analyzing

More information

Skyline Healthcare Getting Started Guide for New Users

Skyline Healthcare Getting Started Guide for New Users Skyline Healthcare Getting Started Guide for New Users Welcome to the Skyline Healthcare network. Below are some helpful directions for accessing our network services as well as contact info for your IT

More information

Privileged User Access and Management

Privileged User Access and Management Privileged User Access and Management EPUAS/VDI PMO DISA 2017 June UNITED IN IN SERVICE TO OUR NATION 1 Disclaimer The information provided in this briefing is for general information purposes only. It

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information

User Manual. Copyright Thursby Software Systems, Inc. February 2015 Revision 4

User Manual. Copyright Thursby Software Systems, Inc. February 2015 Revision 4 PKard Reader User Manual Copyright 2012-2015 Thursby Software Systems, Inc. February 2015 Revision 4 Description PKard Reader (app) is a mobile web browser that enables smart card authentication. PKard

More information

Participant Portal quick guide

Participant Portal quick guide Participant Portal quick guide Click to expand the table of contents... How to register an organisation What to do if a similar organisation is found How to add a document How to register an organisation

More information

USER GUIDE May 4,

USER GUIDE   May 4, USER GUIDE http://www.cpms.osd.mil/ May 4, 2015 1 MyBiz+ for Managers and Supervisors User Guide Use control button and mouse click (Ctrl + Click) to follow hyperlinked words leading to helpful screenshots

More information

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised Regions OnePassSM USER GUIDE Regions Bank Member FDIC Revised 110614 It s time to expect more. Regions OnePass User Guide Table of Contents Section I. OnePass Basics 3 What Is OnePass? 3 Minimum Browser

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software

More information

USAG ITALY Vicenza Military Community AtHoc Users Guide

USAG ITALY Vicenza Military Community AtHoc Users Guide USAG ITALY Vicenza Military Community AtHoc Users Guide Current as of 1 Oct 2015 STEP 1: Access the AtHoc Self Service Application. 1. To access Select Show hidden icons at the bottom right hand corner

More information

XFINITY Welcome Packet

XFINITY Welcome Packet XFINITY Welcome Packet Welcome! Your building comes with a fast, reliable property-wide WiFi network as well as access to our popular XFINITY TV video streaming service for university students. In the

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Introduction. Introduction

Introduction. Introduction Introduction Introduction This manual describes the outline of SSCom and the operation method of SSCom Client. It also describes the manual that you need to refer to when using the SSCom. Target Readers

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Accessing Insurance Portal/PAS Job Aid Single Sign-On

Accessing Insurance Portal/PAS Job Aid Single Sign-On Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal

More information

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network Welcome to Remote Access Services (RAS) Our goal is to provide you with seamless access to the TD network, including the TD intranet site, your applications and files, and other important work resources

More information

Using VMware View Client for Mac

Using VMware View Client for Mac May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Sub Rosa for ios. User Guide. Copyright Thursby Software Systems, Inc.

Sub Rosa for ios. User Guide. Copyright Thursby Software Systems, Inc. Sub Rosa for ios User Guide Copyright 2011-2017 Thursby Software Systems, Inc. Description 3 Installing and First Launch 3 Using Sub Rosa 4 Gestures 5 Sub Rosa User Interface 5 1. Card Slot Status 5 2.

More information

SecuRemote for Windows 32-bit/64-bit

SecuRemote for Windows 32-bit/64-bit SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Connecting to the NJITSecure wireless network.

Connecting to the NJITSecure wireless network. Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to

More information

Remote Access. Application Viewer User Guide

Remote Access. Application Viewer User Guide Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of

More information

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Prerequisites An activated MyID account is required to use ResNet s wireless network. If you have not activated your MyID account,

More information