CA3000 Plug-in Manual. Codebench, Inc 6820 Lyons Technology Circle Ste. 140 Coconut Creek, FL 33073

Size: px
Start display at page:

Download "CA3000 Plug-in Manual. Codebench, Inc 6820 Lyons Technology Circle Ste. 140 Coconut Creek, FL 33073"

Transcription

1 CA3000 Plug-in Manual Codebench, Inc 6820 Lyons Technology Circle Ste. 140 Coconut Creek, FL Voice: Fax:

2 This page is intentionally left blank.

3 Contents Chapter 1 About This Manual...1 Who Should Use It...1 Typographical Conventions...1 Related Material...2 Trademarks and Copyrights...2 Chapter 2 System Specifications...3 Hardware Architecture...3 Software Architecture...3 Chapter 3 Site Preparation...5 Card Formats...5 PIV Card Format Options...6 GSA 75-bit Wiegand bit BCD bit...8 Personnel View...10 Enabling PIV View...10 Chapter 4 Configuring the PACS Plug-in...13 PACS Tab...13 Preparing to Register Cardholders...13 PACS Template File...14 Configuring the PACS Database Parameters...18 Chapter 5 Card to PACS Data Mapping...19 Overview...19 PIV Data Elements...19 PACS Data Elements...21 Appendix A...23 Reference Documents...23 Index...25 Rev i

4 CONTENTS This page is intentionally left blank. ii Rev

5 About This Manual This document is divided into the following chapters:..... Chapter 1, About this Manual. Chapter 2, System Specifications, details the hardware and software specifications for the CA3000 Plug-in. Chapter 3, Site Preparation, provides guidance for preparing your existing infrastructure for using PIVCheck software. Chapter 4, Configuring the PACS Service, describes in detail the steps required to install and license the CA3000 Plug-in. Chapter 5, Card to PACS Data Mapping, explains how XML Card to PACS Data Mapping can be customized. Appendix A, Document References, lists the document references in this manual. Who Should Use It This manual is intended for administrators who want to learn how to install and manage the CA3000 Plug-in. Typographical Conventions This document uses the following typographical conventions: Command and option names appear in bold type in definitions and examples. The names of directories, files, machines, partitions, and volumes also appear in bold. Variable information appears in italic type. This includes user-supplied information on command lines. Screen output and code samples appear in monospace type. In addition, the following symbols appear in command syntax definitions. Square brackets [ ] surround user-supplied optional items. Angle brackets < > surround user-supplied values that are required. The construct "C:\" represents a regular Windows command shell prompt. Dollar signs $ represent macro names. Pipe symbol separates mutually exclusive values for a command argument.! This symbol denotes important information or values. This symbol denotes important information or values which are dependant upon additional software or configuration. Not acknowledging this information properly may prevent the software from functioning properly. Rev

6 ABOUT THIS MANUAL Related Material This document should be used in conjunction with the following documentation: Blacklist Plug-ins Guide PACS Plug-in Template XML File Specification PACS Service Manual OMNICheck User Manual PIVCheck Desktop User Manual Trademarks and Copyrights CardAccess is a registered trademark of Napco Security Technologies, Inc. Continental Access is a trademark of Napco Security Technologies, Inc. CardAccess 3000 and CA3000 are copyrighted by Continental Access. Microsoft Windows 7, Microsoft Windows XP, Microsoft Windows CE, Microsoft Mobile, Microsoft.NET, and Microsoft Compact Framework are registered trademarks of Microsoft Corporation. TWIC is a trademark of the United States Transportation Security Administration (TSA). PIVCheck, OMNICheck and PKI at the Door are registered trademarks of Codebench, Inc. PIVCheck Mobile Edition, PIVCheck Desktop Edition, PIVCheck Plus Mobile Edition, PIVCheck Plus Desktop Edition, OMNICheck Plus Edition and PIVCheck Certificate Manager are trademarks of Codebench, Inc. All other trademarked or copyrighted names mentioned herein are the property of their respective owners. 2 Rev

7 System Specifications The CA3000 Plug-in can be installed on the same computer as the CA3000 PACS system, or on a separate computer if necessary. While the most common configuration is for all PIVCheck Desktop and PIVCheck Mobile clients at a site to communicate with a single CA3000 Plug-in, there may be rare cases where a large number of terminals could require multiple computers running the CA3000 Plug-in. This configuration requires additional setup and configuration time and should be done only with the assistance of factory engineers Hardware Architecture A typical hardware configuration is shown below. A smart card reader and fingerprint scanner are attached to a desktop PC, or integrated into a ruggedized PDA, known as a mobile biometric terminal. Regardless of whether PIVCheck is installed on a desktop or integrated into a mobile biometric terminal, the identity verification process is the same. Once a PIV card is inserted into the card reader, the PIVCheck operator collects cardholder data, validates the PIV card with the PKI or TWIC CCL plug-ins, and uploads the captured data to the CA3000 PACS. The physical topology of the PIVCheck system is shown in the next diagram. While the certificate authority, TWIC CCL server, and the local OCSP/SCVP responder are crucial to its functioning properly, they are not part of the PIVCheck product. Software Architecture The CA3000 Plug-in bundle consists of between two and four sub-components, depending on which options are enabled: PACS Server - a TCP-based service that receives data elements extracted from smart card credentials PACS Service Template Engine - a highly configurable component that transforms raw card data elements to a format usable by the CA3000 PACS PACS Plug-in - PACS-specific code that maps card data elements to the CA3000 PACS user and card fields Certificate Manager - an optional service task that periodically revalildates digital certificates associated with cards that have previously registered PACS Service Fixed Reader Service - an optional TCP-based service that provides database and PKI support to high-end FIPS 201 fixed readers Functionally, the PACS Plug-in can perform the following tasks on behalf of PIVCheck mobile and desktop clients: Insert a record into the CA3000 PACS cards table using the data extracted from the smart card Update an existing PIV card record with data extracted from the smart card In addition, the CA3000 Plug-in can: Determine whether a given PIV credential exists in the CA3000 PACS Explicitly suspend a PIV card in the CA3000 PACS when called upon to do so by the Certificate Manager Import credential data from the CA3000 PACS for use with OMNICheck Plus Mobile clients Rev

8 SYSTEM SPECIFICATIONS The functions supported by the CA3000 Plug-in include PACS registration, mapping data from PIV data fields to PACS cardholder fields, and associating PIV cards with PACS badges. In addition, the PKI data stored by the CA3000 Plug-in can be used by the Certificate Manager to periodically check for revoked credentials. Federal Bridge TWIC CCL (Canceled Card List) Internet LAN OMNICheck Plus with PACS Registration OCSP Responder SCVP Responder LDAP Directory Server (PIV, PIV-I, CAC, FRAC) PACS Server PIVCheck PACS Plug-in PIVCheck Certificate Manager PIVCheck Plus Desktop Edition 4 Rev

9 Site Preparation This diagram shows how PIVCheck interacts with a CA3000 PACS CA3000 PACS PIVCheck PACS Server Supported OS: Windows 7 Ultimate Windows 7 Professional Windows Vista Ultimate Windows Vista Business Windows Server 2008 Windows Server 2003 R2 Windows XP SP3 OMNICheck Plus with PACS Registration PIVCheck Plus Desktop Supported OS: Windows 7 Ultimate Windows 7 Professional Windows Vista Ultimate Windows Vista Business Windows Server 2008 Windows Server 2003 R2 Windows XP SP3 Card Formats Card Formats specify the arrangement of data that a reader connected to a controller expects to read from access cards presented. When a person presents an access card at a reader, the reader passes the information encoded in it to the controller. This information is generally a string of bits. Various portions of this string may have specific purposes, which the controller can check while determining if the cardholder should be granted or denied access. For the controller to interpret the numerical string, you must define a card format for CA3000 to download to the controller for use with that reader. There are several well-known PIV card formats. The most popular are: GSA 75-bit (agency code, system code, credential number, expiration date) GSA 48-bit (agency code, system code, credential number) 64-bit BCD (agency code, system code, credential number, credential series code, individual credential series) 200-bit raw (entire 50-byte FASC-N including sentinels, field separators, and LRC) Rev

10 SITE PREPARATION PIV Card Format Options The most common card format produced by PIV card readers is the GSA 75-bit Wiegand format. This format consists of an even parity bit, agency code (14-bits), system code (14 bits), credential number (20 bits), and expiration date (25 bits), and odd parity bit. While this is a very common format, it omits the credential series code (CS), and more importantly, the individual credential issue (ICI). When a person's card is reissued due to loss or theft, the first 15 digits remain the same, and the ICI is incremented by one. Since the GSA 75-bit format omits the ICI, if the lost or stolen card is swiped on a 75-bit Wiegand reader, neither the access panel or the PACS can distinguish between this lost or stolen credential and its replacement. This has obvious security ramifications. GSA 75-bit Wiegand This format consists of the Agency Code, System Code, Card Number, Expiration Date 6 Rev

11 SITE PREPARATION..... For the Name field enter 75-bit GSA. For the Badge Format Type, select PIV (MSB) from the dropdown. Enter a Bit/Char Length of 75. Fill in the PIV and All Types field with the information shown above. Element Bits Start End Even Parity Agency Code System Code Card Number Expiration Date (expressed as YYYYMMDD) Odd Parity Total bit BCD This format includes no parity bits and includes the first 16 significant digits of the FASC-N. Keep in mind that one digit is equal to four bits. Rev

12 SITE PREPARATION For the Name field enter 64-bit. Enter a Bit/Char Length of 64. For the Badge Format Type, select PIV (MSB) from the dropdown. Fill in the PIV and All Types field with the information shown above. Element Bits Digits Start End Agency Code System Code Card Number Credential Series Credential Issue Total bit This format consists of the entire 50-byte FASC-N including sentinels, field separators, and LRC. 8 Rev

13 SITE PREPARATION..... For the Name field enter 200-bit. Enter a Bit/Char Length of 40. For the Badge Format Type, select PIV200 from the dropdown. Fill in the FASC-N 200 and All Types fields with the information shown above. Element Digits Start Agency Code 4 1 System Code 4 6 Card Number 6 11 Credential Series 1 18 Credential Issue 1 20 Personnel Identifier Organizational Category 1 32 Organizational Identifier 4 33 Association Category 1 37 Total 32 Rev

14 SITE PREPARATION Personnel View Enabling PIV View If no PIV badge formats have been created, then PIV card elements will not be available when viewing a cardholder record. 10 Rev

15 SITE PREPARATION..... After you have created a PIV badge format, standard and PIV tabs become available when viewing a cardholder record. By default the details for a Personnel record are set to standard view. Standard view does not display PIV card elements such as agency code, credential series and badge credential. Rev

16 SITE PREPARATION Select the PIV tab shown in the screen capture below to display the PIV elements of a credential. 12 Rev

17 Configuring the PACS Plug-in PACS Tab Preparing to Register Cardholders The process for preparing the server so that it can register cardholder is as follows. 1 Select the PACS tab in the CA3000 Plug-in. 2 Select the correct PACS Template file. To register new cardholders, use template.xml 3 Press OK. 4 Choose Yes to restart the CA3000 Plug-in. 5 After the CA3000 Plug-in has restarted, select the Syncronize Data button from the client (PIVCheck Plus Desktop Edition or PIVCheck Plus Mobile Edition). This will pull down any new configured options from the CA3000 Plug-in server onto the client. 6 Once the Syncronize Data has been completed, you can proceed to validate cards. 7 After a card has been validated, the operator will be prompted whether or not to register the card with the PACS. 8 If the template.xml file was selected, the operator will simply be asked whether or not to register the card with the PACS. No other information will be required. Rev

18 CONFIGURING THE PACS PLUG-IN PACS Template File Select the PACS tab to configure your PACS template file and establish a connection to your PACS server. Make sure you have specified the right path for the template you wish to use in your application. Verify the value in the PACS Template file entry field in the PACS tab of the Server Configuration dialog:! Copies of the factory template files are stored in the templates/factory subdirectory as read only files. The template files in this subdirectory will be removed on uninstall and updated on upgrades, but the files in the /templates directory will not be modified. 14 Rev

19 CONFIGURING THE PACS PLUG-IN..... Registering New Cardholders The CA3000 Plug-in provides a template.xml file that contains XML-based instructions for mapping smart card data elements to CA3000 PACS cardholder fields. The template can be used as-is or can also be modified to suit the site's specific needs. User Fields The CA3000 Plug-in template.xml file provides user fields which demonstrate how non-smart card data in the form of user fields can be included in the data import. User fields define custom data fields that direct the PIVCheck Mobile and Desktop clients to prompt for immediately after a card and its cardholder have been validated. To enable any of the following available user fields, open the template.xml file using a text editor, then locate the appropriate code below that applies to the user field you want to enable and remove the comment tags. After making changes, make sure you save the file, then perform a synchronize data from you PIVCheck and/or OMNICheck clients. A reference copy of the template.xml file is installed in the templates/factory subdirectory. This copy is read-only. More information about creating and editing template files can be found in the PACS Plug-in Template XML File Specification manual located in the CA3000 Plug-in installation directory.! For complete details about customizing the PACS Plug-in for your site, please refer to the PIVCheck PACS Template XML File Specification which accompanies this software distribution. Rev

20 CONFIGURING THE PACS PLUG-IN Displaying a Dynamic List of Access Rights <!-- The following definition for access rights (using a datasource) will only work if you have run data import to populate the pivcheck access rights data table. This provides the user with a dynamic list of the available access rights in the system. Up to 6 access levels can be assigned per card --> <!-- <userfield id="accesslevel.1" description="select Access Level:"> <datasource source="accessrights"/> </userfield> <item> <card pattern="\w+" src="[accesslevel.1]">[accesslevel.1]</card> <pacs>badge.accesslevel.1</pacs> </item> --> Displaying a Hardcoded List of Access Rights <!-- Optionally, access levels can be hardcoded by specifying the access right ID to which the cardholder s card is assigned. Access levels go from 1 to 6 in which N is the access level number. --> <!-- <userfield id="accesslevel.n" description="select Access Level:"> <option value="">none</option> <option value="0">access Level 0</option> <option value="1">access Level 1</option> </userfield> <item> <card>[accesslevel.n]</card> <pacs>badge.accesslevel.n</pacs> </item> --> Setting a Single Hardcoded Access Right <!-- example: hardcoded accedss level ID of 1 - this must exist on the CA 3000 PACS to work. --> <!-- <item> <card>1</card> <pacs>badge.accesslevel.1</pacs> </item> --> 16 Rev

21 CONFIGURING THE PACS PLUG-IN..... Setting a Hardcoded Access Level Date <!-- Access levels can have assigned access level dates. This is optional. N can be from 1 to 6. The access level date N must match the access level N. Example date format: 5/30/ :00:00 AM The $now() macro can also be used to specify an access level date: $now() - today's date and time stamp. $now (+/-N[YMDhmsZ]) N represents the number of units Units are Y (years), M (months), D (days), h (hours), m (minutes), s (seconds) or Z days following next midnight. For instance, $now(+5y) returns the date five years from now. $now(+5z) returns the date 5 days from the next midnight. --> <!-- example: date one month from now --> <!-- <item> <card>$now(+1m)</card> <pacs>badge.accesslevel.date.1</pacs> </item> --> User Defined Fields <!-- User defined fields go from 1 to 48. User defined field values are strings for the most part with the exception of user field 5, 6, 7 and 8 which are to be float --> <!-- <item> <card></card> <pacs>badge.userfield.n</pacs> </item> --> Rev

22 CONFIGURING THE PACS PLUG-IN Configuring the PACS Database Parameters 1 Press the Configure the PACS system button to launch the CA3000 Plug-in Database Options. 2 In the Provider Name drop-down, choose SqlClient Data Provider. 3 For the Connection String field, enter: Server=<Server Name>\SQLEXPRESS;Database=ca27LiveDB<timestamp>;Trusted_Connection=True Server is the SQL Server and instance name for the CA 3000 database. Database is the CA3000 PACS database name (ie: ca27livedb<timestamp> where <timestamp> is the date and time in format MMddyyyy_hhmmsss 4 Click the Test button. This step is essential since the Test button verifies that the the PACS Service is able to connect to the CA3000 PACS database (ca27livedb<timestamp>) with the given connection string. If successful, a Connection OK message is displayed. If an error occurs, details will be displayed in red.! The Test button does not verify connectivity with the database if a different log-in account is used to run the PACS Service. In cases where the database server is on a different computer, or a different log-in account is being used to run the PACS Service, you should test connectivity using SQL Server Management Studio. 18 Rev

23 Card to PACS Data Mapping Overview During the PACS enrollment process, the credentials on a PIV card must be captured and mapped to the data fields managed by the CA3000 Plug-in. This is accomplished using a PACS template file, template.xml. This template file specifies the data elements captured from a PIV card and how they should map to the fixed fields of a temporary cardholder record that can be imported by the CA3000 PACS Automated Import Utility Customized user fields also can be defined to capture additional cardholder data on mobile biometric terminals or desktops. As an example, when a new PIV cardholder is enrolled in the CA3000 PACS, the credentials as well as his PACS badge number can be recorded within the CA3000 Plug-in credential database. This gives Certificate Manager the ability to terminate access to controlled areas by checking the stored credentials against a PKI and/or blacklist and then updating the PACS if a revoked credential is found. For complete details about customizing the CA3000 Plug-in for your site, please refer to the PIVCheck PACS Template XML File Specification which accompanies this software distribution. The next section describes the standard configuration.! Your template file should only be altered by your PIVCheck administrator. PIV Data Elements The following table lists all of the PIV data elements that are available for card to PACS data mapping. PIV Data Element CA3000 Field Description Card Holder Facial Image.Image for Visual Verification Card Holder Fingerprints.Fingerprint I Card Holder Fingerprints.Fingerprint II CHUID.Authentication Key Map Badge.Photo N/A N/A N/A Cardholder photograph. Mandatory biometric data. Max of 2000 bytes. Mandatory biometric data. Max of 2000 bytes. Specified as an optional field. If the Card Authentication Key is symmetric it specifies the cryptographic algorithm and key storage location. CHUID.Expiration Date Badge.ExpireDate The date the card expires. CHUID.FASC-N N/A Federal Agency Smart Credential Number. CHUID.GUID CHUID.Issuer Asymmetric Signature N/A N/A Global Unique Identification Number. It must be present and may include either an issuer assigned IPv6 address or be coded as all zeroes. If the FASC-N begins with 9999, then the GUID is split across CardInt1, CardInt2, and Credential.CardNumber. An optional field written by the FASC-N issuer. It permits validation of the CHUID data with no knowledge of the issuer signing secret. Max bytes Rev

24 CARD TO PACS DATA MAPPING $substring([chuid.fasc-n], 0, 4) $substring([chuid.fasc-n], 4, 4) $substring([chuid.fasc-n], 8, 6) $substring([chuid.fasc-n], 14, 1) $substring([chuid.fasc-n], 15, 1) $substring([chuid.fasc-n], 16, 10) $substring([chuid.fasc-n], 26, 1) $substring([chuid.fasc-n], 27, 4) $substring([chuid.fasc-n], 31, 1) Printed Information.Agency Card Serial Number Printed Information.Employee Affiliation line 1 Printed Information.Employee Affiliation line 2 Badge.AgencyCode Badge.Facility Badge.Number Badge.Series Badge.Issue Badge.PersonID Badge.OrgCat Badge.OrgID Badge.OrgAssoc N/A N/A N/A Agency Code. Identifies the government agency issuing the credential. System Code. Identifies the system the card is enrolled in and is unique for each site. Credential Number. Encoded by the issuing agency. For a given system no duplicate numbers are active. Credential Series. Field available to reflect major system changes. Individual Credential Issue. Initially encoded as 1, will be incremented if a card is replaced due to loss or damage. Person Identifier. Numeric Code used by the identity source to uniquely identify the token carrier. (e.g. DoD EDI PN ID) Organizational Category: 1 Federal Government Agency 2 State Government Agency 3 Commercial Enterprise 4 Foreign Government Organizational Identifier: 1 FIPS 95-2 Agency Code 2 State Code 3 Company Code 4 Numeric Country Code Person/Organization Association Category: 1 Employee 2 Civil 3 Executive Staff 4 Uniformed Service 5 Contractor 6 Organizational Affiliate 7 Organizational Beneficiary Agency Card Serial Number of max 10 digits. Examples of employee affiliation include CONTRACTOR, ACTIVE DUTY, and CIVILIAN. Same as Affiliation Line 1. Max 20 characters. 20 Rev

25 CARD TO PACS DATA MAPPING..... Printed Information.Expiration date Printed Information.Name Printed Information.Issuer Identification X.509 Certificate for Card Authentication.Certificate X.509 Certificate for Digital Signature.Certificate X.509 Certificate for Key Management.Certificate X.509 Certificate for PIV Authentication.Certificate N/A Badge.FirstName Badge.LastName Badge.MiddleInitial N/A N/A N/A N/A N/A The expiration date printed on the card. It should match the CHUID.Expiration Date. Cardholder s full name. The database fields are obtained from macros $firstname([printed Information.Name]), $lastname([printed Information.Name]), and $initials([printed Information.Name]). Max 15 bytes. This key and certificate, if the key is an asymmetric key, supports PIV card authentication for device to device authentication purposes. This key and certificate support the use of digital signatures for document signing. This key and certificate support the use of encryption for the purpose of confidentiality. Used to authenticate the card and cardholder using the Personal Identification Number (PIN). PACS Data Elements The following table lists al of the PACS data elements that can be set using the template file. PACS Plug-in Field Description Badge.Pin Default value is 0 Badge.Enabled Badge.ActiveDate Badge.UseCount Badge.CompanyID Default value is True The current date and time, use macro $now() The use limit for Badge. A use limit of 255 means the card has unlimited uses and is exempt from use limit restrictions. Use limits must be enabled for the site in order for this field to be available. Default value set to 255. Company name in which the badge holder works. This field accepts seventeen alphanumeric characters. Badge.UserField.N User fields where N can be 1 to 48 Badge.AccessLevel.N Badge.AccessTime Badge.APBSet Badge.Contact Badge.ContPhone Badge.DateOfBirth The PACS record ID of the access right to which the cardholder s card is assigned. N is a unique number, N can be 1 to 6. Number of seconds the a door is held unlocked after a successful badge read. The APB setting is a manual method of presetting the Anti Passback status for the cardholder. This field is meant for entering the name of the badge holder's Supervisor. The field accepts twenty one alphanumeric characters. These fields are provided for entering the badge holder's contact phone numbers and their extensions. The fields accept thirty alphanumeric characters each. Badge holder s date of birth Rev

26 CARD TO PACS DATA MAPPING Badge.Dept Badge.DurUse Badge.Embossed Badge.Escort Department name in which the badge holder works. This field accepts seventeen alphanumeric characters. Duration Use allows the setting of a time period duration, due to which, successive reads of the same badge will be blocked, until the timer expires. Serial number printed on the card. Used for notation only. When checked, two badge reads are required at the reader for the Escorted cardholder to gain access. The second badge read must be from a non-escorted type card. Badge.Gender The gender of the cardholder, male, female or unspecified (F, M or U) Badge.GroupNo Badge.InitLoad Badge.Vehicle Badge.License Badge.Location Badge.SSN Badge.Shunt Badge.Track This field is used for selecting a group for database partitioning. The default selection in this field will be None. Control is active when access panel is in interactive mode. Refer to CA 3000 for more information. Description of the badge holder's automobile. The field accepts a maximum of seventeen alphanumeric characters. License Plate number of badge holder's automobile. The field accepts a maximum of eleven alphanumeric characters. Location in which the badge holder works. This field accepts seventeen alphanumeric characters. Badge holder s social security number. The field accepts twelve numeric digits only. When enabled the badge holder's card is set up as a 'shunt card'. Refer to the CA 3000 Help documentation for more information on shunting. Used to track a badge holder s movements troughout a building. When the Tracked check box is enabled (checked) for a particular badge record, a different priority level is assigned to the badge. 22 Rev

27 Appendix A A Reference Documents Federal Information Processing Standard Publication (FIPS 201-1): Personal Identity Verification (PIV) of Federal Employees and Contractors, NIST, March, NIST PIV Program web site, 3 NIST Special Publication : Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology, February NIST Special Publication : Interfaces for Personal Identity Verification Part 1: End-Point PIV Card Application Namespace, Data Model, and Representation, February NIST Special Publication : Interfaces for Personal Identity Verification Part 2: End-Point PIV Card Application Card Command Interface, February NIST Draft Special Publication : Biometric Data Specification for Personal Identity Verification, January NIST Special Publication : Cryptographic Algorithms and Key Sizes for Personal identity Verification, February NIST Special Publication (SP ): Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's), June NIST Draft Special Publication A-1 (SP A-1): PIV Card Application and Middleware Interface Test Guidelines (SP Compliance), March NIST Draft Special Publication B (SP B): PIV Data Model Test Guidelines, July NIST Draft Special Publication B-1 (SP B-1): DRAFT PIV Data Model Conformance Test Guidelines, September 11, NIST Draft Special Publication Rev 1 (SP Rev 1): Codes for Identification of Federal and Federally-Assisted Organizations, April NIST Special Publication : A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), November TWIC Reader Hardware and Card Application Specification Version 1.1.1, May TWIC Technical Advisory TA-2008-TWIC001-V1.0, TWIC Reader Functionality Augmentation, September, TWIC Technical Advisory TA-2009-TWIC001-V1.0, Format for a TWIC Card with no Fingerprint Biometric Data, March, TWIC Technical Advisory TA-2009-TWIC002-V1.0 Additional Error Code Definitions for TWIC Cards, March, TWIC Technical Advisory TA-2011-TWIC001-V1.0 Name Change of HOTLIST to CANCELED CARD LIST, February, TWIC Technical Advisory TA-2011-TWIC002-V1.0 Release of new TWIC Card and Card Applications, July, Smart Card Alliance Publication Number: PAC-07002: Physical Access Control System Migration Options for Using FIPS Compliant Credentials, September Rev

28 APPENDIX A This page is intentionally left blank. 24 Rev

29 Index A About This Manual...1 C Card to PACS Data Mapping PACS Data Elements...21 PIV Data Elements...19 Configuring the PACS Service...13 PACS Tab...13 PACS Template File...14 Registering new cardholders...15 P PACS Database Parameters...18 R Reference Documents...23 Related Material...2 S Server Configuration PACS Tab...13 Site Preparation...5 System Specifications...3 Hardware Architecture...3 Software Architecture...3 T Trademarks and Copyrights...2 Typographical Conventions...1 Rev

pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE , F.0 February Barranca Parkway Irvine, CA 92618

pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE , F.0 February Barranca Parkway Irvine, CA 92618 15370 Barranca Parkway Irvine, CA 92618 pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE 6090-905, F.0 February 2014. Contents 1 Overview... 4 2 CHUID Definition... 4 3 FASC-N

More information

TWIC / CAC Wiegand 58 bit format

TWIC / CAC Wiegand 58 bit format This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart

More information

FICAM Configuration Guide

FICAM Configuration Guide UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 USA Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Overview FICAM Configuration Guide The instructions

More information

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content

More information

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 1. Opening Remarks 2. Discussion on Revisions Contained in Draft SP 800-63-2 (Bill Burr, NIST) 3. The Objectives and Status of Modern

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Physical Access Control Systems and FIPS 201

Physical Access Control Systems and FIPS 201 Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 1 This presentation was developed by the Smart Card Alliance Physical Access Council. The goals of

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop Access Security Usage Models for PIV I Trusted Identity Credentials Roger Roehr

More information

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Insert Company logo here A Smart Card Alliance Educational Institute Course Multiple credential

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800 116 (HSPD 12) in a Trusted FICAM Platform In Partnership with: Introduction Monitor Dynamics (Monitor)

More information

Identiv FICAM Readers

Identiv FICAM Readers Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Using the Prototype TWIC for Access A System Integrator Perspective

Using the Prototype TWIC for Access A System Integrator Perspective Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage

More information

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories Secure Solutions l l l l BridgePointTM solutions that will take your security system to the next level EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Using PKI to Mitigate Leaky Documents (John Landwehr, Adobe) 3. The Digital Identity

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

g6 Authentication Platform

g6 Authentication Platform g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment

More information

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

There is an increasing desire and need to combine the logical access and physical access functions of major organizations. Introduction There is an increasing desire and need to combine the logical access and physical access functions of major organizations. This can be as simple as merely having an access card that can be

More information

No More Excuses: Feds Need to Lead with Strong Authentication!

No More Excuses: Feds Need to Lead with Strong Authentication! No More Excuses: Feds Need to Lead with Strong Authentication! Dr. Sarbari Gupta sarbari@electrosoft-inc.com Annual NCAC Conference on Cybersecurity March 16, 2016 Electrosoft Services, Inc. 1893 Metro

More information

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013 FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS

More information

The Leader in Unified Access and Intrusion

The Leader in Unified Access and Intrusion Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800-116, FIPS 201 and OMB M 11-11 in a High Assurance Trusted FICAM Platform In Partnership with: The Leader

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards

More information

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

BioBridge. IDenticard PremiSys. Quick Start Guide

BioBridge. IDenticard PremiSys. Quick Start Guide BioBridge IDenticard PremiSys Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User

More information

Zodiac iclass OPERATOR GUIDE

Zodiac iclass OPERATOR GUIDE Zodiac iclass OPERATOR GUIDE June 2008 Page 2 of 19 Table of Contents Introduction... 4 PC Requirements... 4 Installing the USB Fingerprint Scanner (Hamster)... 5 Installing the USB Smartcard Programmer...

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-73 Draft Interfaces for Personal Identity Verification I N F O R M A T I O N S E C U R I T Y Information Technology Laboratory National Institute of Standards and Technology

More information

Interfaces for Personal Identity Verification Part 1: PIV Card Application Namespace, Data Model and Representation

Interfaces for Personal Identity Verification Part 1: PIV Card Application Namespace, Data Model and Representation Draft NIST Special Publication 800-73-4 Interfaces for Personal Identity Verification Part 1: PIV Card Application Namespace, Data Model and Representation Ramaswamy Chandramouli David Cooper Hildegard

More information

TWIC Update to Sector Delaware Bay AMSC 8 June 2018

TWIC Update to Sector Delaware Bay AMSC 8 June 2018 TWIC Update to Sector Delaware Bay AMSC 8 June 2018 Agenda TWIC Program Metrics TWIC Next Generation (NexGen Physical Features) Credential Modes of Operation Canceled Card List Mobile App TWIC Assessments

More information

BioBridge. Maxxess efusion. Quick Start Guide

BioBridge. Maxxess efusion. Quick Start Guide BioBridge Maxxess efusion Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Helping Meet the OMB Directive

Helping Meet the OMB Directive Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise

More information

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace. Simplifying Compliance with the U.S. Government Federal Identity Mandate The first in a series of papers on HID Global ss Federal Identity Initiative and Delivery Strategy U.S. government agencies are

More information

Zodiac iclass II OPERATOR GUIDE

Zodiac iclass II OPERATOR GUIDE Zodiac iclass II OPERATOR GUIDE July 2013 Page 2 of 24 Table of Contents INTRODUCTION... 4 PC REQUIREMENTS... 5 INSTALLING THE USB FINGERPRINT SCANNER (HAMSTER)... 5 INSTALLING THE USB SMARTCARD PROGRAMMER

More information

Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E

Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E Approved by: Government Smart Card Interagency Advisory Board Prepared by: Physical Access Interagency

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011 TWIC Implementation Challenges and Successes at the Port of LA 1 July 20, 2011 Agenda Port of LA TWIC Field Test Background Objectives Approach Results Implementation Challenges and Successes! Recommendations

More information

Equitrac Embedded for Sharp OSA

Equitrac Embedded for Sharp OSA Equitrac Embedded for Sharp OSA 1.4 Setup Guide 2014 Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List September, 2014 Updated for Equitrac Office/Express 5.4 April 16, 2013 Updated

More information

VeriScan Desktop Visitor Management, Age Verification, and Data Capture Application

VeriScan Desktop Visitor Management, Age Verification, and Data Capture Application VeriScan Desktop Visitor Management, Age Verification, and Data Capture Application 2002-2019 IDScan.net - Rev. 2.107.3 Table of Contents Introduction 2 System Requirements Installing VeriScan Registration/Updates

More information

DATA SHEET. ez/piv CARD KEY FEATURES:

DATA SHEET. ez/piv CARD KEY FEATURES: Personal Identity Verification (PIV) Card ez/piv Card satisfies FIPS 201, HSPD-12. It allows your users to authenticate to z/os Security Server through the use of a government PIV or CAC Card. KEY FEATURES:

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

Embedded for Xerox EPA-EIP Setup Guide

Embedded for Xerox EPA-EIP Setup Guide Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 8 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

BioBridge. Siemens SiPass. Quick Start Guide

BioBridge. Siemens SiPass. Quick Start Guide BioBridge Siemens SiPass Quick Start Guide Table of Contents Introduction... 3 Support... 3 Before you begin... 4 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

AMPS Snapshot: User Registration External Users

AMPS Snapshot: User Registration External Users Do You Need an AMPS Account? How to Prepare for AMPS Account Registration Not an employee of DLA or DFAS? If you cannot authenticate your identity with a smart card, you can still obtain an AMPS account

More information

Federated Access. Identity & Privacy Protection

Federated Access. Identity & Privacy Protection Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation

More information

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility A Smart Card Alliance Physical Access Council White Paper Publication Date: September 2006

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board Meeting Agenda, April 27, 2011 Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector

More information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US (PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Velocity Certificate Checking Service Installation Guide & Release Notes

Velocity Certificate Checking Service Installation Guide & Release Notes Copyright 2017, Identiv. Last updated August 14, 2017. Overview Velocity Certificate Checking Service 3.6.6.184 Installation Guide & Release Notes This document provides information about version 3.6.6.184

More information

VMware PIV-D Manager Deployment Guide

VMware PIV-D Manager Deployment Guide VMware PIV-D Manager Deployment Guide AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected

More information

TWIC Transportation Worker Identification Credential. Overview

TWIC Transportation Worker Identification Credential. Overview TWIC Transportation Worker Identification Credential Overview TWIC Program Vision Goals Improve the security of identity management by establishing a system-wide common credential, universally acceptable

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-73-2 2 nd DRAFT Interfaces for Personal Identity Verification Part 1: End-Point PIV Card Application Namespace, Data Model, and Representation James F. Dray Scott B. Guthery

More information

Revision 2 of FIPS 201 and its Associated Special Publications

Revision 2 of FIPS 201 and its Associated Special Publications Revision 2 of FIPS 201 and its Associated Special Publications Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov IAB meeting, December 4, 2013 FIPS 201-2

More information

Configuring Personnel and Badges

Configuring Personnel and Badges 9 CHAPTER This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

Leveraging HSPD-12 to Meet E-authentication E

Leveraging HSPD-12 to Meet E-authentication E Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy

More information

Strong Authentication for Physical Access using Mobile Devices

Strong Authentication for Physical Access using Mobile Devices Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451

More information

TWIC Readers What to Expect

TWIC Readers What to Expect TWIC Readers What to Expect Walter Hamilton Chairman International Biometric Industry Association Walter Hamilton International Biometric Industry Association 1155 F Street, NW Washington, DC 20004 (727)

More information

TWIC Reader Technology Phase

TWIC Reader Technology Phase TWIC Reader Technology Phase Deploying and Using TWIC Fixed Readers Lessons learned Bob Samuel Senior Biometric Technology Product MorphoTrak, Inc. June 10, 2009 Seattle, WA 1 Lessons learned while participating

More information

Notification Template Limitations. Bridge Limitations

Notification Template Limitations. Bridge Limitations Oracle Cloud Known Issues for Oracle Identity Cloud Service Release 18.1.2 E55915-17 February 2018 Notification Template Limitations Note the following limitations with Oracle Identity Cloud Service notification

More information

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager Using Workspace ONE PIV-D Manager VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016

Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016 Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version Document Approval Document Approved By Date Approved Name: Brian Purdy??/??/2016 ii Revision

More information

EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide

EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide DATE: 15 JULY 2013 DOCUMENT PERTAINS TO : EASYLOBBY SVM 10.0 / CARDACCESS 3000 CONFIGURATION GUIDE REVISION: REV A Continental 2013 EasyLobby /

More information

OnGuard Integration User Guide. v

OnGuard Integration User Guide. v OnGuard Integration User Guide v. 17.01.30 Table of Contents Introduction 1- StoneLock Pro Hardware Configuration 2- Installation 2.1- Installing the SLMS and Service Applications 2.2- Configuring for

More information

C CURE 9000 Version 2.20 Patch 4 R2

C CURE 9000 Version 2.20 Patch 4 R2 C CURE 9000 Version 2.20 Patch 4 R2 C CURE 9000 Version 2.20 Patch 4 R2 Release Notes September 2014 This Release Notes file provides important information for installing C CURE 9000 Version 2.20 Patch

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 10 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Command Center Access Control Software

Command Center Access Control Software Command Center Access Control Software NextgenID BioAxs System Family: Member Enrollment Primer Mailing Address: NextgenID, Ltd. 10226 San Pedro Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210)

More information

000027

000027 000026 000027 000028 000029 000030 EXHIBIT A 000031 Homeland Security Presidential Directive/Hspd-12 For Immediate Release Office of the Press Secretary August 27, 2004 Homeland Security Presidential Directive/Hspd-12

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Match On Card MINEX 2

Match On Card MINEX 2 Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card

More information

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional Installation Guide for LiNC-NXG 33-10067-001 REV: C PCSC 3541 Challenger Street Torrance, CA 90503

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2. Administrator Guide SC

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2. Administrator Guide SC IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 Administrator Guide SC23-9951-03 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 Administrator Guide SC23-9951-03

More information

Using PIV Technology Outside the US Government

Using PIV Technology Outside the US Government Using PIV Technology Outside the US Government Author: Bob Dulude Publishing: 10/19/15 Introduction A common perception of many who have heard of the US Government s Personal Identity Verification (PIV)

More information

Integrated for Océ Setup Guide

Integrated for Océ Setup Guide Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

DMDC Card Technologies & Identification Systems Division. Evaluation of NIST SP End State Reference Implementation. Version 1.

DMDC Card Technologies & Identification Systems Division. Evaluation of NIST SP End State Reference Implementation. Version 1. DMDC Card Technologies & Identification Systems Division Evaluation of NIST SP 800-73 End State Reference Implementation Version 1.1 October 2005 i Revision History Page Issue Date Document Modification

More information

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc. ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet

More information

PIV Data Model Test Guidelines

PIV Data Model Test Guidelines This publication is available free of charge from http://csrc.nist.gov/publications/ Draft NIST Special Publication 800-85B-4 PIV Data Model Test Guidelines Ramaswamy Chandramouli Hildegard Ferraiolo Ketan

More information

BioBridge. Software House C-CURE Quick Start Guide

BioBridge. Software House C-CURE Quick Start Guide BioBridge Software House C-CURE 9000 Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)...

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide Table of Contents CHAPTER 1 Introduction............................................. 5 Conventions Used in this Documentation.............................................5

More information

SETUP GUIDE BioStar 2 Integration for Milestone XProtect English

SETUP GUIDE BioStar 2 Integration for Milestone XProtect English www.supremainc.com SETUP GUIDE BioStar 2 Integration for Milestone XProtect English Contents Target Audience... 3 Introduction... 4 System diagram... 4 Structural differences between BioStar 2 and XProtect...

More information