DHS ID & CREDENTIALING INITIATIVE IPT MEETING
|
|
- Alan Barnett
- 6 years ago
- Views:
Transcription
1 DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02
2
3
4 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5 smart card capable of encoding both physical and logical access credentials in a single integrated issuance process from a single issuance station. The following cards shall be supported: Axalto Cyberaccess 64K v1 SM4.1 GEMPLUS GEMExpresso Pro 64K v1 Issue cards to only valid persons existing in the authoritative DHS Certificate Authority Repository data source, MS Active Directory 2003 Issue cards through a workflow-oriented operator portal according to the issuance flow outlined. Provide no allowance for cardholder data additions or modifications to source data at the time of issuance (other than the cardholder photograph). All data relevant to the card shall be available and validated prior to issuance Seamlessly integrate Active Directory authoritative cardholder data with an external JDBC personnel data source for single-step card personalization (Contact Chip and DESFire encoding, and printing)
5 IMS/CMS Functional Specification Card Topology, Photography, and Printing Using a Fargo HDP600LC Smart Card Printer, print the front and back of the smart card in accordance with the card topology and data elements identified Generate and Print PDF417 and Code 39 Bar Codes in accordance with the requirements Capture a 300 DPI cardholder photograph using the Canon G5 camera. The photograph capture interface shall provide for photo cropping and enhancement in color, contrast and white balance. The final resulting photograph shall be stored to the enterprise MS 2003 Active Directory repository.
6 IMS/CMS Functional Specification Logical Access Issuance Requirements Issue a Java Card 2.1 smart card in accordance with Global Platform version 2.0 standards for Secure Channel card communications to the ICC for all key-related operations Issue a card with the card data model profile as specified Issue a card with three X.509 compliant PKI certificates to the card from a MS Windows 2003 CA using customized DHS certificate templates as detailed in Appendix E to perform the following functions. All certificates shall be issued using 1024 RSA encryption. The CMS and CA shall provide for escrow and recovery of the encryption certificate private key. Windows PKI logon with fingerprint biometric authentication to DHS Net Domain Signing (Outlook) encryption (Outlook) Client side Web site authentication through MS Internet Explorer 5.5, 6.0 and Netscape Navigator 6.2 for Windows Issue a card capable of ICC authentication using Match On Card (MOC) fingerprint biometrics applet incorporating a BSP from Precise Biometrics. Biometric authentication shall be the default method of authentication in lieu of PIN entry. Provide for enrollment of 2 fingerprints during original card issuance, only one fingerprint bring required for access, the other as an alternate backup Provide for full life cycle management of smartcard holders, including the following; Cardholder and certificate suspension and resumption Cardholder and certificate termination and card recycle for subsequent use Provide middleware client compatibility with Corestreet OCSP CRL validation authority. Provide middleware compatibility with the DoD CAC card to read CAC data and certificates. Provide middleware compatibility (read and enrollment of fingerprint templates) for Precise Biometrics BSP and fingerprint biometric Match on Card (MOC) functionality.
7 IMS/CMS Functional Specification Physical Access Issuance Requirements Issue a DESFire encoded card capable of providing physical access credentials necessary to authorize access to doors controlled by Lenel OnGuard System. Specifically, encode the DESFire contactless chip with the following information in a free read/write access control condition A single Fingerprint Biometric template A unique individual FASC Number for each cardholder generated by the CMS at issuance according to Cardholder Unique ID (CHUID) FASC-N specification With each card issued, automatically post cardholder and badge data/status information from the CMS and the physical access system. Only card issuance operations occurring in the CMS are currently synchronized with the physical access system.the following life cycle operations are not supported: Card Suspension Card Termination Card Replacement DESFire encoded cards shall be compatible with physical access door readers from Precise Biometrics using Match-on-Reader (MOR) fingerprint biometric authentication functionality
8 7. Physical and Cyber Access Systems Integration DHS Card Issuance System HR DHS Physical Security Define access rights to physical infrastructure Issue Badge Cardholder Data Preparation and HR / Provisioning System Provision User De-Provision User Define access rights to logical Infrastructure Capture Photo, PIN and Biometrics Encode Contact and Contactless Smart Card Backward Compatible Badging Functions PACS Client PACS Security Server PACS Interface Users Groups Roles Notify changes in card state CMS APIs CMS Logical Security Server Issue Badge Source: Lenel
9 Physical and Cyber Access Systems Integration Physical Access Readers Contactless (ISO 14443) Interface PIN or Fingerprint Biometrics Compliant to PACS Tech Info Guidance from PAIIWG Working with any Head-end systems and Controllers Interface between PACS Server and IMS/CMS Server Push down Cardholder Info from IMS/CMS to PACS Exchange Cardholder Status for Card Life Cycle Management Working toward a Common Life Cycle and Badging APIs Working with any Head-end Systems Suppliers Source: Lenel
10 Cardholder Database Preparation Prototype for Future Data Collection HQ PSAMS DAC Smart Card Issuance System HQ AD Cardholder Database HQ E-Dir
11 Agency A Data Master Cardholder Database Enterprise View Agency B Data Cardholder Data Exchange DHS Master Cardholder Database DHS Card Management System Agency C Data Collects, verifies and transforms data from different systems. A centralized repository for Card Holder Data. Provides the mechanism to generate DHS Access Cards (DAC).
12 DHS I&C System Architecture 1120 Vermont Ave DIMC Lab Forrestal BLDG. 7th & D HQ AIMS Issuance Server Microsoft 2003 Machine CA HR AD/DC DOE Fargo Card Printer AIMS Issuance Station DIMC Net PIX FIREWALL DCN DHS Net Office Of Security PIX FIREWALL Lenel PACS Server Microsoft 2003 CA Other DHS Networks Meta Connector CoreStreet OCSP Validation Authority CRL Web Server CoreStreet OCSP Responder
13 DHS PKI-PKE Architecture PKIs CA, RA, Repository (certs, CRLs) Validation Authority/ Responder LANs Validation Responder Secure Secure Web Server Database Directory/ Authentication Database Physical Access Servers
14 DHS Relying Parties for DAC DHS Infrastructure Transformation Program (Smart Card Logon, Secure ) Homeland Secure Data Network (HSDN) emerge2 The DHS Consolidated IT Irastructure will serve the majority of the 180,000 DHS employees. The goal of the IT Infrastructure Transformation is for the Department to be able to share data from any point in DHS to any decision maker. The program seeks to remove lag time and complexity in accessing data, to create a robust platform on which to quickly launch new capabilities and to provide a cost-effective and reliable infrastructure. HSDN is an enterprise-wide classified network system, and provides shared services for DHS OEs, other Federal agencies, and State and Local governments; with specific controlled interconnections to Intelligence Community and Federal Law Enforcement resources. The mission of this program is to transform the business and financial management policies, processes and systems of DHS into a single solution that addresses the financial management, acquisition and asset management requirements for the department.
15 DHS Relying Parties for DAC First Responder s Portal Enterprise Web Services Web portal to coordinate all First Responder sites. The vision of this project is to consolidate existing and planned Web pages and Platforms of all the DHS component organizations, including the corporate Internet and Intranet sites. Disaster Management (DisasterHelp.gov) SAFECOM Joint disaster Management egov initiative EP&R/DHS sponsor. Federal umbrella program coordinating standards, policies, procedures, and research and development to enable public safety across local, tribal, state, and federal organizations to improve public safety response through more effective and efficient interoperable communications. GeoSpatial One Stop Part of a multi-agency business case. Department of the Interior (DOI) is the managing partner.
16 DHS Relying Parties for DAC etravel Part of a multi-agency business case. GSA is the managing partner. Business Gateway etraining (GoLearn) Part of a multi-agency business case. Office of Personnel Management (OPM) is the managing partner. erecords Management Part of a multi-agency business case. National Archives and Records Administration (NARA) is the managing partner. Recruitment One-Stop Enterprise HR Integration (EHRI) Part of a multi-agency business case. OPM is the managing partner. Part of a multi-agency business case. OPM is the managing partner.
17 DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 End of Document
Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005
Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that
More informationInteragency Advisory Board Meeting Agenda, February 2, 2009
Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,
More informationKeith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002
Physical and Logical Security Solutions Smart Card Alliance Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002 1 Outline Homeland Security Mission Spectrum Market Assessment Identification
More informationFederated Access. Identity & Privacy Protection
Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationMAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User
More informationDoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics
DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationInteragency Advisory Board Meeting Agenda, Tuesday, November 1, 2011
Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationTWIC / CAC Wiegand 58 bit format
This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart
More informationUnified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform
Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800 116 (HSPD 12) in a Trusted FICAM Platform In Partnership with: Introduction Monitor Dynamics (Monitor)
More informationHelping Meet the OMB Directive
Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More informationConsiderations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility
Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility A Smart Card Alliance Physical Access Council White Paper Publication Date: September 2006
More informationThere is an increasing desire and need to combine the logical access and physical access functions of major organizations.
Introduction There is an increasing desire and need to combine the logical access and physical access functions of major organizations. This can be as simple as merely having an access card that can be
More informationManaging PIV Life-cycle & Converging Physical & Logical Access Control
Managing PIV Life-cycle & Converging Physical & Logical Access Control Ramesh Nagappan Sun Microsystems ramesh.nagappan@sun.com Smart cards in Government Conference Oct 23, 2008 Ronald Reagan International
More informationADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.
ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationSecuring Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS
Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects
More informationCredentialing Project Technical Architecture
Credentialing Project Technical Architecture Presented to Transportation Industry Association Stakeholder Meetings April 11-29, 2002 1 Agenda Overview of High Level Architecture Vision Components of Architecture
More informationInteragency Advisory Board Meeting Agenda, February 2, 2009
Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,
More informationPhysical Access End-to-End Security
Physical Access End-to-End Security Smart Card Alliance Smart Cards in Government-2003 July 16, 2003 Physical Access 3:45 PM Robert Merkert Director, Strategic Accounts All Company and/or product names
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationIMPLEMENTING AN HSPD-12 SOLUTION
IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com
More information(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US
(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com
More informationSecure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories
Secure Solutions l l l l BridgePointTM solutions that will take your security system to the next level EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible
More informationSphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data
Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker
More informationInteragency Advisory Board (IAB) Meeting. August 09, 2005
Interagency Advisory Board (IAB) Meeting August 09, 2005 Agenda National Institute of Standards and Technology (NIST) Discussion on Reference Implementation and Conformance Testing IAB Working Group Updates
More informationVersion 3.4 December 01,
FIXS OPERATING RULES Version 3.4 December 01, 2015 www.fixs.org Copyright 2015 by the Federation for Identity and Cross-Credentialing Systems, Inc. All Rights Reserved Printed in the United States of America
More informationCryptologic and Cyber Systems Division
Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop Access Security Usage Models for PIV I Trusted Identity Credentials Roger Roehr
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationUsing PIV Technology Outside the US Government
Using PIV Technology Outside the US Government Author: Bob Dulude Publishing: 10/19/15 Introduction A common perception of many who have heard of the US Government s Personal Identity Verification (PIV)
More informationInteragency Advisory Board Meeting Agenda, Wednesday, February 27, 2013
Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 1. Opening Remarks 2. Discussion on Revisions Contained in Draft SP 800-63-2 (Bill Burr, NIST) 3. The Objectives and Status of Modern
More informationg6 Authentication Platform
g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment
More informationServices Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016
Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version Document Approval Document Approved By Date Approved Name: Brian Purdy??/??/2016 ii Revision
More informationMobile Validation Solutions
227 Mobile Validation Solutions John Bys Executive Vice President Copyright 2007, CoreStreet, Ltd. Who has requirements? Maritime Safety Transportation Act Ports / MTSA Facilities Vehicle check points
More informationPhysical Access Control Systems and FIPS 201
Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 1 This presentation was developed by the Smart Card Alliance Physical Access Council. The goals of
More informationSecure Lightweight Activation and Lifecycle Management
Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationIdentity Management (IdM) is a crosscutting focus area for DHS
DHS & Identity Management Anil John Telephone: (443) 778-0612 Email: anil.john@jhuapl.edu 1 Identity Management (IdM) is a crosscutting focus area for DHS Enabling Homeland Capabilities EHC #1: Cross-Agency
More informationWill Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?
Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California
More informationBiometric Use Case Models for Personal Identity Verification
Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April
More informationSymantec Managed PKI Overview. v8.15
Symantec Managed PKI Overview v8.15 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationPower LogOn s Features - Check List
s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationStrong Authentication for Physical Access using Mobile Devices
Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451
More informationLeveraging HSPD-12 to Meet E-authentication E
Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy
More informationBiometrics & Smart Cards In Use Today
Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationJrsys Mobile Banking Solutions
Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile
More information000027
000026 000027 000028 000029 000030 EXHIBIT A 000031 Homeland Security Presidential Directive/Hspd-12 For Immediate Release Office of the Press Secretary August 27, 2004 Homeland Security Presidential Directive/Hspd-12
More informationUsing the Prototype TWIC for Access A System Integrator Perspective
Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage
More informationEmergency Response Official Credentials: An Approach to Attain Trust in Credentials across Multiple Jurisdictions for Disaster Response and Recovery
Emergency Response Official Credentials: An Approach to Attain Trust in Credentials across Multiple Jurisdictions for Disaster Response and Recovery A Smart Card Alliance White Paper Publication Date:
More informationDFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.
More informationOracle Enterprise Single Sign-on Authentication Manager. Release Notes Release E
Oracle Enterprise Single Sign-on Authentication Manager Release Notes Release 10.1.4.1.0 E12622-01 October 2008 Oracle Enterprise Single Sign-on Authentication Manager Release Notes, Release 10.1.4.1.0
More informationFICAM Configuration Guide
UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 USA Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Overview FICAM Configuration Guide The instructions
More informationCertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS
CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant PACS CertiPath TrustMonitor CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant
More informationPRODUCT INFORMATION BULLETIN
PRODUCT INFORMATION BULLETIN ID-One PIV v2.3.2 The electronic Identity card compliant with US specifications for electronic Table of contents 1. Foreword... 3 2. Introduction to PIV cards features... 4
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationIAB Minutes Page 1 of 6 April 18, 2006
IAB Minutes Page 1 of 6 The Interagency Advisory Board (IAB) meeting convened on Tuesday, April 17, 2006 at 9:15 AM at the Sheraton National Hotel in Arlington. After opening remarks by Randy Vanderhoof
More informationMultiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation
Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Insert Company logo here A Smart Card Alliance Educational Institute Course Multiple credential
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationDesigning and Managing a Windows Public Key Infrastructure
Designing and Managing a Windows Public Key Infrastructure Key Data Course #: 2821A Number of Days: 4 Format: Instructor-Led Certification Track: Exam 70-214: Implementing and Managing Security in a Windows
More informationVSP18 Venafi Security Professional
VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationOperated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA LANL s Multi-Factor Authentication (MFA) Initiatives NLIT Summit 2018 Glen Lee Network and Infrastructure Engineering
More informationDoD Identity & Access Management (IdAM) Portfolio Overview
DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,
More informationTWIC Readers What to Expect
TWIC Readers What to Expect Walter Hamilton Chairman International Biometric Industry Association Walter Hamilton International Biometric Industry Association 1155 F Street, NW Washington, DC 20004 (727)
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationSignCloud. Remote Digital Signature System
SignCloud Remote Digital Signature System All the information in this document is CONFIDENTIAL and can t be used entirely or in part without a written permission from Bit4id SRL. Contents 1. Executive
More informationThe Leader in Unified Access and Intrusion
Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800-116, FIPS 201 and OMB M 11-11 in a High Assurance Trusted FICAM Platform In Partnership with: The Leader
More informationOnGuard Integration User Guide. v
OnGuard Integration User Guide v. 17.01.30 Table of Contents Introduction 1- StoneLock Pro Hardware Configuration 2- Installation 2.1- Installing the SLMS and Service Applications 2.2- Configuring for
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective
More informationInteragency Advisory Board Meeting Agenda, Wednesday, May 23, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationDigitalPersona Altus. Solution Guide
DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationPhysical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005
Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 Copyright 2006 Smart Card Alliance, Inc. All rights reserved. 1 Topics Introduction: PACS Overview
More informationDCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification
DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),
More informationOffice of Transportation Vetting and Credentialing. Transportation Worker Identification Credential (TWIC)
Office of Transportation Vetting and Credentialing Transportation Worker Identification Credential (TWIC) Program Briefing for the American Association of Port Authorities Chicago, IL 27 April 2005 TWIC
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationTruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions
February 2018 TruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions General 1. What is TruCredential software? Datacard TruCredential software suite is a solution for creating,
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop. Scalability: Dimensions for PACS System Growth
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Scalability: Dimensions for PACS System Growth Tony Damalas VP Technology, Diebold Security 8 th Annual
More informationMeeting the requirements of PCI DSS 3.2 standard to user authentication
Meeting the requirements of PCI DSS 3.2 standard to user authentication Using the Indeed Identity products for authentication In April 2016, the new PCI DSS 3.2 version was adopted. Some of this version
More informationIdentiv FICAM Readers
Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad
More informationTWIC Transportation Worker Identification Credential. Overview
TWIC Transportation Worker Identification Credential Overview TWIC Program Vision Goals Improve the security of identity management by establishing a system-wide common credential, universally acceptable
More informationT A B L E O F C O N T E N T S
T A B L E O F C O N T E N T S PREFACE... v 1.0 INTRODUCTION... 1-1 1.1 Purpose... 1-1 1.2 Background... 1-1 1.3 Scope... 1-3 1.4 Organization of this Document... 1-3 1.5 Government Electronic Directory
More informationVMware AirWatch Integration with OpenTrust CMS Mobile 2.0
VMware AirWatch Integration with OpenTrust CMS Mobile 2.0 For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationXenApp 5 Security Standards and Deployment Scenarios
XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards
More informationInteragency Advisory Board Meeting Agenda, April 27, 2011
Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector
More informationNorthrop Grumman Enterprise Public Key Infrastructure Certificate Policy
Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Version 1.9 March 6, 2017 Copyright, Northrop Grumman, 2006 1-1 Document Change History NG PKI Certificate Policy VER DATE INFORMATION
More informationInterfaces for Personal Identity Verification Part 1: PIV Card Application Namespace, Data Model and Representation
Draft NIST Special Publication 800-73-4 Interfaces for Personal Identity Verification Part 1: PIV Card Application Namespace, Data Model and Representation Ramaswamy Chandramouli David Cooper Hildegard
More information