


PIV credentials are standardized as well. PIV credentials are highly resistant to identity fraud, tampering, counterfeiting, and exploitation. PIV credentials allow for a high level of assurance in the individuals that access your resources, because they are only issued by trusted providers to individuals that have been verified in person. Why is PIV usage important?Īgency security is enhanced when PIV credentials are used for authentication to agency systems and facilities. Please contribute and share your lessons for configuring systems or applications, tuning considerations, code, common challenges, troubleshooting errors, as well as anything else you think would be helpful for your colleagues. We also cover applications, and guidance for developers and users - which need your input! Using PIV for network authentication (smartcard logon).The basics of getting started with PIV credentials and.What information is in these PIV guides?įirst, we cover the basics of PIV credentials, including: When put together into a PIV credential, it provides the capability to implement multi-factor authentication for networks, applications, and buildings. PIV credentials have certificates and key pairs, pin numbers, biometrics like fingerprints and pictures, and other unique identifiers. What is PIV?Ī PIV credential is a US Federal governmentwide credential used to access Federally controlled facilities and information systems at the appropriate security level. Read on to learn more about PIV credentials. Create a new Issue to ask a question or share information with others. Review the Issues for questions and lessons that are in progress. If you cannot find a particular topic, it may still be in development. Using PIV for physical access is available in the PACS Guide. The guides focus on using PIV credentials for logical access such as authenticating to networks or applications, or digitally signing and encrypting. These guides are open source and a work in progress and we welcome contributions from our colleagues.
#Cac read for mac 2013 verification
These Personal Identity Verification (PIV) Guides are intended to help you implement common PIV configurations at your organization.

Personal Identity Verification Guide Introduction
