Skip Navigation with an Eagle and USA Flag    Home
   Adobe Reader
   Contact Us
IDM Bottom Banner About Us Calendar Site Map
Quick Click:
On August 27, 2004, President Bush signed Homeland Security Presidential Directive 12 (HSPD-12), Policy for a Common Identification Standard for Federal Employees and Contractors, which directs the implementation of a new standardized identity badge designed to enhance security, reduce identity fraud, and protect personal privacy.

> What is HSPD-12?
> FAQs
> Agency Implementation Reporting
> GSA Managed Services Office
> OMB Memo M-06-18
> Government-wide Architecture
   > New! - Backend Attribute Exchange Architecture and Interface Specification

Federal PKI
The Federal Public Key Infrastructure (PKI) uses a security technique called Public Key Cryptography to authenticate users and data, protect the integrity of transmitted data, and ensure non-repudiation and confidentiality. Components of Federal PKI include the Federal Bridge Certification Authority and the Federal PKI Common Policy Framework.

In December 2003, OMB Memorandum M-04-04, E-Authentication Guidance for Federal Agencies, identified four levels of identity assurance and provided instruction to Federal agencies in implementing electronic identity verification for users of online government services.

The Office of Management and Budget designated GSA as the Federal Executive Agent for government-wide acquisitions of products and services required to implement HSPD-12. (OMB Memorandum 05-24)

  What's Hot      
Designation of Federal Emergency Response Officials -
FEMA is finalizing guidance for Federal agencies for determining who should be designated a Federal Emergency Response Official. Click here to view the presentation that provides the latest information on the subject.

Fingerprint Exception Handling Guidelines -
A small quantity of the population have fingerprints that are not attainable due to injury or a natural lack of definition. Click here for guidance from NIST on PIV enrollment when fingerprints are not attainable.

Demonstration Software for PIV Logical Access Applications -
NIST has published two reference model implementations to assist when enabling PIV cards for logical access. Follow this link for more information on the PIV Crypto Service Provider (CSP) and Public Key Cryptography Standards #11 (PKCS #11) modules.