Fact-checked by Grok 2 weeks ago

Common Access Card

The Common Access Card (CAC) is a credit card-sized issued by the (DoD) as the standard identification credential for active duty uniformed service personnel, members, DoD civilian employees, eligible contractors, and certain foreign nationals affiliated with the DoD. It serves as the primary means for physical access to DoD facilities and controlled spaces, as well as logical access to DoD computer networks and information systems, including the (NIPRNet). The CAC incorporates advanced security features to fulfill Presidential Directive 12 (HSPD-12) requirements for strong , digital signatures, and in DoD operations. Development of the CAC began in the late 1990s to standardize identification across the DoD, with the Office of the Secretary of Defense establishing policy on January 16, 2001, and issuance starting in spring 2001 to replace disparate legacy ID cards. By 2006, the DoD updated the CAC to comply with HSPD-12 standards, introducing enhanced interoperability with federal systems and phasing in new cards over time. Eligibility for a CAC is verified through the Defense Enrollment Eligibility Reporting System (DEERS) and processed via the Real-Time Automated Personnel Identification System (RAPIDS) at over 1,500 issuance sites worldwide, with cards typically valid for up to five years depending on the holder's status. Technically, the CAC embeds a 144-kilobyte smart chip containing (PKI) certificates—originally four but reduced to three by 2020—including a DoD PIV-Authentication certificate for user authentication, along with personal data such as name, DoD ID number, rank or grade, and a digital photograph. Access is secured by a (PIN) of 6-8 digits, enabling functions like smart card logon, , and secure web transactions, while color-coding (e.g., green for contractors, blue for non-U.S. citizens) aids visual identification by security personnel. As of the early , the DoD had issued over 17 million CACs, reflecting its central role in enhancing cybersecurity and operational efficiency across military and civilian DoD components.

Introduction and History

Overview and Purpose

The Common Access Card (CAC) is a standardized issued by the U.S. Department of Defense () to uniformed service personnel, members, DoD civilian employees, eligible contractor personnel, and certain foreign nationals affiliated with the DoD, serving as their primary identification credential. Approximately 3.5 million such cards are actively in circulation among DoD-affiliated personnel, including military, civilians, and contractors. The CAC's core purposes encompass personal identification, facilitating physical access to DoD facilities and controlled spaces, and enabling logical access to secure networks and information systems. For military personnel, it also complies with Geneva Convention requirements by providing a standardized in cases of capture as prisoners of war, replacing the use of Social Security numbers with a DoD ID number. To bolster security, the CAC operates on a two-factor model that combines possession of the physical card with knowledge of a user-entered (PIN). The program supports issuance at over 1,500 facilities with more than 2,250 workstations across multiple countries worldwide. It aligns with (FIPS) 201 and ensures interoperability with Personal Identity Verification (PIV) credentials used in federal systems.

Development and Evolution

The development of the Common Access Card (CAC) originated in the mid-1990s amid broader efforts to enhance and IT security, following the Clinger-Cohen Act of 1996 which improved federal IT management. In 1999, Congress directed the Secretary of Defense to implement technology across the to boost security, efficiency, and , leading to the establishment of the CAC program office. An initial pilot emerged from earlier tests in 1996, but the formal program advanced with the issuance of the first CACs in 2001, featuring 500 data elements and 32K memory for basic identification and access functions. The CAC achieved full rollout between 2004 and 2006, replacing legacy paper-based and simpler ID cards used by personnel, with over 10 million cards issued by mid-2006 to enable standardized physical and logical access. Central to this evolution was the integration of (PKI), which embedded digital certificates on the card's chip to support , , and digital signatures, aligning with PKI policy established in 1999 and expanded under Homeland Security Presidential Directive 12 (HSPD-12) for federal credentialing. This PKI foundation transformed the CAC from a basic identifier into a multifunctional , facilitating secure email, network logins, and electronic approvals across systems. Subsequent upgrades focused on strengthening cryptographic protections and addressing emerging vulnerabilities. In 2008, the DoD transitioned CAC encryption from 1,024-bit to 2,048-bit keys, enhancing resistance to computational attacks as part of broader PKI modernization, with the External Certification Authority (ECA) Root becoming operational that year. To mitigate RFID skimming risks from the card's contactless chip, the DoD distributed shielding sleeves starting in 2010 through the Real-Time Automated Personnel Identification System () sites, providing electromagnetic protection for newly issued CACs. By 2018, the magnetic stripe was discontinued from new CACs to eliminate a legacy vulnerability prone to cloning, improving overall tamper resistance without affecting core functionalities. Post-2020 developments emphasized alignment with federal standards and prevention. The CAC's design incorporates features compliant with the REAL ID Act of 2005, serving as an approved alternative credential for accessing federal facilities and bases, particularly as enforcement began on May 7, 2025. In parallel, the introduction of the Next Generation Uniformed Services Identification (USID) card in —began with phased implementation continuing into 2025—extended CAC-like enhancements to non-CAC populations, using durable plastic cardstock and advanced anti-counterfeiting elements such as holograms and to deter . Throughout its evolution, the CAC has prioritized resistance through layered security like firewalled chip applications and biometric-compatible PKI, while incorporating improvements, such as 2015 additions of encircled letters (W for white, G for green, B for blue) alongside color bands to aid color-blind security personnel in visual verification. Current CAC issuance occurs via the system at sites worldwide.

Eligibility and Issuance

Qualification Criteria

The Common Access Card (CAC) is available to individuals requiring physical or logical access to Department of Defense () facilities, networks, or systems. Eligible populations encompass members of the , including the , , , Marine Corps, , and ; and personnel; members on for more than 30 days; full-time paid personnel; civilian employees (both appropriated and non-appropriated fund); select U.S. (USCG) personnel under affiliation; and contractors, including those with security clearances or recurring access needs for at least six months. CAC variants are issued based on the recipient's status and affiliation. Primary holders, such as , reservists, and civilians, receive sponsor cards that enable full access privileges. Dependent family members qualify for dependent cards when sponsored for benefits or limited access. members are eligible for Identification Cards to facilitate protections under during conflicts. Non-DoD affiliates, such as certain foreign nationals or civilians accompanying U.S. forces, may receive Identification Cards for Civilians Accompanying the Armed Forces. Qualification requires sponsorship by a government official or military supervisor, documented via DD Form 1172-2 for entry into the (DEERS). Applicants must provide verification of U.S. (or authorized non-citizen status for select affiliates) through two valid forms of , one bearing a photo. A mandatory background investigation, including an FBI fingerprint check and National Agency Check with Inquiries (NACI) or equivalent, ensures suitability for access; this process can take up to 18 months but allows interim issuance post-fingerprint approval. Non-U.S. nationals require additional vetting, such as security assurances or international agreements. As of the July 2025 DoD Instruction supplement, eligibility criteria remain unchanged from prior policies. Periodic revalidation confirms ongoing eligibility, with CAC expiration aligned to the holder's status—up to 3 years from issuance for U.S. citizen civilians and , or the end of a /deployment for others, whichever is shorter (notwithstanding PKI renewals every three years). Contractors must re-verify needs every six months through the Trusted Associate Sponsorship System (). Ineligible individuals include non-DoD personnel lacking specific contracts or affiliations requiring access. CACs are revoked and must be surrendered upon separation from service, or contract, loss of sponsorship, or failure of background checks, with certificates digitally invalidated to prevent further use. Issuance occurs through the Real-Time Automated Personnel Identification System () network at authorized sites.

Issuance Procedures

The issuance of the Common Access Card (CAC) is managed through the Real-Time Automated Personnel Identification System (), which operates at over 1,400 sites worldwide to facilitate standardized processing for eligible Department of Defense (DoD) personnel. This system integrates with the (DEERS) to verify sponsorship and eligibility prior to card production. Individuals must schedule an appointment via the RAPIDS ID Card Office Online or visit a site during operating hours, often requiring advance booking to manage demand. The core issuance process begins with sponsor verification, where a DoD-approved confirms the applicant's need for using documentation such as DD Form 1172-2. At the RAPIDS site, applicants present two original forms of identification, one bearing a photo (e.g., or ), to authenticate identity. Biometric data is then captured, including a digital photograph and two scans, which are bound to the card's for security. Applicants select and confirm a 6- to 8-digit (PIN) during this step, which is essential for later activation of the card's cryptographic functions. The card is printed and activated on-site at the RAPIDS workstation, completing the in approximately 15-30 minutes if all prerequisites are met. Renewal follows a similar and can be initiated up to 90 days before expiration, with DEERS automatically notifying eligible individuals based on their status updates. For expirations, the process is largely automated, requiring only biometric reverification and a new PIN if needed, without full re-enrollment unless changes occur. Replacement for lost, stolen, or damaged cards involves manual intervention: applicants submit an or report from their security office or sponsor, scanned into DEERS, followed by identity proof and at a site; no fees apply, but delays can occur if documentation is incomplete. Remote options exist via online sponsorship for dependents but are limited for CACs, often necessitating travel to a location. Post-issuance, CAC expiration is tied to the holder's status and role; for example, uniformed service members and civilians receive cards valid for up to 3 years from issuance, while contractors are limited to the contract duration or 3 years, whichever is shorter. Upon separation, , or loss of eligibility, the card must be returned to a site or mailed to the designated facility, triggering immediate deactivation in DEERS and revocation of associated (PKI) certificates. In remote or deployment areas, where fixed sites may be inaccessible, mobile units provide on-site support for issuance and renewal, ensuring continuity for personnel in austere environments.

Physical Design

Card Layout and Materials

The Common Access Card (CAC) adheres to the standard CR-80 dimensions of 3.375 inches by 2.125 inches, equivalent to a size. The CAC complies with ISO/IEC 7810 for physical dimensions and NIST FIPS 201-3 for verification (PIV) requirements, including durability and security features. It is constructed from PVC or materials, providing a balance of flexibility and strength suitable for daily handling. The front side of the CAC displays key identification elements, including a color photograph of the holder, the individual's full name, or (for military personnel), branch of service, Identification (ID) number known as the Electronic Data Interchange Personal Identifier (EDIPI), expiration date, and a signature line. Optional features on the front may include and an organ donor indicator. The back of the CAC includes a machine-readable for automated processing, contact information such as the holder's , and a ghosted secondary for verification. In 2018, the removed the magnetic stripe from the back of all new CACs to mitigate risks of while preserving other functionalities. CAC variants are tailored to different eligibility categories while maintaining the core physical structure. Non-U.S. citizen cards feature a blue bar across the name for quick visual identification, while contractor cards include a green bar. Specialized variants, such as One Base Visitor cards, support temporary access needs at specific installations. The CAC is engineered for durability, resisting bending and everyday wear through its plastic composition, though prolonged exposure can lead to surface degradation. Holographic overlays integrated into the card's provide anti-tampering by revealing alterations under . Visual color coding on variants, such as the blue and green bars, enables rapid status identification by security personnel.

Visual Identification Elements

The Common Access Card (CAC) features a high-resolution color photograph of the cardholder on the front, positioned in the upper left corner, serving as the primary visual identifier for human verification. This passport-style image, captured at a minimum of 300 dots per inch with a plain background, enables security personnel to match the bearer's face to the card during access checks. A secondary ghost image, a faint reproduction of the primary photo, is printed on the back to deter forgery by complicating alteration attempts without detection. While biometric data such as fingerprint templates are stored digitally on the card's chip for electronic authentication, no fingerprints are printed on the surface to maintain privacy and focus on visual cues. Color coding on the CAC distinguishes eligibility categories through a or stripe across the cardholder's name on the front. U.S. and Department of Defense () civilians receive cards without a colored bar (typically white or clear), while U.S. citizen contractors are indicated by a green bar, and non-U.S. citizens by a blue bar. Since July 2013, CACs have included encircled letters under the expiration date—"W" for military and civilian employees, "G" for contractors, and "B" for non-citizens—to assist security officers with impairments in quick identification. Printed textual data on the CAC provides essential human-readable information for verification. The front displays the cardholder's full name in capital letters, the 10-digit DoD Identification Number (EDIPI) as a unique personal identifier, and the in a prominent format (e.g., MMM YYYY). A or seal appears to affirm affiliation, and for applicable personnel such as civilians accompanying the in contingency operations, a reference to Article 4 of the is included to denote protected status. These elements are printed in durable, non-fading ink to withstand daily handling. Security printing techniques embedded in the CAC's design enhance authenticity checks through visual and aided inspection. Microtext—tiny, intricate lettering readable only under magnification—and guilloche patterns, fine-line geometric designs, are incorporated to reveal tampering if the card is altered. UV-reactive inks, visible under light, produce fluorescent elements like hidden images or text, providing a quick verification method for trained inspectors without specialized equipment. These visual elements facilitate rapid human verification at entry points, such as gates or for privileges like access, where guards compare the photo, name, EDIPI, and color coding to presented identification. Integration with barcodes allows supplemental machine reading, but the printed features remain crucial for initial manual scrutiny.

Technical Components

Integrated Circuit Chip

The chip (ICC) embedded in the Common Access Card (CAC) is a contact-based component that serves as the core of its digital security features. Compliant with the ISO/IEC 7816 standard for integrated circuit cards, the chip provides a standardized for data exchange with card readers. Current CACs utilize a chip with 144 kilobytes (KB) of storage capacity, an upgrade from legacy versions that offered 64 KB or 72 KB, enabling enhanced data handling for modern requirements. This capacity houses (PKI) certificates essential for secure operations, including , digital signatures, and . The chip stores four primary PKI certificates: one for (the Personal Identity Verification or PIV authentication certificate), one for digital signatures, one for , and the card authentication key (CAK) for physical , supporting interoperability with federal standards through PIV data objects. Access to these certificates and other stored data is protected by an encrypted PIN, ensuring that private keys remain secure on the chip and require user for operations. In addition to certificates, the chip accommodates selected organizational data, such as affiliation and department details, along with in the form of two index minutiae templates and a digital facial image, while excluding sensitive information like passwords or Social Security numbers (replaced by the ID Number since 2011). Email-related attributes, including those for secure messaging, are also maintained without storing full high-resolution photos to optimize space. Operationally, the chip interfaces via a that connects to compatible readers, facilitating data transmission for applications like network access and document signing. During CAC issuance, the chip undergoes personalization, where , , and other data are loaded and configured to the holder's profile. software, such as ActivClient, is required on host systems to manage certificate access and enable integration with over 28 PKI-enabled applications, though the exact count varies by implementation. This setup supports the chip's role in two-factor authentication when combined with a PIN. Historically, early CAC chips had lower storage and processing speeds, but upgrades around to 144 KB models improved capacity for and compliance, aligning with evolving federal mandates.

Barcodes

The Common Access Card (CAC) incorporates printed barcodes to enable optical scanning for and in environments lacking advanced chip-reading capabilities. These barcodes provide a passive, non-electronic method for accessing basic cardholder information, serving as a compatible to the chip for certain functions. The primary barcode type is the two-dimensional symbology, printed on the front of sponsor CACs and the back of dependent cards. Additionally, a one-dimensional barcode appears on the back of cards to support scanning systems. These encode essential demographic and identification data, including the Personal Identifier (EDIPI), full name, expiration date, rank (for sponsors), branch of service, and a compressed hash of the cardholder's photograph. The format supports up to 1,100 bytes of data, allowing for compact storage of this information without including sensitive elements like personal identification numbers (PINs). The barcode typically contains only the EDIPI for quick legacy reads. The sponsor's barcode facilitates linking to associated dependent records during issuance or verification processes. In practice, the barcodes are scanned using imager-based readers for rapid in low-technology settings, such as manual access points or administrative systems like the Real-Time Automated Personnel Identification System (). Although primary reliance has shifted to the CAC's chip for secure , the barcodes remain for with older infrastructure. The PDF417 implementation adheres to ANSI X3.182 guidelines for print quality, ensuring reliable readability under varied conditions. Its built-in Reed-Solomon error correction (up to 50% redundancy in high-security modes) resists tampering or degradation from wear, enhancing without exposing cryptographic keys.

RFID Technology

The Common Access Card (CAC) incorporates a contactless (RFID) interface operating at 13.56 MHz, compliant with ISO/IEC 14443 Parts 1 through 4, to enable proximity-based interactions for . This feature was introduced in the next-generation CAC starting in 2010, allowing for faster in certain scenarios without requiring a (PIN), thereby streamlining entry at doors and gates. The implementation supports a proximity read range of up to approximately 4 inches (10 cm), facilitating quick scans while maintaining compatibility with DoD-approved readers. The contactless functionality relies on an embedded integrated into the 's structure, extending the capabilities of the primary chip to support dual-interface operations. This enables passive communication, where the is powered by the reader's and transmits a limited data subset from the chip, such as the Electronic Data Interchange Personal Identifier (EDIPI) within the Cardholder Unique Identifier (CHUID) container. The CHUID, which includes the EDIPI, FASC-N, GUID, and expiration date, is transmitted in the clear for basic physical verification, complementing the contact-based chip for hybrid use in more secure environments. Security measures for the RFID interface include the use of shielding sleeves to prevent unauthorized skimming of the broadcast data, as the contactless mode can expose the CHUID to nearby readers without additional encryption. Selective activation is achieved through commands like SELECT for the PIV End-Point applet, ensuring the card does not constantly broadcast and reducing exposure risks. In applications, the RFID feature integrates with CAC-compatible readers at DoD facilities for physical entry, verifying identity via the EDIPI subset to grant access to controlled areas. Despite these protections, the contactless interface is limited to physical access and does not support logical access to networks or systems, reserving such functions for the contact chip. Unshielded cards remain vulnerable to relay attacks, where signals are intercepted and relayed to a legitimate reader, potentially allowing unauthorized entry if the proximity range is exploited.

Security and Encryption

Encryption Standards

The Common Access Card (CAC) utilizes a (PKI) framework grounded in the (DoD) PKI, which issues Version 3 certificates to enable secure digital identities and transactions for DoD personnel. These certificates adhere to the DoD Certificate Policy and support interoperability with the Federal PKI Common Policy, ensuring standardized extensions for key usage and policy identifiers. The framework facilitates certificate-based operations such as and encryption, with all certificates issued under controlled assurance levels to maintain trust in the PKI hierarchy. CACs transitioned to 2,048-bit RSA keys starting around 2010, becoming the standard by 2012 and providing cryptographic strength equivalent to at least 112 bits of security to align with NIST recommendations. Legacy 1,024-bit RSA keys, previously used in earlier card versions, were revoked in 2012 to mitigate vulnerabilities from shorter key lengths, prompting a reissuance of cards with the stronger keys for network access compatibility. This transition enhanced resistance to factoring attacks while supporting efficient on-card key generation using FIPS-approved algorithms like PKCS #1 Version 2.2. The PKI defines distinct key types for specific functions: authentication keys for user to systems, keys for approvals and ensuring in transactions, and keys for protecting via and other secure communications. Private keys for these types are generated directly on the card's using tamper-resistant hardware, preventing export or exposure, and are escrowed only for certificates to enable recovery if needed. Key usage is strictly enforced through v3 extensions, limiting operations to authorized purposes. Cryptographic compliance is achieved via modules validated to FIPS 140-2 (and its successor FIPS 140-3) for secure key management and operations, with DoD requiring Level 2 validation for certificate authorities and at least Level 1 for end-entity processes. The CAC's smart card chips, such as those from approved vendors like Gemalto and Oberthur, are certified to Common Criteria EAL4+ augmented with protections against high-level attacks, ensuring robust physical and logical security. All certificates and stored biometrics are encrypted on-card, while the Cardholder Unique Identifier (CHUID)—a digitally signed structure containing the Federal Agency Smart Credential Number (FASC-N) and expiration data—enables device-level authentication for Personal Identity Verification (PIV) access without requiring PIN activation. The Next Generation Uniformed Services ID Card, introduced in 2020 for retirees and dependents, features an updated plastic design to enhance security against counterfeiting, building on CAC standards. As of 2025, DoD is preparing for post-quantum cryptography transitions under CNSA 2.0, with RSA-2048 supported until 2030 and migration to quantum-resistant algorithms like those in NIST FIPS 203-205 planned for future CAC updates.

Authentication Processes

The authentication processes for the Common Access Card (CAC) employ a two-factor model combining possession of the physical card with knowledge of a Personal Identification Number (PIN), ensuring secure verification for both logical and physical access. The PIN, a six- to eight-digit numeric code selected by the user during issuance, must be entered alongside card insertion into a reader to unlock the chip's data and initiate authentication. To prevent unauthorized access, the card locks after three consecutive incorrect PIN attempts, requiring in-person reset to resume functionality. Core authentication relies on mutual verification through a challenge-response protocol, where the system issues a challenge to the CAC's embedded certificates, and the card responds using cryptographic operations to prove possession and validity. This process draws on Public Key Infrastructure (PKI) certificates stored on the card for secure session establishment. Certificate validation occurs against DoD PKI directories, checking revocation status via Certificate Revocation Lists (CRLs) or Online Certificate Status Protocol (OCSP) responders to confirm the certificate's currency and trustworthiness before granting access. For logical authentication, software interfaces with the CAC to facilitate access to applications such as for email, virtual private networks (VPNs), and secure websites, enabling -based in CAC-enabled browsers like or with appropriate extensions. The handles PIN entry, selection, and cryptographic functions, allowing seamless integration without exposing private keys. Physical authentication involves a compatible reader interfacing with the CAC's chip via or contactless RFID for proximity-based , often without requiring PIN entry for standard doors but mandating it for high-security areas to add a knowledge factor. The reader confirms the card's authenticity and the holder's eligibility by validating stored data against lists. In cases of PIN lockout, reset requires visiting a Real-time Automated Personnel Identification System () workstation, where identity is verified through sponsor documentation or biometric fingerprint matching against Defense Enrollment and Eligibility Reporting System (DEERS) records, followed by selection of a new PIN. Biometrics serve as an optional enhancement in advanced setups for ongoing , though primarily used here for reset verification to ensure only the authorized holder can unblock the card.

Usage and Applications

Physical Access Control

The Common Access Card (CAC) serves as the primary credential for controlling entry to Department of Defense (DoD) facilities, ensuring that only authorized personnel gain unescorted access to installations, buildings, and restricted areas. Issued to active duty military members, selected reservists, DoD civilian employees, and eligible contractors, the CAC facilitates standardized physical access across DoD components by verifying identity and affiliation through multiple verification methods. This system supports secure entry at access control points (ACPs), reducing risks associated with unauthorized intrusion while accommodating varying levels of privilege based on the holder's status. Physical access methods for the CAC include for initial identification at entry points, scanning for quick validation at gates and doors, RFID technology for contactless reading at barriers and turnstiles, and chip readers for higher-security areas requiring additional . Visual checks provide a low-tech backup option, allowing security personnel to confirm the card's authenticity through its standardized design elements like holograms and photos. These methods are integrated into electronic Physical Systems (ePACS) at many installations, where the CAC is scanned to log entries and authorize passage. Common scenarios for CAC use encompass base entry at perimeter gates, access to administrative and operational buildings, and vehicle gate controls, often in conjunction with turnstiles for pedestrian flow or elevator restrictions within multi-level facilities. For instance, at unmanned ACPs, the CAC enables rapid processing during high-traffic periods, such as shift changes, while supporting escorted access for short-term visitors through sponsor-verified temporary passes. These applications ensure efficient movement while maintaining security protocols tailored to the installation's threat level. Access privileges granted by the CAC vary by cardholder type and embedded codes, with full CACs providing broad entry to secure workspaces for and civilian personnel, while dependent family members receive ID (USID) cards limited to areas like family housing, commissaries, and facilities. Contractors and temporary personnel may receive short-term CACs valid for up to 10 days or visitor extensions via sponsor endorsement, restricting access to specific zones without full privileges. These tiered entitlements prevent overreach and align with affiliation requirements. The CAC integrates with DoD-wide systems such as the Defense Biometric Identification System (DBIDS) and the Identity Management Enterprise Services Account (IMESA) for enhanced verification, combining card data with biometric checks like templates at select ACPs to confirm against federal databases. This linkage supports continuous vetting, flagging potential risks such as outstanding warrants before granting access, and helps mitigate on RFID signals through data encryption standards. CACs are issued at over 850 sites worldwide, enabling physical access to facilities globally, with personalized entry logs generated by ePACS reducing incidents of tailgating and unauthorized follow-through by providing auditable trails for each transaction. This infrastructure has strengthened overall installation security, though monitoring varies by military branch.

Logical Access and Network Security

The Common Access Card (CAC) provides robust logical access to Department of Defense () information systems, serving as the standard credential for authenticating users to unclassified networks such as the Non-classified Internet Protocol Router Network (). This enables secure login to DoD email systems, web portals, and applications without relying on passwords alone, leveraging the card's embedded digital certificates to verify identity and establish encrypted sessions. For classified environments like the Secret Internet Protocol Router Network (SIPRNet), the CAC's (PKI) framework supports authentication through compatible tokens, ensuring continuity in credential management across security levels. Additionally, the CAC facilitates email signing and encryption using (), allowing users to digitally sign messages and attachments for and in official communications. It also enables access to productivity software, such as , where users can apply digital signatures to documents to confirm authenticity and prevent tampering. At its core, the CAC employs PKI to enable (SSO) across systems, reducing the need for multiple authentications while maintaining high security through certificate-based validation. Middleware software, such as ActivClient, interfaces with the CAC to activate and manage these certificates, facilitating seamless access to portals, private networks (VPNs), and other networked resources. Certificate usage requires entry of a (PIN) to unlock private keys, adding a knowledge factor to the process. This PKI integration aligns with Instruction 8520.02, which mandates PKI for identity, , and in networks, ensuring compliance with cybersecurity standards for logical access. Furthermore, since the adoption of zero-trust architectures in , the CAC has been incorporated into these models to provide continuous of users and devices, eliminating implicit in network perimeters. Practical examples of CAC deployment include generating digital signatures for official documents via PKI certificates, which embed verifiable user identity and timestamps to support auditability in workflows. integration secures email exchanges by encrypting content and verifying sender integrity, a standard practice for personnel handling sensitive unclassified information. The CAC also integrates with for smart card logon, mapping certificate attributes to user accounts for domain-wide in Windows environments. Enhancements in the Next Generation Uniformed Services Identification (USID) card, which evolves the CAC design, incorporate advanced security features like improved counterfeiting resistance and support for mobile-derived authentication bridges through systems like myAuth. As of 2025, the rollout of the Next Generation USID card continues, with full transition expected by 2026 and legacy cards no longer valid for base access after December 31, 2025. This allows hybrid access using CAC alongside multi-factor methods on mobile devices, expanding secure logical entry points while aligning with evolving zero-trust requirements.

Challenges and Future Developments

Common Operational Issues

Hardware failures in Common Access Cards (CACs) can include , where the separates from the card , potentially leading to complete card malfunction, as observed in applications exposed to environmental stresses. Dirty contacts on the card's surface often cause read errors during insertion into readers, requiring cleaning or replacement to restore functionality, a common issue in high-use DoD environments. Additionally, CACs exhibit fragility in extreme environments, such as deployments in austere or contested areas, where temperature fluctuations, moisture, or physical abrasion accelerate wear on the and embedding layers. PIN-related issues frequently disrupt CAC operations, including lockouts from forgotten PINs after multiple incorrect entries or expiration of the PIN alongside the card's validity period. Resetting a locked or expired PIN requires in-person verification at a site, often involving biometric fingerprint matching against the database, which can delay access if the user is not near a facility. This process necessitates travel, potentially halting logical access to networks, , or secure systems until resolved. Compatibility challenges arise from outdated card readers or middleware software, leading to login failures when the CAC is not recognized by systems running legacy operating systems or unupdated drivers. The magnetic stripe on CACs became obsolete post-2018 following deprecation in federal standards for Personal Identity Verification (PIV) cards, rendering stripe-based readers ineffective for authentication and contributing to errors in transitional environments. Loss or theft of CACs occurs with notable frequency during transit, such as travel between duty stations, compromising sensitive data if not addressed promptly. Immediate deactivation is required upon discovery to prevent unauthorized use, but replacement demands verification from a CAC sponsor or local security office, including documentation confirming the incident, which can slow the reissuance process by days or weeks. In remote or overseas locations, particularly contested areas, access to sites is limited, complicating PIN resets, card renewals, or replacements for deployed personnel. Expired CACs can block access to certain online platforms, such as those under the Uniformed and Overseas Citizens Absentee Voting Act, as systems often require a valid CAC for , potentially denying until renewal at a distant facility. Unshielded RFID in CACs poses minor security risks through potential skimming of contactless data in proximity to unauthorized readers.

Mitigations and Next-Generation Updates

To address common reliability issues with the Common Access Card (CAC), the Department of Defense () has implemented several proactive mitigations. Regular maintenance practices, such as using authorized cleaning kits provided through sites, help prevent reader malfunctions due to debris accumulation on the card's contact chip. Additionally, apps integrated with the (DMDC) systems offer PIN reminders and reset prompts to reduce lockouts from forgotten personal identification numbers. For personnel in remote or deployment environments, mobile units—deployable enrollment stations—enable on-site CAC issuance and updates without requiring return to fixed facilities. Auto-deactivation protocols ensure security by automatically revoking CAC access upon separation from affiliation or failure to respond to lifecycle oversight directives, as outlined in DoD Instruction 5200.46. Security hardening measures further enhance CAC protection against skimming and unauthorized reads. Mandatory use of RFID-blocking shields or sleeves is recommended for cards during storage or transport to prevent proximity-based data interception. Anti-skimming training is incorporated into DoD cybersecurity awareness programs, emphasizing secure handling practices. Biometrics are integrated into the CAC for functions like enrollment verification via stored fingerprint templates, with ongoing federal experiments exploring derived credentials that enable advanced biometric authentication options, potentially supplementing or replacing PIN entry in future systems. These efforts build on prior mitigations, such as the removal of the magnetic stripe in earlier CAC versions to eliminate legacy vulnerabilities. The 2025 rollout of updated CAC designs introduces enhancements for and , transitioning to standardized stock with improved to wear and embedded enhanced holograms for overt anti-counterfeiting features. Preparations for quantum-resistant cryptography are underway, aligning CAC certificates with NIST-approved post-quantum algorithms to future-proof against emerging computational threats, in line with DoD's broader quantum FAQs and transition guidance. Alignment with Real ID standards facilitates smoother civilian transitions for retirees and separated personnel, requiring REAL ID-compliant identification for base access beginning May 7, 2025, while maintaining CAC validity for DoD-affiliated travel. Looking ahead, future directions emphasize reduced physical card reliance through mobile CAC apps and expansions of Personal Identity Verification-Interoperable (PIV-I) credentials for broader federal interoperability. Derived credential initiatives, such as mobile PIV (mPIV) experiments, enable smartphone-based derived from CAC data, paving the way for wallets that store encrypted CAC equivalents for logical access. The 2025 launch of the myAuth replaces the legacy DS Logon, providing modern, cloud-based options including CAC-free access via multi-factor alternatives for over 20 million users. Policy advancements include the 2025 establishment of CAC-enabled access to the Security Assistance Management Manual (SAMM) , improving contractor management by streamlining secure logins for partners and reducing administrative burdens. Additionally, the transition to Next Generation Uniformed Services ID (USID) cards must be completed by December 31, 2025, for retirees and affiliates to maintain base access and benefits.

References

  1. [1]
    DoD Common Access Card - CAC.mil
    The CAC, a "smart" card about the size of a credit card, is the standard identification for active duty uniformed Service personnel.Getting Your CAC · CAC Security · Managing Your CAC · Developer ResourcesMissing: introduction | Show results with:introduction
  2. [2]
    [PDF] Modernizing the CAC - DoD CIO
    Feb 1, 2019 · The Common Access Card (CAC) is the DoD's primary credential for fulfilling these requirements on the Non-Secure Internet Protocol Router ...
  3. [3]
    CHIPS Articles: Common Access Card: Security and Privacy
    Beginning in spring 2001, Department of Defense (DoD) employees began receiving a new identification (ID) card. This card, called the Common Access Card ...Missing: introduction | Show results with:introduction
  4. [4]
    [PDF] DoD Has Over 3.5 Million Insiders – Now What?
    Nov 15, 2021 · DoD employs about 3.5 million military and civilian direct employees, contractors, and reserve personnel. In addition, over 50,000 ...
  5. [5]
    common access card (CAC) - Glossary | CSRC
    Definitions: Standard identification/smart card issued by the Department of Defense (DoD) that has an embedded integrated chip storing public key infrastructure ...<|control11|><|separator|>
  6. [6]
    Next Generation Uniformed Services ID Card - CAC.mil
    The Department of Defense transitioned from its legacy paper-based Uniformed Services Identification (USID) card to a more secure, next generation USID card.Online USID card renewal page · Getting Your ID Card · Managing Your ID Card
  7. [7]
    [PDF] The Clinger Cohen Act of 1996 - DoD CIO
    The ITMRA and FARA were subsequently designated the Clinger Cohen Act of 1996 (CCA), encompassing both. This is the first time in law that Chief Information ...Missing: origins | Show results with:origins
  8. [8]
    [PDF] the Future of DoD Information Superiority - dodccrp.org
    Mar 1, 1999 · • This “DoD Common Access Card (CAC)” will be the Military and ... •Clinger-Cohen Act of 1996. •Chapter 131 of Title 10, Section 2223 ...
  9. [9]
    History of the Common Access Card (CAC) | Security Info Watch
    Mar 20, 2012 · Beginning in October 2006, the DoD launched a new CAC in compliance with HSPD-12, and in November of 2006, published a document entitled “ ...
  10. [10]
    10 years later, CAC is securely part of DoD - Federal News Network
    Feb 23, 2011 · By November 1999, DoD created what became the Common Access Card office and began to create the DoDwide standard for smartcards. A year later ...Missing: introduction | Show results with:introduction
  11. [11]
    [PDF] DoD Instruction 8520.02 "Public Key Infrastructure and Public Key ...
    May 18, 2023 · Approves DoD PKI form factors other than the common access card (CAC) or NSS SIPRNET PKI credential for DoD PKI identity, authentication, ...
  12. [12]
    How is a Smart CAC Card Used in A PKI? - SecureW2
    Jul 1, 2024 · CAC cards, embedded with PKI certificates, are crucial for authentication, encryption, and digital signing within the DoD's security ...
  13. [13]
    Getting Started - DoD Cyber Exchange
    The certificates on your CAC can allow you to perform routine activities such as accessing OWA, signing documents, and viewing other PKI-protected information ...
  14. [14]
    Updates - DoD Cyber Exchange
    The ECA Certificate Policy Version 4.0 has been approved. April 2008, The ECA 2048 bit Root CA is operational. July 2007, IdenTrust was approved as an ECA ...
  15. [15]
    Defense Department order RF shields from National Laminating
    Nov 29, 2010 · The FIPS 201-approved, shielding sleeves are distributed via RAPIDS ID offices worldwide with the issuance of new CACs. The product is ...Missing: RFID | Show results with:RFID
  16. [16]
    DoD Common Access Card > About - CAC.mil
    Starting in the first quarter of calendar year 2018, the Department of Defense (DoD) will begin issuing Common Access Cards (CAC) without a magnetic stripe.Missing: discontinued | Show results with:discontinued
  17. [17]
    CAC Security - DoD Common Access Card
    The CAC—which is roughly the size of a standard credit card—stores 144K of data storage and memory on a single integrated circuit chip (ICC) ...
  18. [18]
    CAC Change Aids Visually Color Impaired Security Officers - War.gov
    Jun 25, 2015 · Security officials will recognize the new format as valid DoD cards on military installations both stateside and overseas, Yousef said.
  19. [19]
    32 CFR Part 161 Subpart B -- DoD Identification (ID) Cards - eCFR
    (2) Eligibility. (i) DoD civilian employees are eligible for this CAC, to include: (A) Individuals appointed to appropriated fund and NAF positions. (B) USCG ...
  20. [20]
    None
    ### Summary of DoDM 1000.13, Volume 1: Eligibility and CAC Details
  21. [21]
    Getting Your CAC
    Applicants for a CAC must be sponsored by a DoD government official or employee. For the majority of CAC holders (Military and DoD Civilian), your sponsor ...
  22. [22]
    None
    ### Summary of DoDI 5200.46 on CAC Eligibility and Related Criteria
  23. [23]
    ID Card Office Online
    Welcome to the RAPIDS ID Card Office Online. Select an option below to update your CAC, manage sponsor or family member ID card information, or find a RAPIDS ID ...
  24. [24]
    CAC Issuance - PFPA
    Two forms of ID are required: One must be a local, state, or federal government-issued ID card that bears a photo (e.g. current building pass, passport, ...
  25. [25]
    Managing Your Common Access Card (CAC)
    Changing Your PIN​​ If you forget your PIN, go to the nearest issuance site, where you will be given the opportunity to prove that you are the owner of the CAC ...
  26. [26]
    Military ID & CAC Cards
    As a veteran, military retiree, or spouse or dependent of a service member, you may be eligible for a Next Generation Uniformed Services ID card.
  27. [27]
    CR80 Card Specification - CardLogix Corporation
    CR80 cards measure 2.13′′ x 3.38′′ (54 mm x 86 mm), with a typical thickness of 30mil. CR80 cards are a popular choice for ID credentials because their size is ...Missing: materials DoD
  28. [28]
    ID and Security Polycarbonate Films - Tekra
    Up to 10 years durability · High optical quality films, manufactured in a clean room environment · High temperature resistance · Excellent laser markability versus ...
  29. [29]
    [PDF] Alternative Uses of Common Access Cards (CAC) to Protect ... - XLsoft
    The front of the CAC contains such information as Organization Seal, Branch of. Service, Color Photograph, Personnel Category, Name, Rank and Pay Grade, Issue.
  30. [30]
    [PDF] DoD Manual 1000.13, Volume 1, "DoD Identification (ID) Cards
    Jan 23, 2014 · The expiration date of the PKI certificates on the CAC shall match the expiration date on the card. (a) DD Form 1173, “United States Uniformed ...Missing: introduction | Show results with:introduction
  31. [31]
    [PDF] removal of magnetic stripe from dod common access cards - CAC.mil
    Oct 23, 2017 · ID card sites are required to exaust their existing magnetic striped card stock prior to using the new card stock without the magnetic stripe.Missing: discontinued | Show results with:discontinued
  32. [32]
    The new change to the CAC - DVIDS
    Aug 6, 2018 · With the removal of the magnetic stripe, CAC carriers will not lose any functionality of their card, but will gain additional security. “We ...Missing: discontinued | Show results with:discontinued
  33. [33]
    Visitor Welcome Center | VWC | Fort Sill | Oklahoma - Army.mil
    The V.A.-issued identification card no longer meets the criteria for installation access. Installation access cards from other DoD installations (for example: ...
  34. [34]
  35. [35]
    [PDF] dod common access card (cac) identification chart - National Guard
    Feb 1, 2013 · Identification and Privilege Card. COLOR CODING. BLUE BAR: NON-U.S. CITIZENS. GREEN BAR: CONTRACTORS. WHITE: ALL REMAINING PERSONNEL. " ச.Missing: variants | Show results with:variants
  36. [36]
  37. [37]
    CAC change aids visually color impaired security officers - AF.mil
    Jun 25, 2015 · The letters will accompany white, green or blue bands across the cards, so security officials who cannot discern color can rely on the letter ...Missing: variants | Show results with:variants
  38. [38]
    Display Chap 3 Sect 3.1 (Change 87, Apr 7, 2025)
    Apr 7, 2025 · Both the CAC and ID cards have an EDIPI printed on or embedded within the card. 2.1.2 The EDIPI is used as a unique person identifier. It is ...
  39. [39]
    Introducing the Next-Generation Common Access Card - DON CIO
    Issuance of next-generation CACs began in October 2006 with an Interim Operational Capability solution and will be phased in throughout the DoD as current CACs ...
  40. [40]
  41. [41]
    [PDF] RAPIDS 7.3 User Guide - SSI LRC
    Nov 5, 2008 · The DD Form 1172-2, “Application for Department of Defense Common Access Card DEERS. Enrollment” is very similar to DD Form 1172 but is used ...
  42. [42]
    jkusner/CACBarcode: Convert scanned CAC barcodes ... - GitHub
    Convert scanned CAC barcodes (PDF417 and Code39) into Python objects with all data parsed - jkusner/CACBarcode.Missing: expiration rank
  43. [43]
    Types of Barcodes: Choosing the Right Barcode - Scandit
    PDF417 codes are used for applications that require the storage of huge amounts of data, such as photographs, fingerprints and signatures. They can hold over 1 ...
  44. [44]
    [PDF] PDF417 - Express Identification Products
    The document ANSI X3.182 "Bar Code Print. Quality - Guideline" presents a standardized methodology for measuring and grading bar code symbols. The PDF417 ...
  45. [45]
  46. [46]
    "Next Generation" CAC Issuances | Article | The United States Army
    May 7, 2010 · Please keep in mind that "contactless" means just that - you don't have to plug the CAC card in (as you do with your keyboard every day) when a ...
  47. [47]
  48. [48]
    [PDF] DoD Implementation Guide for CAC Next Generation (NG) Version ...
    Nov 6, 2006 · [PACS 2.3] Draft Technical Implementation Guidance: Smart Card Enabled Physical Access. Control Systems, Version 2.3, The Government Smart ...Missing: rollout timeline
  49. [49]
    [PDF] Guidelines for Securing Radio Frequency Identification (RFID ...
    tag or place it in a shielded sleeve). Weaknesses: Distributing a ... used in the DoD Common Access Card (CAC), which serves as an identification card.Missing: 2011 | Show results with:2011
  50. [50]
    [PDF] United States Department of Defense X.509 Certificate Policy
    Jun 3, 2021 · The DoD PKI supports key escrow and recovery for private keys associated with encryption certificates. The. DoD PKI does not support key ...
  51. [51]
    [PDF] X.509 Certificate Policy for the U.S. Federal PKI Common Policy ...
    May 18, 2021 · This document is the X.509 Certificate Policy for the U.S. Federal PKI Common Policy Framework, version 2.12, dated August 4, 2025.
  52. [52]
    [PDF] CAC Data Model Change in 144K Dual Interface Cards
    This memo advises you of changes in the CAC data model in the upcoming 144K dual interface cards, namely the Gemalto TOP DL GX4 FIPS 144K and Oberthur ...
  53. [53]
    Common Access Card being reissued - Kaiserslautern American
    Mar 16, 2012 · The new 128K and 144K CACs issued have a 2048 bit encryption key, which is required to support network access later in 2012. Most individuals ...<|separator|>
  54. [54]
    About - DoD Cyber Exchange
    DoD PKI issues certificates for identification, authentication, data integrity, confidentiality, and non-repudiation, supporting DoD missions and operations.
  55. [55]
    Personal Identity Verification Card 101 - IDManagement.gov
    This PIV 101 focuses on using PIV credentials for logical access such as authenticating to networks or applications or digitally signing and encrypting.
  56. [56]
    [PDF] Announcing the Commercial National Security Algorithm Suite 2.0
    May 30, 2025 · General-use quantum-resistant public-key algorithms. NIST recently announced its standardization selections for post-quantum cryptography.Missing: Generation Access Card
  57. [57]
    [PDF] Operational Information Management Security Architecture - DTIC
    o CAC Authentication for Users – CAC (Common Access Card) is a standard ... authentication), but does use the challenge/response idea just described for client.
  58. [58]
    DoD PKI Management Help
    These requests are automatically generated during certificate validation. Currently there are 49 DoD and ECA Certificate Authorities (CA's) supported by GDS, ...
  59. [59]
  60. [60]
    [PDF] DoD Manual 5200.08, Volume 3, Physical Security Program
    Jan 2, 2019 · This manual assigns responsibilities and procedures for controlling physical access to DoD installations, including three access types and ...Missing: dimensions layout
  61. [61]
    [PDF] DOD INSTALLATIONS Monitoring Use of Physical Access Control ...
    Aug 22, 2019 · The Department of Defense (DOD) has issued guidance on accessing its domestic installations and strengthening physical access control ...
  62. [62]
    Defense Biometric Identification System - Moody Air Force Base
    Jan 30, 2012 · The Common Access Cards (CAC) issued to military personnel, DOD civilians, and some DOD contractors and the Teslin card issued to dependants and ...
  63. [63]
    DoD Issues Time-saving Common Access Cards - DVIDS
    Mar 7, 2025 · The card will eventually allow physical access to secure areas, permit entry into DoD's computer networks and serve as he authentication token ...Missing: pilot | Show results with:pilot<|separator|>
  64. [64]
    SIPRNet and NIPRNet: Key Differences Explained | Netizen
    Feb 20, 2025 · Access to NIPRNet is less restrictive compared to SIPRNet, typically requiring a Common Access Card (CAC) for authentication.Missing: logical | Show results with:logical
  65. [65]
    [PDF] DoD CAC Middleware Requirements Release 4.0
    Nov 26, 2012 · 4.4 Common Access Card (CAC) and Alternate Tokens ... 4 Minidriver shall indicate to the user how many remaining PIN attempts before locking.Missing: lockout | Show results with:lockout<|control11|><|separator|>
  66. [66]
    [PDF] Department of Defense Zero Trust Reference Architecture - DoD CIO
    Jul 4, 2022 · Common Access Card (CAC), while secure, has not kept pace with more user-friendly multi-factor authentication advances in industry. In ...
  67. [67]
    MilitaryCAC's Information about S/MIME
    Secure / Multipurpose Internet Mail Extensions (S/MIME) is a standard for public key encryption and signing of MIME data.
  68. [68]
    Enabling smart card logon - Windows Server - Microsoft Learn
    Jan 15, 2025 · Active Directory must trust a certification authority to authenticate users based on certificates from that CA. Both Smartcard workstations and ...
  69. [69]
    DoD's new myAuth system surpasses 900,000 users in first two ...
    Jul 25, 2025 · The Defense Department's new identity credentialing system, myAuth, has surpassed 900,000 user accounts just two months into its pilot ...
  70. [70]
    [PDF] FUTURE - Naval Sea Systems Command
    Jul 25, 2019 · Common Access Card office on base, which has really improved the ... polymers and can cause delamination and corrosion,” White said ...
  71. [71]
    [PDF] NIST.FIPS.201-3.pdf
    Jan 3, 2022 · In the case of deprecated features on PIV Cards such as the magnetic stripe. (Section 4.1.4.4), existing PIV Card stock with deprecated features ...
  72. [72]
    [PDF] us army product manager force sustainment systems (pm-fss)
    Jul 30, 2024 · The CCC is capability to fully support deployed soldiers in austere environments as an add-on package to the. Force Provider Module. The Complex ...
  73. [73]
    Forgot your CAC PIN?
    You will only be able to reset the PIN on the CAC by providing a successful match to the fingerprint stored in the DEERS database when you were issued the card.Missing: lockout expired RAPIDS
  74. [74]
    [PDF] Frequently Asked Questions (FAQs)
    Answer: The CAC is the DoD ID card issued to eligible personnel, including military members, civilian employees, and contractors, to facilitate physical access ...
  75. [75]
    MilitaryCAC's Get your ID card unBlocked by visiting the nearest ...
    You will have to visit an ID card office (RAPIDS (Real-time Automated Personal IDentification System)) to get your card unblocked, updated, or replaced. The CAC ...Missing: forgotten expired
  76. [76]
    Developer Resources - CAC.mil
    ... DoD ID Cards to Begin in October 2017. FOUO available upon request; June 2016 - Removal of Magnetic Stripe from CAC · June 2016 - Intro of SHA-256 versions of ...
  77. [77]
    [PDF] Important note from TSA-TWIC regarding the TWIC NEXGEN ...
    Oct 11, 2024 · NIST deprecated the magnetic stripe per their standard for PIV cards. Very few TWIC readers were using the magnetic stripe and hence appropriate ...
  78. [78]
    [PDF] DoDM 5200.01, Volume 3, "DoD Information Security Program
    Feb 24, 2012 · The contract shall require cooperation with U.S.. Government inquiries in the event of a loss, theft, or possible compromise. The sender is.
  79. [79]
    [PDF] Untitled - Army.mil
    If your CAC expires and you are eligible for a new CAC, you should make an appointment and go to the nearest RAPIDS site and obtain your new CAC. For your ...
  80. [80]
    ID Card Entitlements - Air Force Personnel Center
    Information of ID card entitlements, DEERS, and other resources ... To renew a secondary dependent's ID card, the sponsor should visit their servicing MPF.Missing: Common | Show results with:Common
  81. [81]
    Coronavirus Disease 2019 (COVID-19) FAQs - Coast Guard
    A: If your CAC expired on or after April 16, 2020, you may have the ... overseas to visit the Federal Voting Assistance Program (FVAP) website to:.Missing: blocking | Show results with:blocking
  82. [82]
    [PDF] Codifying Information Assurance Controls for Department of ... - DTIC
    Mar 15, 2010 · Security vulnerabilities can also arise in a system because of problems in the system specification, the system implementation or during system ...
  83. [83]
    [PDF] DoD EnterpriseIdentity, Credential, and Access Management (ICAM ...
    Second, as a descriptive document, it supports DoD Components in understanding how to consume DoD enterprise ICAM services and how to operate DoD Component, ...<|control11|><|separator|>
  84. [84]
    [PDF] Quantum Computing and Post-Quantum Cryptography - DoD
    Aug 4, 2021 · A: Quantum-resistant, quantum-safe, and post-quantum cryptography are all terms used to describe cryptographic algorithms that run on standard ...Missing: CAC | Show results with:CAC
  85. [85]
    Changes to Base Access for DoD Civilian Retirees Goes into Effect ...
    Aug 28, 2023 · After August 31, 2023, Department of Defense civilian retirees will be required to show a registered REAL ID card for base access.Missing: alignment | Show results with:alignment
  86. [86]
    Mobile PIV (mPIV) Experiment - IDManagement.gov
    The Unifyia ID Wallet app is a comprehensive solution for digital identity management, delivering tailored experiences for issuing authorities, credential ...Missing: DoD | Show results with:DoD
  87. [87]
    2025 - April 10d | Defense Security Cooperation Agency
    Apr 10, 2025 · DSCA Policy Memo 25-04 Establishment of the Common Access Card-Enabled SAMM Site has been posted. This memorandum establishes the Common Access ...