Common Access Card

From Wikipedia, the free encyclopedia
Jump to: navigation, search
An example DoD Common Access Card

The Common Access Card, also colloquially referred to as the CAC (often called CAC card, due to what is informally known as RAS syndrome), is a smart card about the size of a credit card.[1] It is the standard identification for active-duty military personnel, Selected Reserve, United States Department of Defense (DoD) civilian employees, and eligible contractor personnel.[1] It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems.[1] It also serves as an identification card under the Geneva Conventions (esp. the Third Geneva Convention). The CAC satisfies two-factor authentication: something that belongs to the user, and something only known to the user. And, the CAC covers the bases for digital signature and data encryption technology: authentication, integrity and non-repudiation.

The CAC is a controlled item. As of 2008, DoD has issued over 17 million smart cards. This number includes reissues to accommodate changes in name, rank, or status and to replace lost or stolen cards. As of the same date, approximately 3.5 million unterminated or active CACs are in circulation. DoD has deployed an issuance infrastructure at over 1000 sites in more than 25 countries around the world and is rolling out more than one million card readers and associated middleware.

Issuance[edit]

The CAC is issued to active duty military, Reserves, National Guard, Coast Guard, Coast Guard Auxiliary, DoD civilians; non-DoD/other government employees and State Employees of the National Guard and eligible DoD contractors who need access to DoD facilities or DoD computer network systems:

  • Active-duty armed forces
  • Reservists
  • National Guard members
  • National Oceanic and Atmospheric Administration
  • United States Public Health Service
  • Emergency-Essential Employees
  • Contingency Contractor Employees
  • Contracted ROTC Cadets
  • Deployed Overseas Civilians
  • Non-Combatant Personnel
  • DoD/Uniformed Service Civilians residing on military installation in CONUS, Hawaii, Alaska, Puerto Rico, or Guam
  • DoD/Uniformed Service Civilians or Contracted Civilian residing in a foreign country for at least 365 days
  • Presidential Appointees approved by the United States Senate
  • DoD Civilian employees, and United States Military veterans with a Veterans Affairs Disability rating of 100% P&T
  • Eligible Contractor Employees
  • Non-DoD/other government and state employees of the National Guard

Future plans include the ability to store additional information through the incorporation of RFID chips or other contactless technology to allow seamless access to DoD facilities.

The program that is currently used to issue CAC IDs is called the Real-Time Automated Personnel Identification System (RAPIDS). RAPIDS interfaces with the Joint Personnel Adjudication System (JPAS), and uses this system to verify that the candidate has passed a background investigation and FBI fingerprint check. Applying for a CAC requires DoD form 1172-2 to be filled out and then filed with RAPIDS.

The system is secure and monitored by the DoD at all times. Different RAPIDS sites have been set up throughout military installations in and out of combat theater to issue new cards.

Design[edit]

Examples of CACs issued by the four major armed forces.

The CAC is a smart card, containing several different technologies in a pocket-sized plastic card. There are two sides of the card that contain information about the owner. The description that follows is of the most current CAC standard.[1]

On the front of the card, the background shows the phrase "U.S. DEPARTMENT OF DEFENSE" repeated across the card. A color photo of the owner is placed on the top left corner. Below the photo is the name of the owner. The top right corner displays the expiration date. Other information on the front include (if applicable) the owner's pay grade, rank and federal identifier. A PDF417 stacked two-dimensional barcode is displayed on the bottom left corner. And, an integrated circuit chip (ICC) is placed near the bottom-middle of the card.

There are three color code schemes used on the front of the CAC. A blue bar across the owner's name shows that the owner is a non-U.S. citizen. A green bar shows that the owner is a contractor. No bar is for all other personnel - including military personnel and civil workers, among others.

The back of the card has a ghost image of the owner. And if applicable, the card also contains the date of birth, blood type, DoD benefits number, Geneva Convention category, and DoD identification number (also used as the Geneva Convention's number.) The DoD number is also known as the Electronic Data Interchange Personal Identifier (EDIPI). A Code 39 linear barcode, as well as a magnetic strip is placed on the top and bottom of the card. The DoD ID/EDIPI number stays with the owner throughout his career with the DoD - even when he changes armed services or other departments within the DoD.

The front of the CAC is fully laminated, while the back is only laminated in the lower half (to avoid interference with the magnetic stripe).[2]

The CAC is said to be resistant to identity fraud,[3] tampering, counterfeiting, and exploitation and provides an electronic means of rapid authentication.

There are currently four different variants of CACs.[1] The Geneva Conventions Identification Card is the most common CAC and is given to active duty/reserve armed forces and uniformed service members. The Geneva Convention Accompany Forces Card is issued to emergency-essential civilian personnel. The ID and Privilege Common Access Card is for civilians residing on military installations. The ID card is for DOD/Government Agency identification for civilian employees.

Encryption[edit]

Until 2008, all CACs were encrypted using 1024-bit encryption. Starting 2008, the DoD switched to 2048-bit encryption.[4] Personnel with the older CACs had to get new CACs by the deadline.[4] On October 1, 2012, all certificates encrypted with less than 2048-bits were placed on revocation status, rendering legacy CACs useless except for visual identification.[4]

Usage[edit]

The CAC is designed to provide two-factor authentication: what you have (the physical card) and what you know (the PIN). This CAC technology allows for rapid authentication, and enhanced physical and logical security. The card can be used in a variety of ways.

Visual identification[edit]

The CAC can be used for visual identification by way of matching the color photo with the owner. This is used for when the user passes through a guarded gate, or purchases items from a store, such as a PX/BX that require a level of privileges to use the facility. Some states allow the CAC to be used as a government-issued ID card, such as for voting or applying for a drivers license.

Magnetic stripe[edit]

The magnetic stripe can be read by striking the card through a magnetic stripe reader, much like a credit card. The magnetic stripe is actually blank when the CAC is issued. However, its use is reserved for localized physical security systems.[5]

Integrated circuit chip (ICC)[edit]

The integrated circuit chip (ICC) contains information about the owner, including the PIN and one or more PKI digital certificates. The ICC comes in different capacities, with the more recent versions issued at 64 and 144 kilobytes (KB).[citation needed]

The CAC can be used for access into computers and networks equipped with one or more of a variety of smartcard readers. Once inserted into the reader, the device asks the user for a PIN. Once the PIN is entered, the PIN is matched with the stored PIN on the CAC. If successful, the EDIPI number is read off the ID certificate on the card, and then sent to a processing system where the EDIPI number is matched with an access control system, such as Active Directory or LDAP. The DoD standard is that after three incorrect PIN attempts, the chip on the CAC will lock.

The EDIPI number is stored in a PKI certificate. Depending on the owner, the CAC contains one or three PKI certificates. If the CAC is used for identification purposes only, an ID certificate is all that is needed. However, in order to access a computer, sign a document, or encrypt email, signature and encryption certificates are also required.

A CAC works in virtually all modern computer operating systems. Besides the reader, drivers and middleware are also required in order to read and process a CAC. The only approved Microsoft Windows middleware for CAC is ActivClient - available only to authorized DoD personnel. Other non-Windows alternatives include LPS-Public - a non-hard drive based solution.

DISA now requires all DoD-based intranet sites to provide user authentication by way of a CAC in order to access the site. Authentication systems vary depending on the type of system, such as Active Directory, RADIUS, or other access control list.

CAC is based on X.509 certificates with software middleware enabling an operating system to interface with the card via a hardware card reader. Although card manufacturers such as Schlumberger provided a suite of smartcard, hardware card reader and middleware for both Linux and Windows, not all other CAC systems integrators did likewise. In an attempt to correct this situation, Apple Federal Systems has done work for adding some support for Common Access Cards to their later Snow Leopard operating system updates out of the box using the MUSCLE (Movement for the Use of Smartcards in a Linux Environment) project. The procedure for this was documented historically by the Naval Postgraduate School in the publication "CAC on a Mac"[1] although today the school uses commercial software. According to the independent military testers and help desks, not all cards are supported by the open source code associated with Apple's work, particularly the recent CACNG or CAC-NG PIV II CAC cards [2]. Third party support for CAC Cards on the Mac are available from vendors such as Centrify and Thursby Software. Apple's Federal Engineering Management suggest not using the out-of-the-box support in Mac OS X 10.6 Snow Leopard [3] but instead supported third party solutions. Mac OS X 10.7 Lion has no native smart card support. Thursby's PKard for iOS software extends CAC support to Apple iPads and iPhones. Some work has also been done in the Linux realm. Some users are using the MUSCLE project combined with Apple's Apple Public Source Licensed Common Access Card software. Another approach to solve this problem, which is now well documented, involves the use of a new project, CoolKey, to gain Common Access Card functionality. This document is available publicly from the Naval Research Laboratory's Ocean Dynamics and Predictions Branch [4]. The Software Protection Initiative offers a LiveCD with CAC middleware and DoD certificate within a browser-focused, minimized Linux OS, called LPS-Public that works on x86 Windows, Mac, and Linux computers.

Bar codes[edit]

The CAC has two types of bar codes: PDF417 in the front and Code 39 in the rear.

RFID technology[edit]

Contactless authentication using RFID technology. There are also some security risks in RFID. To prevent theft of information in RFID, in November 2010, 2.5 million radio frequency shielding sleeves were delivered to the DoD, and another roughly 1.7 million more were to be delivered the following January 2011.[6] RAPIDS ID offices worldwide are required to issue a sleeve with every CAC.[6] When a CAC is placed in a holder along with other RFID cards, it can also cause problems, such as attempting to open a door with an access card when it is in the same holder as a CAC. Despite these challenges at least one civilian organization, NOAA, uses the RFID technology to access facilities nation wide. Access is usually granted after first removing the CAC from the RF shield and then holding it against a reader either mounted on a wall or located in a pedestal. Once the CAC is authenticated to a local security server either the door will release or a signal will be displayed to security guards to grant access to the facility.

Common problems[edit]

The ICC is fragile and regular wear can make the card unusable. Older cards tended to de-laminate with repeated insertion/removal from readers, but this problem appears to be less significant with the newer (PIV-compliant) cards. Also, the gold contacts on the ICC can become dirty and require cleaning with either solvents or a rubber pencil eraser.

Fixing or replacing a CAC typically requires access to a RAPIDS facility, causing some practical problems. In remote locations around the world without direct Internet access or physical access to a RAPIDS facility, a CAC is rendered useless if the card expires, or if the maximum number of re-tries of the PIN is reached. Based on the regulations for CAC use, a user on TDY must visit a RAPIDS facility to replace or unlock a CAC, usually requiring travel to another geographical location or even returning to one's home location. The CAC PMO[7] has also created a CAC PIN Reset workstation capable of resetting a locked CAC PIN.

For some DoD networks, Active Directory (AD) is used to authenticate users. Access to the computer's parent Active Directory is required when attempting to authenticate with a CAC for a given computer, for the first time. Use of, for example a field replaced laptop computer that was not prepared with the user's CAC before shipment would be impossible to use without some form of direct access to Active Directory beforehand. Other remedies include establishing contact with the intranet by using public broadband Internet and then VPN to the intranet, or even satellite Internet access via a VSAT system when in locations where telecommunications is not available, such as in a natural disaster location. In some cases, the user or technical support is forced to break DoD and other regulations, such as mailing the CAC back to technical support along with the user's PIN, or giving the user the computer's local administrator username and password.[citation needed]

See also[edit]

References[edit]

External links[edit]