Hardware Credentials

Organizations are realizing that credential management involves a great many things. Credential management requires a focus on the operational management framework, proper data management, a strong security focus, and operational lifecycle and maintenance thinking, planning, and procedures. The implementation of a credential without a broad understanding of what that credential will be and how that credential will be leveraged can result in more damage than benefit to an enterprise. Along with this realization, security of the credential itself has become a core concern. This token may be provided an ability to authorize remote users' access to critical or business sensitive data or services.

To address this concern, many industry and government institutions have constructed standards and guidelines for hardware based credentials. These hardware based credentials and solutions require strong enrollment and identification processes, offer robust cryptographic services to protect content on the hardware token, elevate the assurance or trust in the bound entity when presented across networks, and similar security focused features. The good news for organizations that seek to enable such solutions is that the hardware tokens and other solutions available are supported by strong industry standards that promote ease in adoption, interoperability, and out-of-the-box services that reduce the total cost for implementation and sustainment.

Hardware credentials within the Federal environment today are required to support HSPD-12, and in the Department of Defense require the Common Access Card (CAC). LS3 is a fully qualified and certified integrator for these technologies, and supports several customers at the Program Management Office level, as a Technology Integrator, and with the Enterprise Architecture and strategic thinking services required to consider the full lifecycle of these implementations and their management. Our team is fully versed in the implementation of the Personal Identity Verification (PIV) credential, the integration of these tokens for Logical and Physical Access Control Systems (LACS and PACS), and exposing the services from these cards for readily consumable services that ease adoption into networks, applications, and services.

Beyond HSPD-12 and CAC solutions, our team is also well versed in leveraging one time password or PIN solutions that offer a second factor authentication "stamp" as part of an authentication framework. We integrate solutions and manage environments that sustain these technologies, and seek to lower your cost of operations and ownership through the standardization of common solutions that leverage these higher security and higher assurance services.