Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Pardon our Dust.

Welcome to the new site for Federal Identity, Credential, and Access Management (FICAM) Playbooks! We are consolidating all existing FICAM and Federal Public Key Infrastructure (FPKI) playbooks to this new page to help you find answers and content faster. Please bookmark this URL for future reference.

Personal Identity Verification Guide Introduction

These Personal Identity Verification (PIV) Guides are intended to help you implement common PIV configurations at your organization. These guides are open source and a work in progress and we welcome contributions from our colleagues.

The guides focus on using PIV credentials for logical access such as authenticating to networks or applications, or digitally signing and encrypting. Using PIV for physical access is available in the PACS Guide.

If you cannot find a particular topic, it may still be in development. Review the Issues for questions and lessons that are in progress. Create a new Issue to ask a question or share information with others.

Read on to learn more about PIV credentials.

What is PIV?

A Personal Identity Verification (PIV) credential is a US Federal governmentwide credential used to access Federally controlled facilities and information systems at the appropriate security level.

PIV credentials have certificates and key pairs, pin numbers, biometrics like fingerprints and pictures, and other unique identifiers. When put together into a PIV credential, it provides the capability to implement multi-factor authentication for networks, applications, and buildings.

What information is in these PIV guides?

First, we cover the basics of PIV credentials, including:

  • What PIV is, contains and looks like;
  • The basics of getting started with PIV credentials; and
  • Using PIV for network authentication (smartcard logon).

We also cover applications, and guidance for developers and users - which need your input!

Share your expertise

Please contribute and share your lessons for configuring systems or applications, tuning considerations, code, common challenges, troubleshooting errors, as well as anything else you think would be helpful for your colleagues.

Why is PIV usage important?

Agency security is enhanced when PIV credentials are used for authentication to agency systems and facilities. PIV credentials allow for a high level of assurance in the individuals that access your resources, because they are only issued by trusted providers to individuals that have been verified in person. PIV credentials are highly resistant to identity fraud, tampering, counterfeiting, and exploitation.

PIV credentials are standardized as well. PIV credentials might be issued by different organizations using different commercial or open source products, on different form factors (cards, mobile devices, etc). However, PIV credentials are standardized - every PIV credential is required to have specific information, using technology which is interoperable.

Your PIV credential from one agency will have the same basic required format, information and technology as a PIV credential from your partner agencies. This allows us to trust each other, share applications, and architect and implement systems using common patterns for authentication.

What systems should use PIV?

Any system at your organization that requires heightened security for determining who should gain access can and should use PIV for authentication. While PIV credentials can be used for authentication on almost any system, they are especially useful for systems that protect sensitive information.

PIV should be used for:

  • All authentication for all privileged users including servers, networks, and applications;
  • All network authentication for all users;
  • All application authentication for all users of an application that protects or contains sensitive information; and
  • Access to facilities and buildings.

Where can I find the Standards?

Review the information on this site if you are interested in PIV credentials or work on using PIV credentials.

If you are interested in the bits and bytes of PIV credentials, you can review the Standards (see below), particularly if you develop products such as hardware or software that are specific to PIV credentials for the US Federal Government. (For most users and engineers, the Standards may be too detailed for your needs.)

To review the Standards, there is a National Institute for Science and Technology (NIST) website with all PIV related Standards. Links to some of the most common Standards: