Browse Definitions :
Definition

common access card (CAC)

1. A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication. CACs are issued as standard identification for active-duty military personnel, reserve personnel, civilian employees, non-DoD government employees, state employees of the National Guard and eligible contractor personnel. In addition to its use as an ID card, a CAC is required for access to government buildings and computer networks.  

A CAC is about the size of a standard debit card and has an embedded microchip that enables the encryption and cryptographic signing of email and use of public key infrastructure (PKI) authentication tools. The microchip contains a digital image of the cardholder’s face, two digital fingerprints, organizational affiliation, Social Security number, agency, card expiration date, and PKI certificate.  

When a CAC is inserted into a smart card reader and the associated PIN has been entered, software in the reader uses standard Internet protocols to compare the information on the card's chip with data on a government server and either grant or deny access.  While a CAC is being used to access a computer system, the card stays in the reader for the duration of the session. When the card is removed from the reader, the session ends and the system remains inaccessible until the next user is validated.

There are currently four kinds of  DoD CAC cards:

  • Geneva Conventions Identification Card - issued to active duty/reserve armed forces and uniform service members. 
  • Geneva Convention Accompany Forces Card - issued to emergency-essential civilian personnel.
  • ID and Privilege Common Access Card - issued to civilians residing on military installations.
  • ID card for DOD/Government Agency identification - issued to civilian employees and contractors.

The DoD began issuing CACs in October 2006 in compliance with Homeland Security Presidential Directive 12/HSPD-12.  

See also:  FIPS, personal identity verification (PIV) cards

2. In general, a common access card is any corporate card issued to an employee that provides the employee access to buildings, company data or facilities such as elevators, bathrooms or copy rooms. 

Learn more about common access cards:

The Department of Defense website has more information about CACs.

Smart cards can be vulnerable to differential power analysis (DPA) attacks.

Common access cards are a new feature for Oracle Database Lite..

This was last updated in November 2010

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

What are the Cryptographic Solutions for CAC?

Cancel
Would the chip on a CAC be capable of holding data, much like a USB or a memory card?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close