Browse Definitions :
Definition

common access card (CAC)

1. A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication. CACs are issued as standard identification for active-duty military personnel, reserve personnel, civilian employees, non-DoD government employees, state employees of the National Guard and eligible contractor personnel. In addition to its use as an ID card, a CAC is required for access to government buildings and computer networks.  

A CAC is about the size of a standard debit card and has an embedded microchip that enables the encryption and cryptographic signing of email and use of public key infrastructure (PKI) authentication tools. The microchip contains a digital image of the cardholder’s face, two digital fingerprints, organizational affiliation, Social Security number, agency, card expiration date, and PKI certificate.  

When a CAC is inserted into a smart card reader and the associated PIN has been entered, software in the reader uses standard Internet protocols to compare the information on the card's chip with data on a government server and either grant or deny access.  While a CAC is being used to access a computer system, the card stays in the reader for the duration of the session. When the card is removed from the reader, the session ends and the system remains inaccessible until the next user is validated.

There are currently four kinds of  DoD CAC cards:

  • Geneva Conventions Identification Card - issued to active duty/reserve armed forces and uniform service members. 
  • Geneva Convention Accompany Forces Card - issued to emergency-essential civilian personnel.
  • ID and Privilege Common Access Card - issued to civilians residing on military installations.
  • ID card for DOD/Government Agency identification - issued to civilian employees and contractors.

The DoD began issuing CACs in October 2006 in compliance with Homeland Security Presidential Directive 12/HSPD-12.  

See also:  FIPS, personal identity verification (PIV) cards

2. In general, a common access card is any corporate card issued to an employee that provides the employee access to buildings, company data or facilities such as elevators, bathrooms or copy rooms. 

Learn more about common access cards:

The Department of Defense website has more information about CACs.

Smart cards can be vulnerable to differential power analysis (DPA) attacks.

Common access cards are a new feature for Oracle Database Lite..

This was last updated in November 2010

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

What are the Cryptographic Solutions for CAC?

Cancel
Would the chip on a CAC be capable of holding data, much like a USB or a memory card?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close