Generated by GPT-5-mini| Common Access Card (CAC) | |
|---|---|
| Name | Common Access Card |
| Caption | Sample Common Access Card |
| Issued by | United States Department of Defense |
| Type | Smart card |
| Purpose | Identification, authentication |
| Introduced | 2003 |
| Physical description | Plastic card with embedded circuit |
| Related | Defense Enrollment Eligibility Reporting System, Personal Identity Verification |
Common Access Card (CAC) The Common Access Card is the standard identity credential used by personnel within the United States Department of Defense for access to services and facilities. It integrates identification, cryptographic authentication, and access control for users associated with United States Armed Forces, United States Department of Defense, and related civilian and contractor populations. The CAC supports interoperability with programs managed by Defense Information Systems Agency, National Institute of Standards and Technology, and General Services Administration.
The CAC was introduced to replace disparate identification methods across United States Army, United States Navy, United States Air Force, and United States Marine Corps systems and to implement standards promulgated by Federal Information Processing Standards, Personal Identity Verification, and initiatives from Office of Management and Budget. Its rollout involved coordination with Defense Enrollment Eligibility Reporting System, Real-Time Automated Personnel Identification System, and Department of Defense Common Access Card Registration Authority to standardize credentials for military, civilian, and contractor communities. The card plays a role in enabling programs like Joint Personnel Adjudication System and integration with Department of Defense Information Network services.
The CAC combines physical and electronic features, including a printed photograph, printed data elements tied to records in Defense Manpower Data Center, and an embedded integrated circuit conforming to ISO/IEC 7816 standards. It contains cryptographic certificates issued under DoD Public Key Infrastructure and signed by authorities such as the United States Certificate Authority and trusted by National Security Agency policies; these certificates support protocols like Secure/Multipurpose Internet Mail Extensions, Transport Layer Security, and IPsec. The card supports two-factor authentication using PIN and certificate-based digital signatures compatible with Department of Defense PKI Policy and interoperates with middleware implementations referenced by Common Access Card Interface Specification and validated by National Information Assurance Partnership evaluations.
CAC issuance is managed through workflow systems maintained by Defense Manpower Data Center, Service Personnel Offices, and DEERS enrollment stations; applicants provide documentation aligning with identity proofing requirements from Office of Personnel Management, Homeland Security Presidential Directive 12, and Federal Identity, Credential, and Access Management guidance. Eligible populations include active-duty members of United States Coast Guard, Reserve components listed in Defense Enrollment Eligibility Reporting System records, civilian employees of Department of Defense, and contractors meeting requirements under DoD Instruction 1000.13 and sponsoring agreements with Defense Information Systems Agency. The process interacts with background checks managed by Office of the Director of National Intelligence and suitability investigations coordinated via National Background Investigation Services.
CACs enable physical access to secured facilities such as installations overseen by United States Northern Command, United States European Command, and United States Central Command and logical access to information systems including platforms operated by Defense Health Agency, Defense Finance and Accounting Service, and Joint Staff networks. They are used for secure email through Secure/Multipurpose Internet Mail Extensions, VPN authentication to systems leveraging IPsec, and signing of electronic documents in workflows tied to Defense Acquisition University and Department of Defense Education Activity. CACs also integrate with access control systems at installations connected to National Guard Bureau and support interoperability with coalition partners under agreements like the North Atlantic Treaty Organization interoperability frameworks.
The CAC implements cryptographic protections aligned with guidance from National Institute of Standards and Technology, Committee on National Security Systems, and policies promulgated by Office of the Under Secretary of Defense for Acquisition and Sustainment. It stores certificates for authentication, encryption, and non-repudiation, relying on secure key generation, PIN protection, and physical tamper-resistant hardware conforming to FIPS 140-2 validations overseen by Cryptographic Module Validation Program. Authentication mechanisms integrate with network access control solutions deployed by Defense Information Systems Agency and endpoint management tools from vendors certified under Continuous Diagnostics and Mitigation programs.
Lifecycle management encompasses issuance, renewal, revocation, and destruction processes administered by Defense Enrollment Eligibility Reporting System stations, Common Access Card Registration Authority, and service-specific personnel offices. Certificate lifecycle is governed by Certificate Revocation Lists and Online Certificate Status Protocol services maintained within the DoD Public Key Infrastructure and coordinated with trust anchors defined by Department of Defense Chief Information Officer. Replacement procedures align with guidance from Office of Personnel Management and are tracked through systems like Defense Manpower Data Center and incident reporting into Armed Forces Network administrative channels.
Policy debates have focused on privacy, interoperability, and provisioning for non-traditional users such as contractors and foreign partners, drawing scrutiny from Government Accountability Office, Federal Trade Commission, and advocacy groups concerned with identity management oversight. Technical and administrative challenges include certificate management burdens noted by Congressional Research Service reports, supply-chain and counterfeit concerns highlighted in hearings involving United States Senate Armed Services Committee, and accessibility issues raised by Equal Employment Opportunity Commission and Americans with Disabilities Act compliance reviews.