Configure PIV-Compliant Face-to-Face Device Policies

This section describes how to configure an ActivID CMS Face-to-Face device policy to issue PIV-compliant smart cards for different certificate authorities.

Note: To configure an Activation Policy for two-step issuance, follow the same steps as Face-to-Face policies, but only configure the four PKI applications.

For the purpose of demonstrating the issuance of SP 800-73-3-compliant cards, this document uses the PIV FIPS 201 F2F Java Card – OT 2.3.2 -2048 device policy.

This section summarizes the actions that must be taken to issue a test PIV-compliant smart card. To test PIV Personal Identity Verification (technical standard of "HSPD-12") configuration, you must create a Face-to-Face PIV Device policy for one-step issuance. Four of the applications are mandatory. For details, review Face-to-Face (F2F) Device Policy Configuration. To summarize what you will do:

  1. Add Device policy.

  2. Configure each application in the device policy (first four are mandatory, and the remainder are optional for testing purposes):

    • PIN

    • CHUID Card Holder Unique Identifier

    • PIV Security Object

    • PIV Authentication (steps are CA-specific)

    • Optional applications

    • Card Authentication (steps are CA-specific)

    • PIV Digital Signature (steps are CA-specific)

    • PIV Encryption (steps are CA-specific)

    • PIV Key Management History (steps are CA-specific)

    • PIV Fingerprint, Facial Image, Printed Info, PIV Iris

    • PIV Key History

The following section provides step-by-step instructions to complete the summarized previous summary of steps. Where the application configuration is CA-specific, please refer to subsequent sections that describe your CA.

Before you begin, make sure that:

  • A CA account configured for PIV workflow is available.

  • Certificate templates are configured for the PIV PKI applications that will be defined in the device policy.

Note: If you are using the Entrust CA, then two Entrust CA instances configured for PIV workflow must be used. For scenario 1 (CA Entrust 1), this is for issuing the PIV Card Authentication certificate; for scenario 2 (CA Entrust 2), this is for issuing the three other PIV certificates.
  1. Log on to ActivID CMS, select the Configuration tab, click Policies, and then click Add Device Policy.

  2. Populate the fields as displayed for OCS PIV Endpoint cards.

    • Device Policy Name—Enter a name for your device policy.

    • Device Policy Description—Enter a description of your device policy.

    • Device Type—From the drop-down list, select OP_2.0 Smart Cards.

    • Device Profile—From the drop-down list, select the device profile to use depending on the type of device you are using.

  3. Note: You must select a device profile that starts with PIV FIPS201 F2F for one-step issuance.
  4. Click Next. The Device Policy Configuration page is displayed.

  5. Next to the PIN application, click Configure.

  6. For the Application Friendly Name field, enter a friendly name for your application.

  7. Set the following values and options according to your organization’s security policy:

    • Minimum and Maximum PIN length

    • Maximum number of wrong PIN tries permitted before the card locks (applies only to ActivID Applets – not applicable to third party PIV applets)

    • Maximum number of wrong PIN unlock tries before the card is blocked (applies only to ActivID Applets – not applicable to third party PIV applets)

    • Force a PIN to be changed on first card usage

    • Weak PIN allowed or not

    Note: These options are configured in the card by ActivID CMS, and enforced by the client middleware (either ActivID ActivClient or ActivID CMS Client). The other options visible in the ActivID CMS user interface (Force PIN to Contain Letters, Force PIN to Contain Digits) are not applicable to cards configured with a PIV Personal Identity Verification (technical standard of "HSPD-12"), PIV-I Personal Identity Verification - Interoperable or CIV Commercial Identity Verification profile– they are not enforced by ActivClient or other PIV middleware.

  8. Click Set at the bottom of the page to return to the main Device Policy Configuration page.

  9. Next to the CHUID object, click Configure.

    • For the Application Friendly Name field, enter a friendly name for your application.

    • From the Static Credential Collection Plug-In drop-down list, select PIV Static Data: CHUID.

  10. Click Set to return to the main Device Policy Configuration page.

  11. Next to the PIV_Security_Object object, click Configure.

    • For the Application Friendly Name field, enter a friendly name for your application.

    • From the Static Credential Collection Plug-In drop-down list, select PIV Static Data: Security Object.

  12. Click Set to return to the main Device Policy Configuration page.

  13. Optionally, if you want to add the following applications to the policy, then select Add from the drop-down list, and then click Configure.

  14. Note: If you are using the same Device Policy for future Application Update or Reissuance, then for the Key History feature to work, you must select Update/Add for PIV_ENCRYPTION, PIV_KEY_HISTORY and for all PIV_KEY_MANAGEMENT_KEY_HISTORY.
    • For PIV_Fingerprint_1, PIV_Facial_Image, PIV_Printed_Information, and PIV_Iris, select the corresponding Static Credential Collection Plug-In.

    • For the PIV_Key_History, it is recommended that you configure the recovery of the previous application, for example:

      • PIV_Key_Management_Key_History_1 recovers PIV_ENCRYPTION.

      • PIV_Key_Management_Key_History_2 recovers PIV_Key_Management_Key_History_1.….

      • PIV_Key_Management_Key_History_(n) recovers PIV_Key_Management_Key_History_(n-1).

    Note: To recover the previous application, both ActivID CMS and the certificate authority must be configured accordingly. For further information, refer to the ActivID CMS technical note that corresponds to your certificate authority.
  15. Click Set to return to the main Device Policy Configuration page.

  16. Continue the remainder of the procedure in the corresponding CA section (see below).