Identity management requires card smarts

Building the brains behind mandatory ID card programs won’t be easy.

In addition, GSA said, an IDMS needs to integrate with card management systems, registration systems, a variety of personnel-management systems, enterprise-level physical access control systems and enterprise-level network access control systems.

Many of the components required to meet Homeland Security Presidential Directive (HSPD) 12, which mandates a standard way of identifying federal employees and contractors, have been around for a while and are well-understood.

For years, some agencies have been using the card management, printing and registration systems needed to supply smart cards. The National Institute of Standards and Technology has been compiling specifications for the cards’ functions, interface technologies and biometric identification data.

On the other hand, the requirements for identity management systems (IDMS) are not as far along. Agencies must deploy such systems to handle ID card distribution, apply biometric data to the cards and manage the databases that contain identity information.

In addition, an effective IDMS must enable a single card to grant access to physical buildings and information technology networks — two worlds that traditionally have used separate systems and operated in different security domains.

Because an IDMS must support many tasks and adapt to many environments, a specific description is nearly impossible to devise. Agencies must resolve this issue, among others, as they try to meet the October deadline for issuing smart cards to employees.

An IDMS “is more of a concept than any particular thing,” said David Temoshok, director of identity policy and management at the General Services Administration. “There are no standards you can set for [an] IDMS. There is no single approach to implementing one.”

In a December 2005 request for information for a future HSPD-12 contract, GSA defined an IDMS as the secured database that holds all applicant identity records.

More specifically, an IDMS should:

  • Perform the verification and validation functions required to confirm someone’s identity.

  • Hold and process applicant status information.

  • Ensure that a card applicant has met all requirements before receiving a card.


For agencies, a complete IDMS construction can be a long, complex and costly project, experts say.

“There’s going to be a lot of integration points between an IDMS ‘blob’ and other systems in the environment,” said John Gist, a program manager at Northrop Grumman IT. “Unfortunately, there is no easy answer.”

Agencies possess a number of databases, such as those managed by the human resources department, that already include much of the identity information necessary for a system that complies with HSPD-12.

The IDMS then becomes the integration glue that links all of those databases and handles the identity data from a central location.

But there’s no one way to consolidate it all, said Idan Shoham, chief technology officer at M-Tech IT, an identity management software vendor.

Seemingly, the simplest approach is to base the consolidation on human resources databases and use that data in other identity-driven applications, such as network directories and electronic messaging systems.

“However, that only goes so far,” Shoham said. “The HR system wouldn’t necessarily know anything about contractors, for example, and there would be an assumption that the HR database is accurate, current and fine-grained. But most often, that’s not true.” In that case, he said, the IDMS would need more information than the human resources database could provide.

Keep it simple
Some experts warn that the concept of an IDMS is becoming too complicated and all-encompassing, which could inhibit how people tackle implementation. Anteon, a systems integrator, seeks to simplify ID cards and focus on their uses, said Scott Price, vice president of the company’s systems integration group. For example, first responders’ primary need might be to know who must get in and out of a particular building or area during an emergency.

Price said that an IDMS must facilitate real-time changes in privilege levels.

“The important thing is to know whether or not a person works at a certain place, where they will work tomorrow, can they do certain things in a crisis and so on,” Price said. “Quick transfer of privileges is also important for interoperability,” so an employee of one agency can gain access to another agency’s building with the same card.

John Wall, principal technology specialist at Microsoft Federal, said the key to any IDMS is how well it handles exception processing.

“What happens when someone leaves a card at home or loses it?” he asked. “Does that person get a replacement? After a certain time is that card revoked? How do you reset identities in this case?”

That knowledge is also important when using one card for both physical and network access, he said, adding that the challenge in those circumstances is knowing whether the card is valid.

Some experts say the trick to building an IDMS that complies with HSPD-12 is to focus only on the directive’s needs rather than attempting to deploy a full IDMS implementation.

HSPD-12 doesn’t explicitly call for an IDMS installation, but the requirements would be hard to satisfy without one, Shoham said.

“However, an enterprise IDMS takes money and time to set up, anything from 12 to 18 months, and that’s fast,” he said. “Clearly, this is something you have to do incrementally.”

The ID directive behind it all

President Bush issued Homeland Security Presidential Directive 12 in August 2004. It requires agencies to issue standard identity credentials to employees and contractors as a way of increasing security and interoperability among agencies.

The National Institute of Standards and Technology later issued Federal Information Processing Standard (FIPS) 201, which sets the requirements for issuing the new credentials under the personal identity verification process.

By Oct. 27, 2005, agencies were required to have established identity verification procedures that comply with FIPS 201, and they must begin issuing compliant credentials by the same date this year.

All employees and contractors should have the new credentials by October 2007.

— Brian Robinson

Think big now, save money later

David Temoshok, director of identity policy and management at the General Services Administration, said he thinks it’s a mistake if agencies focus only on meeting Homeland Security Presidential Directive 12 requirements when designing their identity management systems (IDMS).

Although the request for information GSA released in December was a prelude to an expected HSPD-12 contract, the IDMS included in the RFI has capabilities that can be applied to a wider range of uses, he said.

“When we talk to agencies about [an] IDMS for HSPD-12, we also advise them to think about how best they can structure it for future applications, such as machine-to-machine services,” Temoshok said.

Such systems include the ability to enable trusted machine-to-machine information sharing and to establish authorization to access various services and applications.

“We urge agencies to be farsighted and think about how such things as these might fit with their plans for [an] IDMS,” Temoshok said. “Now is an excellent time to be planning capital investment for the future.”

John Gist, a program manager at Northrop Grumman Information Technology, has recommended to his senior managers that the company look ahead as it deploys its IDMS infrastructure, advice he would give to agencies.

“You could just go with someone that provides minimal HSPD-12 compliance,” he said. “But because there’s not that much more cost involved, then it seems wise to put as much of it in place as possible now, even if you don’t use all of it immediately.”

— Brian Robinson