Step 1: Define your credentialing needs
Using a series of questionnaires, interviews and remote meeting sessions, we will understand your credential usage needs.
Benefits of our approach
-
Fast: Our processes will help quickly design a custom solution for your specific needs.
-
Educational: We can show you exactly how the system will benefit your organization and how it will meet your needs.
Usage
Understanding how your credential will be used is the foundation of the implementation process because different usage models drive different technologies and identity proofing models.
Infrastructure Integration
Your current infrastructure will help us determine how the system will be installed and what options are available for directory services, PKI, identity management and physical access systems.
Issuance model
One of the most important design aspects is the credential distribution process – or the process to give the PIV Card to the end user. Based on needs, we can augment current issuance models or create custom model designed for your business requirements.
Step 2: Design your credentialing architecture
We outline the credential issuance architecture that details how the credentials will be issued in your organization. We will work with key stakeholders from your physical access, PKI, logical access and security staff to ensure the design works for your infrastructure.
Benefits of our approach
-
Tailored: We are able to implement IdExchange in a way that works with your current business processes and technical infrastructure.
-
Transparent: All costs, implementation steps and timelines are clearly described to provide full insight into the process.
Architecture review
Based on the information gathered in Step 1, we will present a detailed technical architecture that describes how IdExchange will be installed in your organization. This document will provide the detail system connections, data flow diagrams and end state corporate PIV Card credential.
Implementation plan
After the teams have approved the architecture, we will then provide a detailed, step by step implementation plan that details the technical elements needed, procurement timelines and implementation forecast. Finally, the plan will include the detailed costs for initial implementation and our year costs.
Step 3 – Implement and Train
We will methodically execute the implementation plan, helping your team install the system step by step. When this phase is complete, IdExchange is fully installed and your staff is issuing corporate PIV cards
Benefits of our approach
-
Complete knowledge transfer: As part of the install process, we train your staff to install the system step by step.
-
Security: We never access your systems. Instead, we work with your staff to have them perform the install step by step.