Edit this page


Welcome to the Personal Identity Verification (PIV) Guides! On these pages you will find information on how to implement common PIV configurations at your organization. These guides are open source and a work in progress and we welcome contributions from our colleagues.

The guides focus on using PIV credentials for logical access such as authenticating to networks or applications, or digitally signing and encrypting. Using PIV for physical access will be covered under another set of guides.

If you cannot find the information you are looking for, review the Issues for questions and lessons that are still in progress for write-ups. Create an new Issue to ask a question or contribute your lessons to others.

The information on this page provides introductory information.

  1. What is PIV?
  2. What is in the PIV Guides?
  3. Why is PIV usage important?
  4. What systems should use PIV?
  5. Where can I find the Standards?

What is PIV?

A Personal Identity Verification (PIV) credential is a US Federal government-wide credential used to access Federally controlled facilities and information systems at the appropriate security level.

PIV credentials have certificates and key pairs, pin numbers, biometrics like fingerprints and pictures, and other unique identifiers. When put together into a PIV credential, we have the capabilities to implement multi-factor authentication for networks, applications and buildings.

What information is in these PIV guides?

First, we cover the basics of PIV credentials including:

  • What PIV is, contains and looks like
  • The basics of getting started with PIV credentials
  • Using PIV for network authentication (smartcard logon)

We also have sections for Applications, Developer Guides and User Guides. All these guides need your contributions!

Share your expertise

We want you to contribute and share: your lessons when configuring systems or applications, tuning considerations, code, common challenges, troubleshooting errors, and any information helpful for your colleagues.

Why is PIV usage important?

Enabling systems and facilities to use PIV credentials for authentication enhances the security of the agencies. PIV credentials allow for a high level of assurance in the individuals that access your resources, as they are only issued by trusted providers to individuals that have been verified in person. The PIV credentials are highly resistant to identity fraud, tampering, counterfeiting, and exploitation.

PIV credentials are standardized as well. PIV credentials might be issued by different organizations using different commercial or open source products, on different form factors (cards, mobile devices, etc). However, the PIV credentials are standardized - every PIV credential is required to have specific information, using technology which is interoperable.

Your PIV credential from one agency will have the same basic required format, information and technology as a PIV credential from your partner agencies. This allows us to trust each other, share applications, and architect and implement systems using common patterns for authentication.

What systems should use PIV?

Any system at your organization that requires heightened security for determining who should gain access can and should use PIV for authentication. While PIV credentials can be used for authentication on almost any system, they are especially useful for systems that protect sensitive information.

PIV should be used for:

  • All authentication for all privileged users including servers, networks, and applications;
  • All network authentication for all users;
  • All application authentication for all users of an application that protects or contains sensitive information; and
  • Access to facilities and buildings.

Where can I find the Standards?

If you are interested in PIV credentials or working on using PIV credentials, you should review pages on this site and other online resources.

If you are interested in the bits and bytes of PIV credentials, you can review the Standards. The Standards are best to review if you develop products such as hardware or software that are specific to PIV credentials for the US Federal Government. However, for most users and engineers, the Standards may seem overwhelming and will be too detailed for your needs.

To review the Standards, there is a NIST website with all PIV related Standards. Links to some of the most common Standards: