This is a carousel with auto-rotating slides. Activate any of the buttons to disable rotation. Use Next and Previous buttons to navigate, or jump to a slide using the slide dots.
The ICAM FIBF Working Group is working on establishing ICAM as a federal function.Learn more about the ICAM FIBF
helps the U.S Government agencies achieve Zero Trust cyber maturity quickly.Learn more about FICAM
concept assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location or based on asset ownership.Learn more about Zero Trust
is authorized and trusted to perform security-relevant functions that ordinary users cannot perform—also known as a administrator or superuser.Learn more about Privileged user
Phishing resistant authenticators
are not susceptible to common interception and replay attacks. Phishing-resistant MFA protects users from sophisticated online attacks.Learn more about Phishing resistant authenticators
Single sign on
centralizes application access for agency employees and contractors or federate access with other federal executive agencies.Learn more about Single sign on
is a decision whether to grant access to a user or machine account following authentication. Authorization to resources can be fine grained to help achieve attribute based access vs the traditional role based access.Learn more about User authorization
Identity lifecycle management
encompasses the activities of creating, identity proofing, vetting, provisioning, aggregating, maintaining, and deactivating digital identities on an agency’s enterprise identity, credential, and access management (ICAM) system.Learn more about Identity lifecycle management
Partner with us
Sell your identity, credential, and access management ICAM products and services to the federal government.
Adopt innovative identity, credential, and access management ICAM products and services to meet your agency's mission-needs.
Govern and operate ICAM systems and services.