Federal Identity, Credential, & Access Management

Identity, Credential, and Access Management (ICAM) are the security disciplines that allow an agency to:

  • enable the right individual to access the right resource at the right time for the right reason

ICAM encompasses the tools, policies, and systems to manage, monitor, and secure access to protected resources. The resources may be electronic files, computer systems, or physical resources such as server rooms and buildings.

Created in 2008, Federal Identity, Credential, and Access Management (FICAM ) coordinates the US Federal civilian agencies on execution of the related policy, standards, implementation guidance, and information technology architectures. There is product testing to promote interoperability and streamlined acquisitions, policy and governance of the Federal Public Key Infrastructure, and agency wide subcommittees designed to promote collaboration and best practices.   We invite you to review information on this site and learn more about Identity, Credentials and Access Management in the US Federal Government. 

Program Activities

ICAM Subcommittee (ICAMSC), under the Federal CIO Council

• Align federal agencies around common practices by fostering effective government-wide identity, credential and access management
• Collaborate with federal government and non-government entities to share best practices and enhance interoperability

FIPS 201 Evaluation Program

• Provides a common government-wide testing capability for commercial products
• Coordinates interaction and coordination with the vendor community to improve the inclusion of US Government ICAM requirements into product offerings

Federal Public Key Infrastructure

• Develops Federal Public Key Infrastructure (FPKI) policy and digital certificate standards
• Promotes interoperability between federal and non- federal digital certificate providers

Trust Framework Solutions

• Provides guidance and processes to enable secure and streamlined online service delivery
• Collaborates with industry to certify solutions for US Government agencies to use in online identity proofing and authentication services offered to Citizens and Businesses

Architecture and Technology

• Coordinates definition of best practices for technology implementations
• Promotes alignment of citizen to government, business to government and government to government services to ensure interoperable and secure solutions for government missions