Identity Lifecycle Management Playbook
The Identity Lifecycle Management Working Group of the Federal Chief Information Security Officer Council ICAM Subcommittee developed this playbook to help federal agencies understand and plan identity lifecycle management initiatives.
|Version Number||Date||Change Description|
|1.2||12/15/2022||Minor editorial updates.|
|1.1||10/11/2022||10/11/2022 | Move 3rd party federation content to Cloud Identity Playbook federation section.|
The Identity Lifecycle Management (ILM) Playbook is a practical guide to help federal agencies understand how to shift the focus from managing the access based on credentials to managing the lifecycle of identities as outlined in section III of OMB Memo 19-17. This focus shift will help agencies achieve a centralized identity management system mentioned in OMB Memo 22-09 Identity Pillar Action 1. This playbook defines ILM as stages of an identity from creation to deactivation. This lifecycle process is known as the joiner-mover-leaver process. The intent of implementing a lifecycle management process is to ensure an agency has visibility into all identities they control. For example, the process can help in the following ways:
- Ensure only active employees can access federal resources.
- Remove access when employees haven’t completed the required security training.
- Ensure least privilege is enforced when accounts are created or a user changes roles.
- Track access and privileges of compromised accounts.
Agency Goal: M-22-09 Action Plan
Per OMB Memo 22-09, agencies should have a plan to create and maintain a master user record of all agency users at the enterprise level. This playbook helps agencies understand why and how to create a master user record capability. Implementation is achieved through either the DHS CDM program or in collaboration with an integrator or vendor.
This playbook can also assist agencies in understanding how to support phishing-resistant authenticators as outlined in the identity section of OMB Memo 22-09. Agencies can use this playbook to do two things.
- Understand identity lifecycle management.
- Identify the steps to create and integrate identity lifecycle management within an agency.
This playbook also outlines a four-step process that an agency can utilize to implement identify lifecycle management:
- Document the purpose and goals of identity lifecycle management in an agency policy.
- Architect a solution based on either using a virtual directory or an identity governance and administration (IGA) tool.
- Create a master user record that aggregates digital identity attributes, entitlements, accounts, credentials, and other information.
- Integrate identity lifecycle management into agency enterprise services.
This playbook is designed for identity program managers and enterprise and application architects interested in modernizing their identity management process. Agencies are encouraged to tailor this playbook to fit their unique organizational structure, mission needs, and requirements. Other IT program participants, including program managers and application teams, may find value in incorporating this playbook approach in their planning.
Below are key terms used throughout this Playbook. A linked term denotes it is an official term from a federal policy, NIST Glossary, or a NIST publication. An unlinked term is defined for this document.
- Attribute - A quality or characteristic used to describe a digital identity (e.g., user type, employment status, work role).
- Authoritative Attribute Source - A repository or system that contains attributes about an individual and is considered the primary or most reliable source for this information. This is also referred to as an authoritative data source.
- Card Management System - The system that manages the lifecycle of a PIV Card application.
- Derived PIV Credential - A credential issued based on proof of possession and control of a PIV Card. Derived PIV credentials are typically used in situations that do not easily accommodate a PIV Card, such as in conjunction with mobile devices.
- Federal Enterprise Identity - Refers to the unique representation of an employee, a contractor, an enterprise user, such as a mission or business partner, a device, or a technology that a federal agency manages to achieve its mission and business objectives. This is also known as a Workforce Identity.
- Federation - A process that allows for the conveyance of identity and authentication information across a set of networked systems.
- Identity - The set of physical and behavioral characteristics by which an individual is uniquely recognizable. The digital representation of this is called a Digital Identity.
- Identity Lifecycle Management - The evolution of an identity from creation to deactivation.
- Identity Management System (IDMS) - One or more systems or applications that perform Identity Lifecycle Management functions such as identity proofing, registration, and issuance processes.
- Identity Governance and Administration (IGA) System - A centralized source used to manage entitlements and account provisioning to one or more systems. The Account Management System may also refer to IGA.
- Identity Proofing - The process by which information is collected, validated, and verified about a person to issue credentials to that person.
- Master User Record (MUR) - A unique representation of a user’s accounts, personas, attributes, entitlements, and credentials within an organization.
- Persona - A digital identity unambiguously associated with a single person or non-person entity (NPE). A single person or NPE may have multiple personas, each managed by the same or different organization.
- Public Identity - The unique representation of a subject that a federal agency interacts with, but does not directly manage, to achieve its mission and business objectives.
- PIV Identity Account - The logical record containing credentialing information for a given PIV cardholder. This is stored within the issuer’s identity management system and includes PIV enrollment data, cardholder identity attributes, information regarding the cardholder’s PIV Card, and any derived PIV credentials bound to the account.
- Orphan Account - A system account that is not linked to a digital identity or is unmanaged.
- Vetting - The process by which covered individuals undergo investigation, evaluation, and adjudication of whether they are, and remain over time, suitable or fit for federal employment. This includes eligibility to occupy a sensitive position,access to classified information, serve as a non-appropriated fund employee or a contractor, serve in the military, or authorized to be issued a federal identity credential. This ensures individuals continue to meet the applicable standards for the position for which they were favorably adjudicated.
The primary audience is an agency Identity, Credential, and Access Management (ICAM) Program Manager. The table below lists secondary audience members and how to engage them.
Table 1: Stakeholder Table.
|Stakeholder||Stakeholder Type||Engagement Point|
|Agency ICAM Governance||Governance Body||Reduce risk through lifecycle management and meet the intent of OMB Memos 19-17 and 22-09.|
|Application Owners||Office||ICAM service consolidation and modernization to identity-centric security processes.|
|Human Resources||Office||Authoritative attribute source.|
|Security/Vetting||Office||Eligibility, visibility, audit, reporting, and authoritative attribute source.|
|Training||Office||Authoritative attribute source.|
The Identity Lifecycle Management Working Group of the Federal Chief Information Security Officer Council ICAM Subcommittee developed this Playbook. U.S. Federal Executive Branch agencies can use this Playbook to plan identity lifecycle activities and services related to the FICAM Architecture Services Framework. This Playbook is not official policy, mandated action, or provides authoritative information technology terms. It includes best practices to supplement existing federal policies and builds Office of Management and Budget Memorandum 19-17, and existing FICAM guidance and playbooks. Subject areas with intersecting scopes, such as credentialing standards, human resources processes, and Continuous Diagnostic and Mitigation (CDM) are considered only to the extent that they relate to ICAM services delivered in a cloud service model. Privileged access management (e.g., superusers, domain administrators) is out of scope for this Playbook.
Identity Lifecycle Management 101
Identity Lifecycle Management is a core identity service to protect federal data. As with our human identities, our digital identities follow a similar process from creation to retirement. Employees complete vetting/identity proofing, have accounts created on multiple systems, get promoted, and eventually leave an organization. Identity Lifecycle Management encompasses the activities of creating, identity proofing/vetting, provisioning, aggregating, maintaining, and deactivating digital identities on an agency’s enterprise identity, credential, and access management (ICAM) system. This playbook can aid agencies in understanding how to shift the focus from managing the lifecycle of credentials to the lifecycle of identities outlined in section III of OMB Memo 19-17.
It’s common in the federal ICAM community to synonymously refer to everything identity related as PIV and compare processes to how an agency would do an identity process with a PIV card. A key distinction between a digital identity and a PIV card is formalized in a master user record which is a unique representation of a user’s accounts, personas, attributes, entitlements, and credentials within an organization. One digital identity is linked to one PIV card, but that one identity may have multiple accounts, attributes, entitlements, and potentially other non-PIV credentials (e.g., username and password, one-time pin apps) that are used to access applications where a PIV card is not used. This playbook can also help agencies understand how to support non-PIV authenticators outlined in the identity section of OMB Memo 22-09
This playbook has two distinct sections.
- The first section is an overview of identity lifecycle management. It explains the distinct processes involved in managing identities and gives a brief description of the similarities and differences in managing a PIV card versus managing an identity.
- The second section contains plays on how to create an identity lifecycle management process within your agency. It includes four steps to create a policy, architect a solution, create a master user record, and then integrate the master user record for enterprise-wide use.
The next section will outline the identity lifecycle process.
Identity Lifecycle Process
Identity lifecycle management is the evolution of an identity from creation to retirement. The lifecycle management process includes three distinct phases with individual steps within each phase. These phases are known as the Joiner-Mover-Leaver process.
Figure 1: Identity Lifecycle Process
Stage 1 - Joiner
- Creation - Establish a new master user record or an identity associated with an existing master user record made of attributes that define a person or entity. Processes associated with creation include digital identity or authoritative attribute source.
- Identity Proofing/Vetting - The process by which information is collected, validated, and verified about a person. For federal employees, contractors, and anyone working for or on behalf of the government this phase will include the prerequisite vetting investigation and adjudication. Processes associated with identity proofing include source document validation, identity verification, remote proofing, or in-person proofing.
- Provisioning - Create, manage, and delete accounts and entitlements in dependent systems. Dependent systems are either authoritative attribute sources such as directories or consuming sources such as single sign-on system and applications with provisioning processes. Processes associated with provisioning include entitlement management, grant access, remove access, account management, and account creation.
Stage 2 - Mover
- Maintenance - Maintain accurate and current attributes and entitlements associated with a master user record. Processes associated with maintenance include attribute management or access reviews.
- Identity Aggregation - Find and connect disparate digital identities to a master user record. Processes associated with identity aggregation include identity reconciliation, identity resolution, master user record, account linking, and separation of duty analysis.
Stage 3 - Leaver
- Deactivation - Deactivate or remove a master user record or identities associated with a master user record. Processes associated with deactivation include suspension, archive, or deletion.
A key element of lifecycle management is the concept and execution of a master user record.
A Master User Record is a unique representation of a user’s accounts, personas, attributes, entitlements, and credentials within an organization.
Figure 2: Account Aggregation Process to Create a Master User Record
A master user record aggregates user accounts, attributes, entitlements, and issued credentials to understand in a single view the access and authorization of a specific user. Within the DHS Continuous Diagnostics and Mitigation (CDM) data model, a Master User Record contains aggregated attributes from multiple authoritative sources. The below table is an overview of authoritative sources, the object types, and attributes collected.
Table 2: Data Elements in the DHS CDM Master User Record
|Authoritative Attribute Source||Object Type||Attributes Collected|
|Agency HR||Role||Job Title, Department, Component, Location, Manager, User Type (Gov, Contractor, Non-Person, Other)|
|Agency HR||Status||Status (Active, Leave Type, Inactive, Suspended)|
|Agency IDMS||User||Unique Identifier (UserID), Full Name, Email|
|Agency IDMS||CRED||Credential Types Issued|
|Agency IDMS||Accounts||List of accounts associated with this user|
|Agency IDMS||PRIV||Privilege Type, Status, Associated System|
|Agency IDMS||Entitlement||Entitlement Type|
|Vetting System||TRUST||Eligibility, Status, Type of vetting completed|
|Training System||BEHAVE||Security Training Status, Training Types|
Vetting incorporates all steps in the end-to-end process, including:
- Determine the appropriate level of investigation needed for the position.
- Validate whether the individual has been investigated to the necessary level and if so, if that investigation was favorably adjudicated.
- Collect background information via standard forms.
- Conduct the investigation.
- Adjudicate the investigative information obtained.
- Provide administrative due process or other procedural rights.
- Perform ongoing assessments (to include continuous vetting or reinvestigation) to ensure that individuals continue to meet the applicable standards for the position for which they were favorably adjudicated.
For specific information on how DHS CDM created a Master User Record including which tools they’ve used, go to the CDM document repository on Max.gov. A master user record is most often created using either a virtual directory, identity governance and administration (IGA) tool, or potentially a Single Sign-On tool if it also supports a virtual directory capability.
Managing Identity Lifecycle vs Managing Credential Lifecycle
A key theme in OMB Memo 19-17 is for federal agencies to shift the focus from managing the lifecycle of credentials to managing the lifecycle of identities. What does this mean? The main focus of this statement is for federal agencies to create a centralized and agile identity and access management system that leverages attributes for fine-grained authorization rather than based on a credential. This focus shift will help agencies achieve an enterprise ICAM system that is agile to support technology modernization. Examples of shifting the operating model include the following.
Table 3: Identity-Centric Versus Credential-Centric
|Enable Single Sign-On for agency applications||Manage authentication at each individual application.|
|Federate application for external partner access.||Application-specific authentication using a PIV card or Username and Password.|
|Support a variety of phishing-resistant authenticators with a path toward a total passwordless architecture.||Only support PIV card authentication or Username and Password as a backup.|
|Leverage attributes aggregated through a MUR for fine-grained authorization.||Leverage attributes only from a PIV Card for authorization.|
Myth Busted - A PIV Card is my only option
While an employee using PIV is the ultimate security goal, what happens when a PIV is either not available or not compatible with the access requirements? Employees lose PIV cards and it may take days, weeks, or months for an employee to receive their new or replacement PIV. An agency should have a phishing-resistant alternative when a PIV card is not available. Allowing username and password as a backup option should not be the default policy exception.
Phishing-Resistant Authenticator Binding
A PIV card is the result of identity proofing/vetting. After identity proofing and initial identity vetting are complete (to include interim eligibility through favorable review of fingerprint results and initiation of required investigation), a human identity is bound to a PIV card through the public key infrastructure certificate issued on the PIV smart card. The smart card is bound to the digital identity in an agency’s Master User Record and enterprise identity management system. This can then be provisioned to other directories, applications, physical access control systems, and single sign-on systems. Without the binding, the PIV card to these directories and applications is just a physical identification badge. The same process to bind a PIV to a digital identity is the same process an agency can use to bind other PKI and Non-PKI Derived PIV credentials. Federal Information Processing Standard (FIPS) 201-3 section 2.10 states the following on Derived PIV credentials.
- Binding and issuing of Derived PIV credentials shall use valid PIV Cards to establish cardholder identity.
- Derived PIV credentials shall meet the requirements for Authenticator Assurance Level (AAL) 2 or 3 specified in NIST Special Publication 800-63.
- Derived PIV credentials shall be bound to the cardholder’s PIV identity account only by the issuing department or agency responsible for managing the PIV identity account in the agency’s enterprise identity management system.
Derived PIV credentials are not embedded in the PIV card, but are stand-alone credentials integrated into a variety of devices or platforms. This binding of multiple Derived PIV Credentials is possible through creating a Master User Record. These Derived PIV credentials can include a stand-alone Fast ID Online (FIDO) 2 using Web Authentication (WebAuthN) mentioned in OMB Memo 22-09.
The most common way to integrate non-PKI-derived credentials is through a modern Single Sign-On tool or operating system that supports FIDO2 or WebAuthN. Derived PIV credentials play an important role in environments where a smart card is not cost effective or supported such as chrome operating system, mobile devices, and secure offices. Per OPM, December 2020 guidance if the PIV credential is suspended or revoked, any associated derived credentials must also be suspended or revoked.
Myth Busted - This authenticator is not HSPD-12 or FIPS 201 compliant
HSPD-12 identifies four criteria for secure and reliable forms of identification. FIPS 201 outlines the criteria to issue a PKI-based smart card credential. Agencies use One-Time Pin tokens and One-Time PIN mobile applications while they migrate to a phishing-resistant option. Agencies may make a risk decision to use a variety of phishing-resistant authenticators like PIV or other PKI or and non-PKI FIDO certified phishing-resistant authenticators.
Shift From Managing Credentials to Managing Identities
This playbook intends to help agencies achieve OMB Memo 19-17 outcomes to shift the focus operating model from managing access based solely on credentials to managing the lifecycle of identities and the appropriate job functions and roles as they evolve over time in an agency or the federal government. The Identity Management services in the Federal ICAM architecture include Creation, Identity Proofing, Provisioning, Maintenance, Identity Aggregation, and Deactivation. These services are collectively known as Identity Lifecycle Management (ILM).
Step 1. Document the Process in an Agency Policy
Document an agency policy to identify the roles and responsibilities required to implement an identity lifecycle management process. It is a good practice to coordinate the document through the agency’s ICAM governance body to ensure all interested stakeholders are aware of the initiative and their respective responsibilities. This document should complement or be included in the agency’s existing ICAM policy. For more information on ICAM program management or the ICAM governance body, see the ICAM Program Management Playbook or the ICAM Governance Framework. The agency policy should include the following elements.
- Outline the purpose of implementing ILM.
- The roles and responsibilities are mapped to the authoritative attribute source. Such as:
- Training Office to gather security training status.
- Security/Vetting Office to gather PIV eligibility status.
- HR Office to gather employment information status.
- Application Owners to identify entitlements that are appropriate to a role and assigned to a user.
- Identify other offices as needed.
- Specific steps or actions for roles at each step of a Joiner-Mover-Leaver process that aligns with the FICAM architecture identity management services.
- Agency or government references.
- A point of contact.
An agency policy ensures an agency-wide commitment to implementing and operating an identity lifecycle management process.
Myth Busted - We don’t need a specific policy for Identity Lifecycle Management
It is true an agency doesn’t need a specific policy for ILM, but either having a policy or integrating lifecycle management into your agency policy ensures a consistent approach with executive leadership support. Without leadership support, your ILM initiative may not achieve enterprise-wide adoption.
Step 2. Architect the Solution
The solution is how your agency will implement ILM. Most solutions are based on two technologies.
- Virtual Directory - A virtual directory is a specific type of identity directory that aggregates data from multiple data sources. An Enterprise Identity Store is an example of a virtual directory. Data sources include multiple Active Directory instances, application directories, cloud directories, and other relational databases. A virtual directory leverages a combination of Lightweight Directory Access Protocol (LDAP), Application Programming Interface (API), or System for Cross-domain Identity Management (SCIM) to aggregate data. A virtual directory is often necessary for large organizations that have user directories operated across multiple operational components or divisions. Some Single Sign-On tools, which perform access management, may also support a virtual directory capability.
- Identity Governance and Administration (IGA) - An IGA tool inventories, analyzes, and reports on access and entitlements within an enterprise. It has virtual directory features to aggregate identity information from multiple other directories. By integrating with authoritative sources and applications an IGA tool can report on who has access, what they can access, and why they have access. An IGA tool is a primary mechanism to perform access reviews. It can be a stand-alone tool or part of an IDMS suite.
Each tool has a distinct purpose. Your agency should consider your overall ICAM architecture to understand the cost, overlapping capabilities, and talent necessary to implement and maintain an ILM capability.
Figure 3: DHS CDM Master User Record Architecture
Step 3. Create the Master User Record
An authoritative attribute source is a repository or system that contains one or more attributes about a digital identity and is considered the primary or most reliable source for this information. For example, the most reliable source for an employee status attribute (active, leave, suspended, deactivated) is usually in a human resources system. The first step in identifying authoritative attribute sources is understanding what attributes are needed within your agency. This data analysis and collection process may include:
- Agency Vetting System - Contains investigative and adjudicative results on suitability or fitness for federal employment, eligibility to occupy a sensitive position, eligibility for access to classified information, and eligibility for a federal identity credential (e.g., PIV). Consult your Security/Vetting office on IT integration planning and implementation with ILM.
- Card Management System - An agency’s card management system
- Application Analysis - Conducting an internal application analysis from the Single Sign-On Playbook to identify which attributes are used across which applications. For example, employee access is dependent on current and complete IT security training. The security training attribute is most likely in the agency’s training system, but specific to application access.
These are sources that you use to create a digital identity. The attributes are what you pull from the authoritative sources to add to that digital identity.
Figure 4: Example of an Orphan Account
To properly implement attribute changes, you should identify authoritative data sources that drive how the attribute change is implemented and are shared with connected systems. However, if there is not a process in place to drive the use of the authoritative data sources, the process will be inefficient and may result in vulnerabilities, like excess, “orphaned” accounts. An orphaned account is a potential risk because it is either unmanaged, not owned, or not linked to a digital identity.
An example of an orphaned account includes active employee accounts where the employee no longer works for the organization. Another example is a Microsoft service account for an application that no longer exists. It is recommended to keep a list of identity data that is available, know where it originates, and what systems are authoritative in that way. The most common pattern to integrate attributes into an ILM tool is based on connection methods of an authoritative attribute source.
- Legacy and on-premises applications most likely support LDAP.
- Cloud applications most likely support an API or SCIM.
No Orphaned Accounts
Agencies should focus on identifying and reducing the number of orphaned accounts and especially orphaned accounts with privileged access.
The main benefits of a master user record include:
- A single view of all digital identities within an agency.
- Identify users by vetting status, credential type, training status, privileged, and non-privileged accounts.
- Aid in cyberstat reporting for ICAM questions.
- A foundational element to implement more mature identity processes when integrated with other agency systems such as access management and information technology service management (ITSM).
Step 4. Integrate with Agency Enterprise Services
An agency can further realize the benefit of ILM by integrating the master user record with other agency enterprise ICAM services. This integration can aid agencies to automate provisioning, de-provisioning, and reporting as well as in federating both within and external to an agency. In this context, the federation is transferring identity and authentication between networked systems rather than relying on siloed information specific to the target application.
Figure 5: ILM Integration with Single Sign-On
The following is an example of the benefits of a master user record and integration with an access management tool for a cross-agency federation use case.
Use Case - An agency employee needs to collaborate with another government agency. The other government agency application requires a specific human resources attribute to access the application. The application is federated with the employee’s home agency and allows a partner agency to use their home single sign-on to authenticate to the tool.
- The agency adds the human resources attribute to the individual employee record using a bulk update in the Master User Record.
- The Master User Record is available to the Single Sign-On tool in an assertion protocol.
- The Single Sign-On adds the additional human resource attribute in an assertion to the partner application to facilitate authentication and authorization in the partner application.
Make attributes available for authorization decisions. Federation is not only accepting credentials as proof from other agencies but also making your identity credentials available to other agencies.
- Attributes are available to your agency via SSO assertions.
- Focus on the best practice of using assertion protocols rather than exposing attributes externally.
- Focus on authorization through federation rather than on PIV. PIV is a static credential with static attributes. SSO with Federation is dynamic-based on the SSO integration with a master user record. It is easier to update a directory than a PIV credential.
See the Cloud Identity Playbook Federation section for more information on federation and using trust frameworks for government, mission partner, or public identity federation.
The ILM playbook outlined an identity lifecycle process and four steps to create a master user record and lifecycle process within your agency. ILM is the evolution of an identity from creation to deactivation. There are specific steps within each lifecycle phase of the joiner-mover-leaver process. A master user record is the core of ILM and acts as an aggregation point of identity data for all agency users. A master user record integrated with access management tools provides a foundation for more mature ICAM processes.
Appendix A. Policies, Standards, and Guidance
- Executive Order 14028 - Improving the Nation’s Cybersecurity
- OMB Memo 22-09 - Moving the U.S. Government Toward Zero Trust Cybersecurity Principles
- OMB Memo 21-31 - Improving the Federal Government’s Investigation and Remediation Capabilities Related to Cybersecurity Incidents
- OMB Memo 19-17 - Enabling Mission Delivery through Improved Identity, Credential, and Access Management
- Federal Information Processing Standard 201 - Personal Identity Verification of Federal Employees and Contractors
- NIST Special Publication 800-63 - Digital identity Guidelines
- NIST Special Publication 800-157 - Guidelines for Derived PIV Credentials
- FICAM Architecture
- ICAM Governance Framework
- NIST Special Publication 800-63 Additional Information Sources Including Conformance Criteria
- NIST Interagency Report 8149 - Developing Trust Frameworks to Support Identity Federations
- OPM Credentialing Standards Procedures for Issuing Personal Identity Verification Cards under HSPD-12 and New Requirement for Suspension or Revocation of Eligibility for PIV Credentials