Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal Government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a Federal Government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Federal Public Key Infrastructure 101

Introduction

Welcome to the Federal Public Key Infrastructure (FPKI) Guides! In these guides, you will find commonly used links, tools, tips, and information for the FPKI.

What Is the Federal PKI?

The Federal PKI is a network of certification authorities (CAs) that issue:

  • PIV credentials and person identity certificates
  • PIV-Interoperable credentials and person identity certificates
  • Other person certificates
  • A small number of federal enterprise device identity certificates

The participating certification authorities and the policies, processes, and auditing of all the participants are collectively referred to as the Federal Public Key Infrastructure (FPKI or Federal PKI).

The Federal PKI includes U.S. federal, state, local, tribal, territorial, and international governments, as well as commercial organizations, that work together to provide services for the benefit of the federal government.

Use the FPKI Graph to see the relationships between the certification authorities in the Federal PKI ecosystem. It graphically depicts how each certification authority links to another through cross-certificates, subordinate certificates, or bridge CAs.

What Is an Example of an Identity Certificate?

A PIV certificate is a simple example. Although there are many types of identity certificates, it’s easiest to explain PIV certificates since you might have one:

  • Identity certificates are issued and digitally signed by a certification authority.
  • The certification authority that issued and digitally signed your PIV certificates is called an intermediate certification authority. The intermediate certification authority’s certificate was issued by another certification authority.
  • This process of issuing and signing continues until there is one certification authority that is called the root certification authority.

An example of an identity certificate with intermediate and root.

The full process of proving identity when issuing certificates, auditing the certification authorities, and the cryptographic protections of the digital signatures establish the basis of trust.

For the U.S. federal government Executive Branch agencies, there is one root certification authority, called the Federal Common Policy Certification Authority (COMMON), plus dozens of intermediate certification authorities and bridged certification authorities. See a graph of the Federal PKI, including the business communities.

Why Should Agencies Use Certificates from the Federal PKI?

All federal agencies should use the Federal PKI for:

  • Facilities access, network authentication, and some application authentication for applications based on a risk assessment
  • Document sharing and digital signatures
  • Signed and encrypted email communications across federal agencies

The Federal PKI provides four core technical capabilities:

An illustration of the four core FPKI capabilities.

The Four Core Federal PKI Capabilities

  • Trust with federal agencies and industry
  • Support for technical non-repudiation
  • Authentication and encryption
  • Digital signatures

These four core capabilities are made possible by leveraging digital certificates; their policies, standards, and processes; and a mission-critical trust infrastructure.

Why Is the Federal PKI Important?

The Federal PKI is important to federal agencies, other government entities, and businesses that need access to federal facilities or participate in delivering federal government services.

Benefit Description
Security Improved facilities, network, and application access through cryptography-based, federated authentication. Federal PKI credentials reduce the possibility of data breaches that can result from using weak credentials, such as username and password. Specifically, the Federal PKI closes security gaps in user identification and authentication, encryption of sensitive data, and data integrity.
Compliance Using the Federal PKI means compliance with several Executive Orders, laws (e.g., FISMA, E-Government Act), initiatives, and standards. The Federal PKI verifies that participating certification authorities are audited and operated in a secure manner.
Interoperability Improved interoperability with other federal agencies and non-federal organizations that trust Federal PKI certificates. The Federal PKI helps reduce the need for issuing multiple credentials to users.
Return on Investment The Federal PKI improves business processes and efficiencies. For example, leveraging digital signing, encryption, and non-repudiation allows federal agencies to migrate from manual processing to automated processing, especially around document processing/sharing, and enhances communications between two or more federal employees for internal efficiency and effectiveness.

Where Can I Find the Policies and Standards?

Certification Authorities

A certification authority is a system that issues digital certificates. These digital certificates are based on cryptography and follow the X.509 standards defined for information security.

The Federal PKI (FPKI) is a network of certification authorities (CAs) that are either root, intermediate, or issuing CAs.

Any CA in the FPKI may be referred to as a Federal PKI CA. The two highest level CAs in the FPKI hierarchy are the FPKI Trust Infrastructure CAs, which are operated and managed by the Federal PKI Management Authority (FPKIMA) Program Office:

COMMON serves as the root and trust anchor for the intermediate and issuing CAs operated by federal government Executive Branch agencies.

Public trust for websites
A new effort is in the planning stages to establish another federal government root and issuing CAs dedicated to Public Trust Transport Layer Security (TLS) device certificates. Follow or contribute to the development of the federal government’s new certificate policy for this public trust effort at https://github.com/uspki/policies.

Federal Common Policy Certification Authority

The Federal Common Policy CA may be referred to as the FCPCAG2, or as COMMON in documents. As the FPKI root and trust anchor for the federal government, the FCPCAG2 supports government person trust and a small number of agency intranet enterprise devices, to include Personal Identity Verification (PIV) credentials. The FCPCA’s design enables any certificate issued by any FPKI CA to validate its certificate path to a single root CA.

At least one commercial vendors includes the FCPCAG2 root certificate in their commercial-off-the-shelf (COTS) products’ [trust stores]0(#fpki-third-party-trust). This enables federal government systems to trust person and enterprise device certificates issued by FPKI CAs. It is possible to add the FCPCAG2 root certificate to trust stores for government-managed devices and servers, if it’s not available by default.

The FCPCAG2 root certificate is included in the trust stores for some platforms such as Adobe. Hoever, for other platforms, such as Microsoft, Mozilla, and Apple, which do not include the FCPCA by default, the FCPCAG2 will need to be added.

Federal Bridge Certification Authority

FPKI Federal Bridge Logo

The current Federal Bridge Certification Authority (FBCA) is the Federal Bridge CA G4.

The FBCA is a PKI bridge or link between the FCPCA and other CAs that comprise the FPKI network and that may operate under comparable but different certificate policies. The FBCA provides a means to map these certificate policies and CAs and allow certificates to validate to the FCPCA root certificate.

The CAs with certificates signed by the Federal Bridge CA G4 are cross-certified. These CAs have established a trust relationship with the FPKI and are audited annually for conformance to the certificate policies. This cross-certification process has extended the reach of the FPKI well beyond the boundaries of the federal government.

All Federal PKI Certification Authorities

A CA that is part of the FPKI is called a participating certification authority.

For historical records, we might label or identify CA systems using a category that shows when the system was established and for what types of communities it is or was used.

We realize all the acronyms and labels may be confusing and welcome your input to help us improve, add information over time, and simplify where needed.

Certification Authority Category Description
PKI Shared Service Provider (SSP) Certification Authorities An SSP CA operates under the Federal Common Certificate Policy and offer federal workforce credentialing services. Any certificate that an SSP CA creates, signs, and issues to people or devices is in the FCPCA trust chain. An SSP must adhere to strict federal IT security standards and requirements. The SSPs are granted a FISMA Authority to Operate (ATO) by GSA, undergo continuous monitoring, and are contracted by the federal government to issue certificates to federal employees and contractors as well as devices that are deployed in federal agency networks. The primary certificate type issued by a PKI SSP are the certificates on a PIV card. There are some PKI SSPs authorized to issue other certificate types such as Common PIV-I.
Non-Federal Issuer (NFI) Certification Authorities A Non-Federal Issuer or NFI is a private sector CA that is cross-certified with the Federal Bridge CA. These organizations provide business identity services for persons who do business with the federal government, but are not part of the federal workforce. Federal agencies may refer business partners to an NFI provider if the agency requires digital signatures and in some limited circumstances PKI authenticators. PIV-I along with other PKI credentials are issued by NFI providers. For more information on NFI PIV-I, see the PIV-I Playbook. An NFI must adhere and receive 3rd party independent audits to validate equivalent operations and practices to the Federal Bridge Certificate Policy. A federal agency may need to configure their systems to validate NFI certificates by installing the intermediate CA certificates within the Federal Bridge trust chain.
Bridge Certification Authorities Bridge CAs connect member PKIs and are designed to enable interoperability between different PKIs operating under their own certificate policies. A bridge CA is not a root and are part of a non-government PKI trust framework provided through the Federal Bridge. A PKI Bridge must adhere and receive 3rd party independent audits to validate equivalent operations and practices to the Federal Bridge Certificate Policy. A federal agency may configure their systems to validate PKI Bridge certificates by installing intermediate CA certificates within the Federal Bridge trust chain.
Federal Agency Certification Authorities A very small amount of government agencies self-operate CAs connected to the Federal PKI Trust Framework. These agencies include the Department of Defense, Department of State, Department of the Treasury, the Government Printing Office, and the U.S. Patent and Trademark Office. These agency PKIs operate under their own certificate policy which has been mapped to the FBCA CP for comparability.

Certificate Types within the Federal PKI

The overarching policies of the Federal PKI are the Federal Common Policy Framework and the Federal Bridge Certificate Policy. For federal agencies that utilize a PKI Shared Service Provider, this is a list of common certificate types available from all PKI Shared Service Provider. Please check with your individual provider if they support your specific need.

Certificate Type General Purpose Authenticator Format
PIV Certificates The PIV Card contains up to five certificates with four available to a PIV card holder. See PIV Certificates to understand more about PIV certificates on a PIV Card. FIPS 201 Approved Smart Card (AAL3)
Common PIV-I Certificates The Common PIV-I card contains up to five certificates with four available to the Common PIV-I card holder. See the PIV-I Playbook for more information on a Common PIV-I card. FIPS 201 Approved Smart Card (AAL3)
Digital Signature Sign documents such as a PDF or word document. Software (AAL2) or Hardware (AAL3)
Encryption (Key Management) Encrypt files or emails. Software (AAL2) or Hardware (AAL3)
Derived PIV Authentication Person authentication for managed devices based on proof of possession and control of a PIV Card. Derived PIV credentials are typically used in situations that do not easily accommodate a PIV Card, such as in conjunction with mobile devices. Software (AAL2) or Hardware (AAL3)
Device Issued to any type of device to facilitate authentication and/or encryption use cases Software (AAL2) or Hardware (AAL3)

Code signing certificates are not allowed under the Federal Common Certificate Policy.

FPKI Third Party Trust

The Federal Common Policy leverages third party trust stores or public trust store to ensure interoperability of federally-issued digital certificates.

What Is a Trust Store?

Millions of public key certificates are issued to people and devices around the world. Certificates constantly change as some are revoked and others are issued—far too many for you to maintain an up-to-date list.

Every software program that interacts with a certificate either has a native trust store or uses the trust store of the operating system. A trust store is a list of root, intermediate, and sometimes user certificates that are trusted by the operating system or application to process transactions. When you are presented with a person or device certificate from a PIV credential, website, email, or some other digital item, your application will automatically check whether the certificate has a valid path to one of the certificates in its trust store. This type of trust store is sometimes called a private trust store. An application that uses PKI certificates will say in its documentation which trust store is used and how to configure it with either public or private certificates.

What Is a Public Trust Store?

A vendor may also have a public trust program that allows PKI operators to submit their roots for distribution within the vendor’s trust store. Certificates distributed by an application may be called “public certificates” while certificates distributed by your agency or a partner may be called “private certificates.”

A public trust store program refers to the collection of root certification authority (CA) certificates that are included and distributed by default in many operating systems, browsers, or applications (referred to as application trust store for simplicity). The public root CAs contained in these trust stores must comply with the root stores requirements, including any specific compliance requirements such as a third party audit or specific operational requirements. For more information on public certificates, see the CIO Council policy on HTTPS.

What Are the Most Common Public Trust Stores?

Operating systems, browsers, and some commercial software operate public trust stores.

The table below lists some common public trust stores. All applications that use PKI use a trust store, but not all applications’ trust stores are managed by a formal program. The applications in this table manage a formal program. If the Federal Common Policy CA G2 (FCPCAG2) (i.e., COMMON) root certificate is included in a trust store and distributed by default, the Includes FCPCAG2 (COMMON)? column below will say Yes.

Application Includes FCPCAG2 (COMMON)? Trust Store Manager Platforms Serviced Program Information Location
Microsoft Trusted Root Certificate Program No Microsoft Management Console Windows OS, Internet Explorer Browser, Outlook Microsoft Trusted Root Program
Apple Root Certificate Program No Keychain Access Utility macOS, iOS, tvOS, WatchOS, Safari Browser Apple Root Certificate Program
Mozilla Network Security Services (NSS) No Browser trust store Firefox, Thunderbird, Linux Operating Systems Mozilla Root Store Policy
Adobe Approved Trust List Yes Application trust store Adobe Acrobat Adobe Approved Trust List
Java Root Certificate Program No Java Applet Java Distributions Including Certificate Authority Root Certificates in Java
Google No Google Admin Console Android OS, Chromium OS Chrome Root Program
Opera No Mozilla NSS Opera Browser See Mozilla NSS Information Above

Google Chrome currently uses the trust store of the operating system on Microsoft, Apple, and Android systems. Linux-based systems distribute the Mozilla NSS Library, which may be modified by each version of Linux.

What Federal PKI Certificate Policies Are Trusted by Adobe and How Do I View Them?

A common question is which certificate policy object identifiers (OIDs) are trusted? The Federal PKI certificate policy OIDs trusted by Adobe are:

Certificate Policies OIDs Certificate Use
Common Hardware                               2.16.840.1.101.3.2.1.3.7 PIV and Federal Bridge Medium Hardware Token                                    
Federal Bridge Medium Hardware Commercial Best Practice 2.16.840.1.101.3.2.1.3.15 Federal Bridge Medium Hardware Token (PKI Trusted Roles may not be U.S. citizens)
Common High                                   2.16.840.1.101.3.2.1.3.16 High Assurance Policy                                                            
PIV-I Hardware                               2.16.840.1.101.3.2.1.3.18 PIV-Interoperable                                                                

Federal PKI certificates may be used for digitally signing documents between federal agencies and with business partners. Adobe is just one option used for digital signatures.

Do the following to view and verify which Federal PKI certificate policy OIDs are trusted by Adobe Acrobat:

  1. Open Adobe Acrobat.
  2. Select Edit > Preferences > Signatures > Identities & Trusted Certificates > More.
  3. Choose Trusted Certificates from the left-hand sidebar.
  4. Choose Federal Common Policy CA and then the Certificate Details tab.
  5. Choose the Certificate Viewer window, and click the Policies tab to see Policy Restrictions.
  6. In Certificate Policies, you will see a comma-separated list of policy OIDs.

IDManagement.gov

An official website of the U.S. General Services Administration

Looking for U.S. government information and services?
Visit USA.gov Edit this page