An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Using the CAC to access the AMC network

  • Published
  • By Kevin Nettrour
  • Air Mobility Command Public Key Infrastructure
As Air Force networks become more and more vulnerable to attacks from both inside and outside threats, we must increase the security measures we use to defend them. Digital certificates encoded onto the integrated circuit chip on your Common Access Card provide greater protection to the network and an increased level of confidence for exchanging vital information over an increasingly unsecured Internet.

In mid-September, Air Mobility Command will be using the CAC for network access. Each time a user logs on to the network or unlocks their computer, they will be prompted to use their CAC instead of entering a user name and password. The CAC carries on it a unique number assigned to the CAC owner and associated to the owner's network account. The CAC is inserted into the card reader on the user's computer; the computer then reads that unique number and prompts the owner for their 6 to 8 digit personal identification number. The network accesses the digital certificates carried on the CAC, verifies the certificates are valid and allows network access.

All AMC members have enabled their personal account to accept the CAC as a means of logging on to the network in place of user name and password. However, many AMC members rely on services that as of yet will not available when their personal network account is set to require the use of the CAC for logon. Such services include web mail using Outlook Web Access and other means of remote access to the AMC network. Client Support Administrators and other computer support personnel have polled users to ensure no loss of critical services. AMC is working to CAC-enable many of these services in the near future.

It is your responsibility to protect your CAC from damage, loss or theft. Part of protecting your CAC is remembering to remove it from the CAC reader when you leave your desk. That prevents others from taking the CAC and ensures you have it to use at the base gate when you come to work the next day.

It is equally important to protect your PIN from compromise; only you should know your PIN. Remember, your CAC, along with the PIN, represents you in the digital world and gives the users all the same privileges enjoyed by the user. Never leave your CAC unattended anywhere and never share your PIN with anyone.

As time passes, the certificates on the CAC will be used to allow access to more and more networks and network-based services. Using it to control network access is just one step in creating a more secure AF computing environment.