Implement

Implement IdExchange Fast


We can help you rapidly implement IdExchange using a streamlined implementation process designed for transparency, integration speed and organization privacy. We have unique design templates, fast track implementation methodologies and in house developed power tools help organizations get operational fast.


Implementation Process

Step 1: Define your credentialing needs


Using a series of questionnaires, interviews and remote meeting sessions, we will understand your credential usage needs.

Benefits of our approach

  • Fast: Our processes will help quickly design a custom solution for your specific needs.
  • Educational: We can show you exactly how the system will benefit your organization and how it will meet your needs.
Step 1

Usage

Understanding how your credential will be used is the foundation of the implementation process because different usage models drive different technologies and identity proofing models.

Infrastructure Integration

Your current infrastructure will help us determine how the system will be installed and what options are available for directory services, PKI, identity management and physical access systems.

Issuance model

One of the most important design aspects is the credential distribution process – or the process to give the PIV Card to the end user. Based on needs, we can augment current issuance models or create custom model designed for your business requirements.

Step 2: Design your credentialing architecture


We outline the credential issuance architecture that details how the credentials will be issued in your organization. We will work with key stakeholders from your physical access, PKI, logical access and security staff to ensure the design works for your infrastructure.

Benefits of our approach

  • Tailored: We are able to implement IdExchange in a way that works with your current business processes and technical infrastructure.
  • Transparent: All costs, implementation steps and timelines are clearly described to provide full insight into the process.
Step 2

Architecture review

Based on the information gathered in Step 1, we will present a detailed technical architecture that describes how IdExchange will be installed in your organization. This document will provide the detail system connections, data flow diagrams and end state corporate PIV Card credential.

Implementation plan

After the teams have approved the architecture, we will then provide a detailed, step by step implementation plan that details the technical elements needed, procurement timelines and implementation forecast. Finally, the plan will include the detailed costs for initial implementation and our year costs.

Step 3 – Implement and Train


We will methodically execute the implementation plan, helping your team install the system step by step. When this phase is complete, IdExchange is fully installed and your staff is issuing corporate PIV cards


Benefits of our approach

  • Complete knowledge transfer: As part of the install process, we train your staff to install the system step by step.
  • Security: We never access your systems. Instead, we work with your staff to have them perform the install step by step.
Step 3

Site Preparation

To prepare your organization for an efficient install, we will conduct a remote session to step through key configuration details. We will also provide our IdExchange readiness tool to quickly assess system connections, permissions and data accessibility. These steps will allow the teams to get the technical requirements set properly to streamline the IdExchange system install.

System Install

We will work directly with your staff and guide them step by step through the IdExchange system installation process. Using our auditable scripts and check lists, we will provide a structured methodology to both simultaneously install the system while training your staff on installation and operations techniques.

Training

We conduct training sessions to instruct your staff on system operations and maintenance procedures. Additionally, depending on the complexity of your set up, we will also train operators how to perform identity proofing procedures, print and encode cards and finally, proper usage of the card.