Implement IdExchange Fast
We can help you rapidly implement IdExchange using a streamlined implementation process designed for transparency, integration speed and organization privacy. We have unique design templates, fast track implementation methodologies and in house developed power tools help organizations get operational fast.

Step 1: Define your credentialing needs
Using a series of questionnaires, interviews and remote meeting sessions, we will understand your credential usage needs.
Benefits of our approach
- Fast: Our processes will help quickly design a custom solution for your specific needs.
- Educational: We can show you exactly how the system will benefit your organization and how it will meet your needs.
Usage
Understanding how your credential will be used is the foundation of the implementation process because different usage models drive different technologies and identity proofing models.
Infrastructure Integration
Your current infrastructure will help us determine how the system will be installed and what options are available for directory services, PKI, identity management and physical access systems.
Issuance model
One of the most important design aspects is the credential distribution process – or the process to give the PIV Card to the end user. Based on needs, we can augment current issuance models or create custom model designed for your business requirements.

Step 2: Design your credentialing architecture
We outline the credential issuance architecture that details how the credentials will be issued in your organization. We will work with key stakeholders from your physical access, PKI, logical access and security staff to ensure the design works for your infrastructure.
Benefits of our approach
- Tailored: We are able to implement IdExchange in a way that works with your current business processes and technical infrastructure.
- Transparent: All costs, implementation steps and timelines are clearly described to provide full insight into the process.
Architecture review
Based on the information gathered in Step 1, we will present a detailed technical architecture that describes how IdExchange will be installed in your organization. This document will provide the detail system connections, data flow diagrams and end state corporate PIV Card credential.
Implementation plan
After the teams have approved the architecture, we will then provide a detailed, step by step implementation plan that details the technical elements needed, procurement timelines and implementation forecast. Finally, the plan will include the detailed costs for initial implementation and our year costs.

Step 3 – Implement and Train
We will methodically execute the implementation plan, helping your team install the system step by step. When this phase is complete, IdExchange is fully installed and your staff is issuing corporate PIV cards
Benefits of our approach
- Complete knowledge transfer: As part of the install process, we train your staff to install the system step by step.
- Security: We never access your systems. Instead, we work with your staff to have them perform the install step by step.
Site Preparation
To prepare your organization for an efficient install, we will conduct a remote session to step through key configuration details. We will also provide our IdExchange readiness tool to quickly assess system connections, permissions and data accessibility. These steps will allow the teams to get the technical requirements set properly to streamline the IdExchange system install.
System Install
We will work directly with your staff and guide them step by step through the IdExchange system installation process. Using our auditable scripts and check lists, we will provide a structured methodology to both simultaneously install the system while training your staff on installation and operations techniques.
Training
We conduct training sessions to instruct your staff on system operations and maintenance procedures. Additionally, depending on the complexity of your set up, we will also train operators how to perform identity proofing procedures, print and encode cards and finally, proper usage of the card.