PUBLIC KEY INFRASTRUCTURE ENFORCEMENT ON NAVY SECRET INTERNET PROTOCOL ROUTER NETWORKS, WEB SERVERS, WEB SITES, AND PORTALS UPDATE:

2 NAVADMINs are known that refer back to this one:
NAVADMIN ID Title
NAVADMIN 125/18 ENFORCEMENT OF PUBLIC KEY INFRASTRUCTURE CRYPTOGRAPHIC LOGON ON ALL NMCI AND ONE-NET FUNCTIONAL NON-CLASSIFIED INTERNET PROTOCOL ROUTER AND SECRET INTERNET PROTOCOL ROUTER ACCOUNTS
NAVADMIN 103/20 NAVY POLICY FOR WAIVERS OF PUBLIC KEY INFRASTRUCTURE (PKI) AND HOST BASED SECURITY SYSTEM (HBSS)
UNCLASSIFIED
ROUTINE
R 291317Z JUL 16
FM CNO WASHINGTON DC
TO NAVADMIN
INFO CNO WASHINGTON DC
BT
UNCLAS

NAVADMIN 168/16 CORRECTED COPY

MSGID/GENADMIN/CNO WASHINGTON DC/N2N6/JUL//

SUBJ/PUBLIC KEY INFRASTRUCTURE ENFORCEMENT ON NAVY SECRET INTERNET PROTOCOL 
ROUTER NETWORKS, WEB SERVERS, WEB SITES, AND PORTALS UPDATE//

REF/A/MSG/CNO WASHINGTON DC/051443ZFEB16//
REF/B/MEMO/DDCIO(NAVY)/26FEB16/NOTAL//
NARR/REF A IS NAVADMIN 028/16, PUBLIC KEY INFRASTRUCTURE ENFORCEMENT ON NAVY 
NONSECURE INTERNET PROTOCOL ROUTER NETWORK AND SECRET INTERNET PROTOCOL 
ROUTER NETWORK.  REF B IS DDCIO(N) AMPLIFYING GUIDANCE TO NAVADMIN 028/16.//
POC/MR. BEN PLANKENHORN/CIV/OPNAV N2N6BC/WASHINGTON DC/TEL:  703-692-1896/
EMAIL:  benjamin.plankenhorn@navy.mil//

RMKS/1.  This NAVADMIN provides updated guidance to SECRET Internet Protocol 
Router Network (SIPRNet) Department of Defense (DoD) Public
Key Infrastructure (PKI) Cryptographic Log-on (CLO) enforcement deadlines 
promulgated in references (a) and (b).  This NAVADMIN applies to all Navy 
owned, operated, and controlled SECRET networks, web servers, web sites, and 
portals.

2.  Immediate action.  General end user and privileged accounts must
meet the following requirements:
    a. Tactical and Non-Tactical:
        (1) Fleet Cyber Command/Commander TENTH Fleet (FCC/C10F)
        shall enforce PKI CLO on all SECRET Navy and Marine Corps
        Intranet(NMCI) and OCONUS Navy Enterprise Network (ONE-Net) accounts
        by 31 July 2016.  This includes all end user, Windows system
        administrator, and developer accounts with the exception of
        accounts that have no technical solution.  Exceptions are limited to
        network devices, service accounts, Windows limitations (joining
        devices to the network), and functional/group accounts (currently
        limited by DoD PKI infrastructure until 31 October 2016) or accounts
        that have Deputy Chief of Naval Operations for Information Warfare
        (OPNAV N2N6) approved waivers.
        (2) Owners and Program Owners of all other SECRET tactical
        and Non-Tactical networks including networks connected to the
        Secret Defense Research Engineering Network (SDREN) will enforce PKI
        CLO by 31 July 2016.  This includes all end user, Windows system
        administrator, and developer accounts with the exception of
        accounts that have no technical solution.  Exceptions are limited to
        network devices, service accounts, Windows limitations (joining
        devices to the network), and functional/group accounts (currently
        limited by DoD PKI infrastructure until 31 October 2016) or accounts
        that have OPNAV N2N6 approved waivers.  All stand-alone networks not
        PKI CLO compliant must also submit a waiver request.
        (3) PKI CLO enforcement on SECRET Research, Development,
        Testing, and Evaluation standalone networks is held in
        Abeyance pending guidance from DoD Chief Information Office (CIO) and
        Joint Staff.
        (4) Afloat SECRET Networks:  Commands with Integrated
        Shipboard Network System/Common Personal Computer Operating
        System Environment (ISNS/COMPOSE) will enforce PKI CLO upon
        installation of Navy Certificate Validation Infrastructure (NCVI)
        with the exception of functional/group accounts (currently limited by 
        DoD PKI infrastructure until 31 October 2016).  Platforms with
        Consolidated Afloat Networks and Enterprise Services (CANES) upgrades
        must enforce PKI CLO as the upgrades include a Validation
        Authority (Validation Server/PKI server) that enables PKI CLO upon
        installation with the exception of functional/group accounts
        (currently limited by DoD PKI infrastructure until 31 October
        2016).
        (5) Owners of all SECRET tactical websites and portals will
        enforce PKI authentication (National Security Service (NSS)
        token based) no later than 31 August 2016.
        (6) Accounts not in compliance by applicable deadlines will
        be disabled.

3.  PKI CLO Waiver request guidance.
    a. Waiver requests will only be accepted from Echelon II Commands
    for approval/disapproval by OPNAV N2N6.
    b. All PKI waiver request package requirements and forms for
    individual accounts, networks, and portals, as well as approved
    waivers and a Frequently Asked Questions (FAQ) document for
    additional assistance are posted at:

https://portal.secnav.navy.mil/orgs/OPNAV/N2N6/DDCION/N2N6BC4/PKI/default.

4.  This NAVADMIN will remain in effect until cancelled or superseded.

5.  Released by VADM Jan E. Tighe, Deputy Chief of Naval Operations for 
Information Warfare, OPNAV N2N6.//

BT
#0001
NNNN
UNCLASSIFIED//