uspki / policiesView external linksLinks
2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.
☆44Mar 19, 2024Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Federal PKI, X.509 certificate linter☆16Mar 11, 2025Updated 11 months ago
- This is the old location for the PIV Playbook. New location below.☆74Apr 28, 2021Updated 4 years ago
- Home of the .gov registry☆30Jan 29, 2024Updated 2 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- The content on this repository was migrated to idmanagement.gov.☆31Sep 11, 2023Updated 2 years ago
- Identity developer dashboard☆28Updated this week
- 18F Brand☆29Feb 16, 2024Updated last year
- An example Login.gov client application which authenticates users via OpenID Connect (OIDC). Built with Node.js, Express.js, and Passport…☆12Feb 14, 2020Updated 5 years ago
- ☆14Jun 11, 2021Updated 4 years ago
- A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.☆388Aug 6, 2021Updated 4 years ago
- Common utility modules shared between various Python based Yubico projects.☆12Apr 18, 2017Updated 8 years ago
- ICAM Test Card Signer and Data Populator☆16Apr 28, 2020Updated 5 years ago
- A Django-based domain name registrar that interfaces with an EPP registry☆78Feb 7, 2026Updated last week
- Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organiz…☆19Aug 17, 2018Updated 7 years ago
- PIF website, jekyll flavored☆20Jan 22, 2026Updated 3 weeks ago
- Sample project demonstrating usage of Purebred Registration's document provider extension to import keys.☆20Sep 26, 2025Updated 4 months ago
- ☆22Sep 7, 2025Updated 5 months ago
- The moarTLS Analyzer Browser Extension flags non-secure references in web pages.☆24Sep 24, 2024Updated last year
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆23Jul 27, 2022Updated 3 years ago
- Scan domains and return data based on trustworthy email best practices☆216Dec 31, 2025Updated last month
- A Jekyll theme showcasing the U.S. Web Design System☆141Jan 21, 2026Updated 3 weeks ago
- GSA's administration and implementation of github.com/gsa☆27Feb 21, 2024Updated last year
- A site for CISA directives☆167Jun 5, 2024Updated last year
- How the federal .gov domain space is doing at best practices and policies.☆95Jun 9, 2020Updated 5 years ago
- Documents for Mozilla's PKI policies - certificate root program, etc.☆55Feb 24, 2025Updated 11 months ago
- Tool to verify conformance to the PIV data model per most recent releases of FIPS 201 and associated publications☆27Jan 6, 2025Updated last year
- tl-create is a cross-platform command line tool to create a X.509 trust list from various trust stores. (Keywords: CABFORUM, eIDAS, WebPK…☆33Jan 22, 2026Updated 3 weeks ago
- Repository for the CA/Browser Forum Server Certificate Chartered Working Group☆222Updated this week
- Foreign Relations of the United States - TEI XML source files☆39Updated this week
- Chrome extension that disables WebUSB☆34Mar 4, 2018Updated 7 years ago
- A super simple commandline utility to search for slack messages that have been reacted to with a specific emoji☆32Feb 9, 2016Updated 10 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Basic Jupyter Notebook Tech Series☆14Apr 22, 2023Updated 2 years ago
- DOS Program Development☆12Nov 9, 2022Updated 3 years ago
- ☆14Feb 23, 2023Updated 2 years ago
- DARPA HackFest☆35Nov 12, 2017Updated 8 years ago
- DEPRECATED 🛑- Federal Source Code policy implementation.☆406Mar 1, 2019Updated 6 years ago
- DEPRECATED eXist code for Syriaca.org: The Syriac Reference Portal☆10Jun 1, 2024Updated last year
- A presentation by Aaron Goldsmith☆10Jan 8, 2026Updated last month