gxisaccess.gs.mil Open in urlscan Pro
214.28.193.99  Public Scan

Submitted URL: https://gptools.gvs.nga.mil/php/change_password.php/
Effective URL: https://gxisaccess.gs.mil/oam/cert/west/servlet/login.jsp?bmctx=68F30303871ACD54197C43B9C9D38A0FBA8EB1C52C9C7A4C5EB3E3522E...
Submission: On March 10 via manual from US — Scanned from DE

Form analysis 7 forms found in the DOM

Name: loginPOST CredCollector

<form name="login" id="login" action="CredCollector" method="post" target="_parent" autocomplete="off">
  <label>Username: <input name="username" id="username" type="text"></label>
  <label>Password: <input name="password" id="password" type="password"></label>
  <script type="text/javascript">
    const csrfToken = '-86-66-3910-13-419484-81-103-105-7146-99-73-2160-125-123-29';
    document.write('<input type="hidden" id="csrftoken" value="' + csrfToken + '" />');
    setCookie('csrftoken', csrfToken, 1);
  </script><input type="hidden" id="csrftoken" value="-86-66-3910-13-419484-81-103-105-7146-99-73-2160-125-123-29">
  <div id="impersonateContainer" style="padding-top:20px; padding-left:20px; display: none;"><label><input type="checkbox" name="impersonate" id="impersonate" style="display: inline; margin-bottom: 5px;"> Impersonate Entry?</label>
    <label style="padding-left: 10px;">Impersonatee: <select name="impersonateIdType&quot;" id="impersonateIdType" disabled="">
        <option value="uid" selected="">UID</option>
        <option value="orclnormdn">DN</option>
        <option value="gxCertificateSubjectString">Certificate Subject String</option>
        <option value="gxCertificateSubjectStringReversed">Certificate Subject String Reversed</option>
      </select>
      <input name="impersonateeID" id="impersonateeID" type="text" disabled="">
    </label>
    <label style="padding-left: 10px;">Impersonatee Identity Store: <select name="impersonateeIdStore" id="impersonateeIdStore" disabled="">
        <option value="GXIS_ADM">GXIS_ADM</option>
        <option value="GXIS_OVD">GXIS_OVD</option>
        <option value="IDSPROFILE-Gx_IDS">IDSPROFILE-Gx_IDS</option>
        <option value="IDSPROFILE-idxuserrole">IDSPROFILE-idxuserrole</option>
        <option value="IDSPROFILE-userrole">IDSPROFILE-userrole</option>
        <option value="UserIdentityStore1" selected="">UserIdentityStore1</option>
      </select>
    </label>
  </div>
  <div id="forgotPasswordContainer" style="padding-top:5px; display: none; font-size:.9em;">
    <span style="display: inline-block; padding-top: 5px;">
      <a href="https://portal.geoaxis.gs.mil/disadvantaged-users/forgot-password" title="Click here for Password Reset">Forgot your password?</a>
    </span>
  </div>
  <br>
  <input class="btn" name="submit" type="submit" value="Login">
</form>

Name: consentagreementPOST CredCollector

<form style="margin: 20px;" name="consentagreement" id="consentagreement" action="CredCollector" method="post" target="_parent">
  <div id="consentMsgHeight">
    <div align="center" style="font-weight: bold"> DEPARTMENT OF DEFENSE AND<br> NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY<br> INFORMATION TECHNOLOGY SYSTEMS USER AGREEMENT<br> STANDARD MANDATORY NOTICE AND CONSENT PROVISION<br> FOR ALL DOD INFORMATION
      SYSTEMS USER AGREEMENTS<br>
    </div>
    <ol type="1">
      <li style="margin: 10px;">By consenting to this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems:</li>
      <ol type="a">
        <li style="margin: 10px;">You are accessing a U.S. Government (USG) information system (IS) which is provided for USG-authorized use only.</li>
        <li style="margin: 10px;">By using this IS (which includes any device attached to this Is), you consent to the following conditions:</li>
        <ol type="i">
          <li style="margin: 10px;">The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense,
            personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.</li>
          <li style="margin: 10px;">At any time, the USG may inspect and seize data stored on this IS.</li>
          <li style="margin: 10px;">Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.</li>
          <li style="margin: 10px;">This IS includes security measures (for example, authentication and access controls) to protect USG interests–not for your benefit or privacy.</li>
          <li style="margin: 10px;">Notwithstanding the above, using an IS does not constitute consent to PM, LE, or CI investigative searching or monitoring of the content of privileged communications or data (including work product) that are
            related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Under these circumstances, such communications and work product are private and confidential, as further explained below:</li>
          <ol type="a">
            <li style="margin: 10px;">Nothing in this User Agreement shall be interpreted to limit the user’s consent to, or in any other way restrict or affect, any USG actions for purposes of network administration, operation, protection, or
              defense, or for communications security. This includes all communications and data on an IS, regardless of any applicable privilege or confidentiality.</li>
            <li style="margin: 10px;">The user consents to interception or capture and seizure of all communications and data for any authorized purpose (including PM, LE, or CI investigation). However, consent to interception or capture, or seizure
              of communications and data is not consent to the use of privileged communications or data for PM, LE, or CI investigation against any party and does not negate any applicable privilege or confidentiality that otherwise applies.</li>
            <li style="margin: 10px;">Whether any particular communication or data qualifies for the protection of a privilege, or is covered by a duty of confidentiality, is determined in accordance with established legal standards and DoD policy.
              Users are strongly encouraged to seek personal legal counsel on such matters prior to using an IS if the user intends to rely on the protections of a privilege or confidentiality.</li>
            <li style="margin: 10px;">Users should take reasonable steps to identify such communications or data that the user asserts are protected by any such privilege or confidentiality. However, the user’s identification or assertion of a
              privilege or confidentiality is not sufficient to create such protection where none exists under established legal standards and DoD policy.</li>
            <li style="margin: 10px;">A user’s failure to take a reasonable steps to identify such communications or data as privileged or confidential does not waive the privilege or confidentiality if such protections otherwise exist under
              established legal standards and DoD policy. However, in such cases the USG is authorized to take reasonable actions to identify such communications or data as being subject to a privilege or confidentiality, and such actions do not
              negate any applicable privilege or confidentiality.</li>
            <li style="margin: 10px;">These conditions preserve the confidentiality of the communications or data, and the legal protections regarding the use and disclosure of privileged information, and thus such communications or data are private
              and confidential. Further, the USG shall take all reasonable measures to protect the content of captured or seized privileged communications or data to ensure they are appropriately protected.</li>
          </ol>
          <li style="margin: 10px;">In cases when the user has consented to content searching or monitoring of communications or data for PM, LE, or CI investigative searching, (such as for all communications or data other than the privileged
            communications or data that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants), the USG may, solely at its discretion and in accordance with DoD policy, elect to apply a
            privilege or other restriction on the USG’s otherwise-authorized use or disclosure of such information.</li>
          <li style="margin: 10px;">All of the above conditions apply regardless of whether the access or use of an IS includes the display of a Notice and Consent Banner (“banner”). When a banner is used, the banner functions to remind the user of
            the conditions that are set forth in this User Agreement, regardless of whether the banner describes these conditions in full detail or provide a summary of such conditions, and regardless of whether the banner expressly references this
            User Agreement.</li>
        </ol>
      </ol>
    </ol>
  </div>
  <p style="text-align: center; margin: 25px;">
    <input class="btn" name="consentbutton" type="submit" value="I Consent">
  </p>
</form>

Name: otpformPOST CredCollector

<form name="otpform" id="otpform" action="CredCollector" method="post" target="_parent" autocomplete="off">
  <label>Enter PIN: <input name="otpinput" id="otpinput" type="password"></label>
  <input class="btn" name="submitotp" type="submit" value="Submit">
</form>

Name: fedagreementPOST CredCollector

<form style="margin: 20px;" name="fedagreement" id="fedagreement" action="CredCollector" method="post" target="_parent">
  <div id="fedMsgHeight">
    <div align="center" style="font-weight: bold"> DEPARTMENT OF DEFENSE AND<br> NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY<br> INFORMATION TECHNOLOGY SYSTEMS USER AGREEMENT<br> STANDARD MANDATORY NOTICE AND CONSENT PROVISION<br> FOR ALL DOD INFORMATION
      SYSTEMS USER AGREEMENTS<br>
    </div>
    <ol type="1">
      <li style="margin: 10px;">By consenting to this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems:</li>
      <ol type="a">
        <li style="margin: 10px;">You are accessing a U.S. Government (USG) information system (IS) which is provided for USG-authorized use only.</li>
        <li style="margin: 10px;">By using this IS (which includes any device attached to this Is), you consent to the following conditions:</li>
        <ol type="i">
          <li style="margin: 10px;">The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense,
            personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.</li>
          <li style="margin: 10px;">At any time, the USG may inspect and seize data stored on this IS.</li>
          <li style="margin: 10px;">Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.</li>
          <li style="margin: 10px;">This IS includes security measures (for example, authentication and access controls) to protect USG interests–not for your benefit or privacy.</li>
          <li style="margin: 10px;">Notwithstanding the above, using an IS does not constitute consent to PM, LE, or CI investigative searching or monitoring of the content of privileged communications or data (including work product) that are
            related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Under these circumstances, such communications and work product are private and confidential, as further explained below:</li>
          <ol type="a">
            <li style="margin: 10px;">Nothing in this User Agreement shall be interpreted to limit the user’s consent to, or in any other way restrict or affect, any USG actions for purposes of network administration, operation, protection, or
              defense, or for communications security. This includes all communications and data on an IS, regardless of any applicable privilege or confidentiality.</li>
            <li style="margin: 10px;">The user consents to interception or capture and seizure of all communications and data for any authorized purpose (including PM, LE, or CI investigation). However, consent to interception or capture, or seizure
              of communications and data is not consent to the use of privileged communications or data for PM, LE, or CI investigation against any party and does not negate any applicable privilege or confidentiality that otherwise applies.</li>
            <li style="margin: 10px;">Whether any particular communication or data qualifies for the protection of a privilege, or is covered by a duty of confidentiality, is determined in accordance with established legal standards and DoD policy.
              Users are strongly encouraged to seek personal legal counsel on such matters prior to using an IS if the user intends to rely on the protections of a privilege or confidentiality.</li>
            <li style="margin: 10px;">Users should take reasonable steps to identify such communications or data that the user asserts are protected by any such privilege or confidentiality. However, the user’s identification or assertion of a
              privilege or confidentiality is not sufficient to create such protection where none exists under established legal standards and DoD policy.</li>
            <li style="margin: 10px;">A user’s failure to take a reasonable steps to identify such communications or data as privileged or confidential does not waive the privilege or confidentiality if such protections otherwise exist under
              established legal standards and DoD policy. However, in such cases the USG is authorized to take reasonable actions to identify such communications or data as being subject to a privilege or confidentiality, and such actions do not
              negate any applicable privilege or confidentiality.</li>
            <li style="margin: 10px;">These conditions preserve the confidentiality of the communications or data, and the legal protections regarding the use and disclosure of privileged information, and thus such communications or data are private
              and confidential. Further, the USG shall take all reasonable measures to protect the content of captured or seized privileged communications or data to ensure they are appropriately protected.</li>
          </ol>
          <li style="margin: 10px;">In cases when the user has consented to content searching or monitoring of communications or data for PM, LE, or CI investigative searching, (such as for all communications or data other than the privileged
            communications or data that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants), the USG may, solely at its discretion and in accordance with DoD policy, elect to apply a
            privilege or other restriction on the USG’s otherwise-authorized use or disclosure of such information.</li>
          <li style="margin: 10px;">All of the above conditions apply regardless of whether the access or use of an IS includes the display of a Notice and Consent Banner (“banner”). When a banner is used, the banner functions to remind the user of
            the conditions that are set forth in this User Agreement, regardless of whether the banner describes these conditions in full detail or provide a summary of such conditions, and regardless of whether the banner expressly references this
            User Agreement.</li>
        </ol>
      </ol>
    </ol>
  </div>
  <p style="text-align: center; margin: 25px;">
    <input class="btn" name="fedbutton" type="submit" value="I Consent">
  </p>
</form>

Name: resetpasswordPOST CredCollector

<form name="resetpassword" id="resetpassword" action="CredCollector" method="post" target="_parent" autocomplete="off">
  <label>New Password: <input name="newpassword" id="newpassword" type="password"></label>
  <label>Confirm Password: <input name="renewpassword" id="renewpassword" type="password"></label>
  <input class="btn" name="passwordreset" type="submit" value="Update Password">
</form>

Name: user_registrationPOST CredCollector/X509

<form name="user_registration" id="user_registration" action="CredCollector/X509" method="post" target="_parent">
  <p>Your certificate must be registered with GEOAxIS prior to use. Please click the 'Register Certificate' button below.</p>
  <div id="fnDiv">
    <label id="fnLabel" for="firstname">First Name:</label>
    <div id="fnInputDiv">
      <input name="firstname" id="firstname" type="text">
      <span id="fnInline" style="display: none;">Please specify your first name</span>
    </div>
  </div>
  <div id="lnDiv">
    <label id="lnLabel" for="lastname">Last Name:</label>
    <div id="lnInputDiv">
      <input name="lastname" id="lastname" type="text">
      <span id="lnInline" style="display: none;">Please specify your last name</span>
    </div>
  </div>
  <div id="orgDiv">
    <label id="orgLabel" for="organization">Organization:</label>
    <div id="orgInputDiv">
      <input name="organization" id="organization" type="text">
      <span id="orgInline" style="display: none;">Please specify the organization or agency you are affiliated with</span>
    </div>
  </div>
  <div id="emailDiv">
    <label id="emailLabel" for="emailaddress">Email Address:</label>
    <div id="emailInputDiv">
      <input name="emailaddress" id="emailaddress" type="text">
      <span id="emptyEmailInline" style="display: none;">Please specify your email address </span>
      <span id="invalidEmailInline" style="display: none;">The email you specified is invalid. Please re-enter your email address.</span>
    </div>
  </div>
  <div id="confirmEmailDiv">
    <label id="confirmEmailLabel" for="confirmemail">Confirm Email Address:</label>
    <div id="confirmEmailInputDiv">
      <input name="confirmemail" id="confirmemail" type="text">
      <span id="emptyConfirmEmailInline" style="display: none;">Please confirm your email address</span>
      <span id="mismatchEmailInline" style="display: none;">Email addresses do not match. Please re-enter your email</span>
    </div>
  </div>
  <input type="hidden" name="regUsr" value="true">
  <input class="btn" name="registerUsr" type="submit" value="Register Certificate">
</form>

Name: createdisadvuserPOST CredCollector

<form name="createdisadvuser" id="createdisadvuser" action="CredCollector" method="post" target="_parent" autocomplete="off">
  <label>E-mail Address: <input name="duemail" id="duemail" type="email"></label>
  <label id="reDuMailLabel">Confirm E-mail: <input name="reduemail" id="reduemail" type="email"></label>
  <label>Account Expiration Date: <input name="duperiod" id="duperiod" type="text" class="hasDatepicker"></label>
  <label>Account Justification: <select name="dujustification" id="dujustification" style="font-size:.8em;">
      <option value="none">Select one...</option>
      <option value="lostToken">(U) Lost CAC/NSS Token</option>
      <option value="notSupported">(U) I actively use a device that does not support hard token credentials</option>
      <option value="futureUse">(U) I am registering my DUA for future use</option>
      <option value="other">Other</option>
    </select>
  </label>
  <div id="dujustificationother" style="display: none;">
    <label style="font-size:.8em;">Enter your unclassified justification here. Please limit your justification to 1024 characters:<textarea name="dujustificationtext" id="dujustificationtext" rows="5"></textarea></label>
  </div>
  <br>
  <div id="pwdRequirements" style="font-size:.8em;">Disadvantaged User accounts must comply with NGA Instruction 8010.14 requirements for password administration, as listed below. <ul>
      <li>Minimum 16 characters long</li>
      <li>Contains all of the following items: <ul>
          <li>Uppercase letter</li>
          <li>Lowercase letter</li>
          <li>Number</li>
          <li>Symbol</li>
        </ul>
      </li>
    </ul>
  </div>
  <label>Password: <input name="dupassword" id="dupassword" type="password"></label>
  <label>Password Confirmation: <input name="redupassword" id="redupassword" type="password"></label>
  <input class="btn" name="createdisadvbutton" type="submit" value="Create Account">
</form>

Text Content

GEOAXIS AUTHENTICATION

--------------------------------------------------------------------------------

× Login Failed
× Your password has expired. In order to continue you must reset your password
× Please enter a date.
× Invalid date.
× Please enter a justification.
× Please limit your justification to 1024 characters.
× Please specify e-mails to continue
× A DUA with this username already exists.
× E-mails do not match. Please re-enter e-mails
× Invalid e-mail format
× Please specify passwords to continue
× Passwords do not match. Please re-enter passwords
× Disadvantaged User accounts must comply with NGA Instruction 8010.14
requirements for password administration, as listed below.
 * Minimum 16 characters long
 * Contains all of the following items:
    * Uppercase letter
    * Lowercase letter
    * Number
    * Symbol

× You have entered an invalid pin. Please try again.
× An error occurred during the authentication process. Please contact your
system administrator.
× Please enter a value to continue.

PLEASE PROVIDE ONE OF THE FOLLOWING CREDENTIALS TO AUTHENTICATE

 * Basic Login/Password
 * Disadvantaged Austere Users
 * Identity Federation
 * NASA
 * ID.me

Which credential should I choose?

SECURE LOGIN

--------------------------------------------------------------------------------

Username: Password:
Impersonate Entry? Impersonatee: UID DN Certificate Subject String Certificate
Subject String Reversed Impersonatee Identity Store: GXIS_ADM GXIS_OVD
IDSPROFILE-Gx_IDS IDSPROFILE-idxuserrole IDSPROFILE-userrole UserIdentityStore1
Forgot your password?



YOU ARE ACCESSING AN U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS
PROVIDED FOR AUTHORIZED USE ONLY. BY USING THIS IS (WHICH INCLUDES ANY DEVICE
ATTACHED TO THIS IS), YOU CONSENT TO THE FOLLOWING CONDITIONS:


DEPARTMENT OF DEFENSE AND
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY
INFORMATION TECHNOLOGY SYSTEMS USER AGREEMENT
STANDARD MANDATORY NOTICE AND CONSENT PROVISION
FOR ALL DOD INFORMATION SYSTEMS USER AGREEMENTS

 1. By consenting to this document, you acknowledge and consent that when you
    access Department of Defense (DoD) information systems:
     a. You are accessing a U.S. Government (USG) information system (IS) which
        is provided for USG-authorized use only.
     b. By using this IS (which includes any device attached to this Is), you
        consent to the following conditions:
         i.   The USG routinely intercepts and monitors communications on this
              IS for purposes including, but not limited to, penetration
              testing, communications security (COMSEC) monitoring, network
              operations and defense, personnel misconduct (PM), law enforcement
              (LE), and counterintelligence (CI) investigations.
         ii.  At any time, the USG may inspect and seize data stored on this IS.
         iii. Communications using, or data stored on, this IS are not private,
              are subject to routine monitoring, interception, and search, and
              may be disclosed or used for any USG-authorized purpose.
         iv.  This IS includes security measures (for example, authentication
              and access controls) to protect USG interests–not for your benefit
              or privacy.
         v.   Notwithstanding the above, using an IS does not constitute consent
              to PM, LE, or CI investigative searching or monitoring of the
              content of privileged communications or data (including work
              product) that are related to personal representation or services
              by attorneys, psychotherapists, or clergy, and their assistants.
              Under these circumstances, such communications and work product
              are private and confidential, as further explained below:
               a. Nothing in this User Agreement shall be interpreted to limit
                  the user’s consent to, or in any other way restrict or affect,
                  any USG actions for purposes of network administration,
                  operation, protection, or defense, or for communications
                  security. This includes all communications and data on an IS,
                  regardless of any applicable privilege or confidentiality.
               b. The user consents to interception or capture and seizure of
                  all communications and data for any authorized purpose
                  (including PM, LE, or CI investigation). However, consent to
                  interception or capture, or seizure of communications and data
                  is not consent to the use of privileged communications or data
                  for PM, LE, or CI investigation against any party and does not
                  negate any applicable privilege or confidentiality that
                  otherwise applies.
               c. Whether any particular communication or data qualifies for the
                  protection of a privilege, or is covered by a duty of
                  confidentiality, is determined in accordance with established
                  legal standards and DoD policy. Users are strongly encouraged
                  to seek personal legal counsel on such matters prior to using
                  an IS if the user intends to rely on the protections of a
                  privilege or confidentiality.
               d. Users should take reasonable steps to identify such
                  communications or data that the user asserts are protected by
                  any such privilege or confidentiality. However, the user’s
                  identification or assertion of a privilege or confidentiality
                  is not sufficient to create such protection where none exists
                  under established legal standards and DoD policy.
               e. A user’s failure to take a reasonable steps to identify such
                  communications or data as privileged or confidential does not
                  waive the privilege or confidentiality if such protections
                  otherwise exist under established legal standards and DoD
                  policy. However, in such cases the USG is authorized to take
                  reasonable actions to identify such communications or data as
                  being subject to a privilege or confidentiality, and such
                  actions do not negate any applicable privilege or
                  confidentiality.
               f. These conditions preserve the confidentiality of the
                  communications or data, and the legal protections regarding
                  the use and disclosure of privileged information, and thus
                  such communications or data are private and confidential.
                  Further, the USG shall take all reasonable measures to protect
                  the content of captured or seized privileged communications or
                  data to ensure they are appropriately protected.
        
         vi.  In cases when the user has consented to content searching or
              monitoring of communications or data for PM, LE, or CI
              investigative searching, (such as for all communications or data
              other than the privileged communications or data that are related
              to personal representation or services by attorneys,
              psychotherapists, or clergy, and their assistants), the USG may,
              solely at its discretion and in accordance with DoD policy, elect
              to apply a privilege or other restriction on the USG’s
              otherwise-authorized use or disclosure of such information.
         vii. All of the above conditions apply regardless of whether the access
              or use of an IS includes the display of a Notice and Consent
              Banner (“banner”). When a banner is used, the banner functions to
              remind the user of the conditions that are set forth in this User
              Agreement, regardless of whether the banner describes these
              conditions in full detail or provide a summary of such conditions,
              and regardless of whether the banner expressly references this
              User Agreement.



MULTI-FACTOR AUTHENTICATION

--------------------------------------------------------------------------------

Enter PIN:

MULTI-FACTOR AUTHENTICATION (MFA) NOTICE:

All Disadvantaged User (DU) access now requires MFA via an emailed One Time Pin
(OTP).

This OTP has been sent to your registered DU email address or preferred OTP
email address specified in your DU profile settings. The pin will expire in 15
minutes.



FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:

1-800-455-0899 (Commercial)

578-5555 (Secure)

YOU ARE ACCESSING AN U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS
PROVIDED FOR AUTHORIZED USE ONLY. BY USING THIS IS (WHICH INCLUDES ANY DEVICE
ATTACHED TO THIS IS), YOU CONSENT TO THE FOLLOWING CONDITIONS:


DEPARTMENT OF DEFENSE AND
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY
INFORMATION TECHNOLOGY SYSTEMS USER AGREEMENT
STANDARD MANDATORY NOTICE AND CONSENT PROVISION
FOR ALL DOD INFORMATION SYSTEMS USER AGREEMENTS

 1. By consenting to this document, you acknowledge and consent that when you
    access Department of Defense (DoD) information systems:
     a. You are accessing a U.S. Government (USG) information system (IS) which
        is provided for USG-authorized use only.
     b. By using this IS (which includes any device attached to this Is), you
        consent to the following conditions:
         i.   The USG routinely intercepts and monitors communications on this
              IS for purposes including, but not limited to, penetration
              testing, communications security (COMSEC) monitoring, network
              operations and defense, personnel misconduct (PM), law enforcement
              (LE), and counterintelligence (CI) investigations.
         ii.  At any time, the USG may inspect and seize data stored on this IS.
         iii. Communications using, or data stored on, this IS are not private,
              are subject to routine monitoring, interception, and search, and
              may be disclosed or used for any USG-authorized purpose.
         iv.  This IS includes security measures (for example, authentication
              and access controls) to protect USG interests–not for your benefit
              or privacy.
         v.   Notwithstanding the above, using an IS does not constitute consent
              to PM, LE, or CI investigative searching or monitoring of the
              content of privileged communications or data (including work
              product) that are related to personal representation or services
              by attorneys, psychotherapists, or clergy, and their assistants.
              Under these circumstances, such communications and work product
              are private and confidential, as further explained below:
               a. Nothing in this User Agreement shall be interpreted to limit
                  the user’s consent to, or in any other way restrict or affect,
                  any USG actions for purposes of network administration,
                  operation, protection, or defense, or for communications
                  security. This includes all communications and data on an IS,
                  regardless of any applicable privilege or confidentiality.
               b. The user consents to interception or capture and seizure of
                  all communications and data for any authorized purpose
                  (including PM, LE, or CI investigation). However, consent to
                  interception or capture, or seizure of communications and data
                  is not consent to the use of privileged communications or data
                  for PM, LE, or CI investigation against any party and does not
                  negate any applicable privilege or confidentiality that
                  otherwise applies.
               c. Whether any particular communication or data qualifies for the
                  protection of a privilege, or is covered by a duty of
                  confidentiality, is determined in accordance with established
                  legal standards and DoD policy. Users are strongly encouraged
                  to seek personal legal counsel on such matters prior to using
                  an IS if the user intends to rely on the protections of a
                  privilege or confidentiality.
               d. Users should take reasonable steps to identify such
                  communications or data that the user asserts are protected by
                  any such privilege or confidentiality. However, the user’s
                  identification or assertion of a privilege or confidentiality
                  is not sufficient to create such protection where none exists
                  under established legal standards and DoD policy.
               e. A user’s failure to take a reasonable steps to identify such
                  communications or data as privileged or confidential does not
                  waive the privilege or confidentiality if such protections
                  otherwise exist under established legal standards and DoD
                  policy. However, in such cases the USG is authorized to take
                  reasonable actions to identify such communications or data as
                  being subject to a privilege or confidentiality, and such
                  actions do not negate any applicable privilege or
                  confidentiality.
               f. These conditions preserve the confidentiality of the
                  communications or data, and the legal protections regarding
                  the use and disclosure of privileged information, and thus
                  such communications or data are private and confidential.
                  Further, the USG shall take all reasonable measures to protect
                  the content of captured or seized privileged communications or
                  data to ensure they are appropriately protected.
        
         vi.  In cases when the user has consented to content searching or
              monitoring of communications or data for PM, LE, or CI
              investigative searching, (such as for all communications or data
              other than the privileged communications or data that are related
              to personal representation or services by attorneys,
              psychotherapists, or clergy, and their assistants), the USG may,
              solely at its discretion and in accordance with DoD policy, elect
              to apply a privilege or other restriction on the USG’s
              otherwise-authorized use or disclosure of such information.
         vii. All of the above conditions apply regardless of whether the access
              or use of an IS includes the display of a Notice and Consent
              Banner (“banner”). When a banner is used, the banner functions to
              remind the user of the conditions that are set forth in this User
              Agreement, regardless of whether the banner describes these
              conditions in full detail or provide a summary of such conditions,
              and regardless of whether the banner expressly references this
              User Agreement.



YOU ARE ATTEMPTING TO ACCESS A RESOURCE PROTECTED BY GEOAXIS.



U.S. GOVERNMENT WARNING

This is a United States Government Computer System. Use of this U.S. Government
system, authorized or unauthorized, constitutes consent to monitoring of this
system.

For technical assistance, please contact the NGA Enterprise Service Center:
1-800-455-0899 (Commercial), 578-5555 (Secure)

CLICK THE TEXT BELOW TO FIND MORE INFORMATION

ID.me
Choosing this option will allow you to authenticate using your ID.me account
credentials. After being redirected to the ID.me login page, you will be asked
to provide your username, password, and a two-factor authentication code
retrieved via phone call or SMS. Once complete, you will be redirected back to
your original destination.

If you do not already have an ID.me account, choosing this option will take you
through the account setup process. For details about this process and the
information required to verify your identity, please see the reference document
below:

https://geoaxis.gs.mil/downloads/docs/Gx-0436_v1_IDme_Account_Creation.pdf

RESET PASSWORD

--------------------------------------------------------------------------------

New Password: Confirm Password:

FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:

1-800-455-0899 (Commercial)

578-5555 (Secure)

USER CERTIFICATE REGISTRATION

--------------------------------------------------------------------------------

Your certificate must be registered with GEOAxIS prior to use. Please click the
'Register Certificate' button below.

First Name:
Please specify your first name
Last Name:
Please specify your last name
Organization:
Please specify the organization or agency you are affiliated with
Email Address:
Please specify your email address The email you specified is invalid. Please
re-enter your email address.
Confirm Email Address:
Please confirm your email address Email addresses do not match. Please re-enter
your email

FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:

1-800-455-0899 (Commercial)

578-5555 (Secure)

DISADVANTAGED USER REGISTRATION

--------------------------------------------------------------------------------

E-mail Address: Confirm E-mail: Account Expiration Date: Account Justification:
Select one... (U) Lost CAC/NSS Token (U) I actively use a device that does not
support hard token credentials (U) I am registering my DUA for future use Other
Enter your unclassified justification here. Please limit your justification to
1024 characters:

Disadvantaged User accounts must comply with NGA Instruction 8010.14
requirements for password administration, as listed below.
 * Minimum 16 characters long
 * Contains all of the following items:
   * Uppercase letter
   * Lowercase letter
   * Number
   * Symbol

Password: Password Confirmation:


FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:

1-800-455-0899 (Commercial)

578-5555 (Secure)

FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:

1-800-455-0899 (Commercial)

578-5555 (Secure)

--------------------------------------------------------------------------------

PLEASE PROVIDE ONE OF THE FOLLOWING CREDENTIALS TO AUTHENTICATE

 * Basic Login/Password
 * Disadvantaged Austere Users
 * Identity Federation
 * NASA
 * ID.me

Which credential should I choose?

FOR TECHNICAL ASSISTANCE PLEASE CONTACT THE NGA ENTERPRISE SERVICE CENTER:
1-800-455-0899 (COMMERCIAL), 578-5555 (SECURE)

× Please contact the NGA Enterprise Service Center: 1-800-455-0899 (Commercial),
578-5555 (Secure)

--------------------------------------------------------------------------------