Current JPAS Status: GREEN
GREEN : JPAS is fully functional and is not experiencing any
YELLOW: JPAS is experiencing functionality issues as
a partial or reports outage.
RED : JPAS is down and users will not have access to the
Last Updated: 12 March 2019
ATTENTION! DISS & JPAS Users:
DISS Users are
required to maintain access to JPAS.
For additional information, please see the DISS Fielding Plan.
ATTENTION! JPAS Server Certificate Update:
The server certificate that
helps to create a secure connection between users and the JPAS application
will soon expire and so is being replaced the week of 2019 03 25. Users may
receive a browser warning that the website is not trusted when trying to
navigate to the disclosure page, which means you may not have the latest DoD
CA certificate installed in your local trust store. There
are two relatively simple solutions to rectify this issue:
Download and install the InstallRoot v5.2 utility:
- Access: http://iase.disa.mil/pki-pke/Pages/tools.aspx
- Look for the heading "Trust Store".
- Under the heading for "InstallRoot "5.2" NIPR Windows
Installer", select the link for "Non Administrator".
- You will be prompted to
Open/Run/Save the installation file, "InstallRoot_NonAdmin_"5.2".msi".
The need to save is not required, so it is your preference on which of
the available options you chose.
- Upon opening the
InstallRoot_NonAdmin_"5.2".msi file, you will be presented
with the InstallRoot Setup Wizard.
Simply choose "Next"
after reading each step of the Wizard.
- When prompted to select the
features you wish to install, ensure that *at least* the "Graphical
Interface" is checked. Afterwards, click on "Next" and
- After the installation of the
tool is complete, click "Run
- A "Quick Start" screen
will appear showing screenshots of the final steps required to complete
the installation. Please read the red text within these screenshots and
until you're able to select "Finish."
- After selecting "Finish," you
should be presented with a Microsoft Current User tab, make sure that
"Install DoD Certificates" has a green
checkmark. The other certificates (ECA and JITC) are not required.
- Click on the "Install Certificates"
Download the DoD
Root Certificate Package:
- Access: http://iase.disa.mil/pki-pke/Pages/tools.aspx
- Look for the heading "PKI CA Certificate Bundles:
- Select "For DoD PKI Only - Version 5.5"
- Extract the files to your desktop
(or a known location)
- Open the folder and right click
and select "Install
- Select "Place all certificates in the
- Select "Browse"
- Select "Trusted Root Certification
- Click "Next",
and select "Yes"
to all security warnings pertaining to "You are about to install a certificate
from a certification authority (CA) claiming to represent: DoD
EMAIL CA-xx, DoD CA-xx, and DoD ID CA-XX".
completed either of these solutions, make sure that you close all browser
windows and then reopen before attempting to sign into JPAS again. If
you still continue to have issue, please seek the assistance of your local IT
ATTENTION! Missing Person Category
As part of the annual data reconciliation
for the Congressional Reports, JPAS recently processed full interface files
received from the four Services and DCPDCS.
Because of the PID Hierarchy, which controls how records are updated
in JPAS, some of the data got 'stepped on' in JPAS. Essentially, these are cases where persons
having worked for one service and then later moved onto another service to
work in the same capacity/category, now reflect only the category separation
date for the former service. Instead,
JPAS should reflect the active category under the latter service. The
subjects impacted by this should notify their Personnel Center and have them
resend/reflow JPAS their data to be processed per usual in the next interface
run. Additionally, the JPAS Team has been actively reaching out to the
Personnel Centers to ask that they push in mass to JPAS via the normal
interface to resolve the issue.
REMINDER! JPAS URL
EFFECTIVE IMMEDIATELY, login to
JPAS using ONLY the "JPAS PKI Login" button
located directly above or at https://jpaspki.dmdc.osd.mil/JPAS/JPASDisclosure. Do
NOT use the other "JPAS Login" button to the left or the old
"jpasapp" URL as it will no longer be
available. Please ensure to update any bookmarked links accordingly.
REMINDER: Eligibility Determinations
The Customer Contact Center (CCC) has seen
an increased call volume concerning eligibility determination
descriptions. As a reminder, please
note that a full list of eligibility determinations is available at the
ATTENTION! UPDATE ON INDUSTRY DISS JVS AUTO-PROVISIONING:
· DMDC is auto-provisioning one
Hierarchy Manager in the Security Management Office (SMO) within DISS with
the Account Manager and Security Officer role.
· The provisioned Hierarchy Manager will
be responsible for provisioning additional user roles to meet SMO mission, to
include adding additional Account Managers who are a parent and subordinate
· Many users have been auto-provisioned;
if so, were sent an e-mail to the e-mail address recorded in JPAS. If
you did NOT receive an e-mail with instructions for obtaining your username
and you are currently:
An Account Manager in JPAS **AND** 2)
on the Key Management Personnel (KMP) list for your SMO
Please do the following:
1. Update (or add if not one listed) your e-mail address in JPAS, then
2. Send an e-mail to firstname.lastname@example.org
with Subject: DISS JVS Industry Provisioning Request.
will verify you are on our list - so please do not send an e-mail if you do
not meet the criteria listed above.
you are an Account Manager in JPAS but not on the KMP please continue to
check your e-mail for guidance. Please do not submit PSSARs
directly to the DMDC CCC this will only delay getting you provisioned.
We will contact you. Please continue to monitor this site/application
Correction of Questionable PID Dates & Eligibility
As JPAS continues to transition to DISS and
in an ongoing effort to enhance data quality, JPAS will perform a Data
Quality Initiative (DQI) to correct misaligned Birth or Death Dates as compared
to Eligibility Dates in the system. If one of your subjects is impacted by
this DQI, you will receive a notification in the system requesting the
subject’s record be corrected within 30 days. Upon receipt of a notification
on this matter, please work with the appropriate personnel center or CAF to
perform the necessary updates.
ATTENTION! Industry Tier 5 Reinvestigations (T5R)
Effective December 7, 2017, the Defense Security Service (DSS) has
requested for Industry to submit all Tier 5 Reinvestigations (T5R) whose
investigation close date is six years or older. However, “caveat T5Rs” should
continue to be submitted at the five year mark (only those cases requiring
PSSAR Form Submissions
Users requesting access to JPAS, SWFT, and
DCII should only fill out and submit the PSSAR version (DD Form 2962, NOV
2015) found at http://www.esd.whs.mil/Portals/54/Documents/DD/forms/dd/dd2962.pdf
Please ensure you are using the correct PSSAR version for the system(s) of
which you are requesting access.
Incorrect form submissions will be denied. The DISS PSSAR is currently not
allowed for JPAS, SWFT, or DCII.
REMINDER! Inserting or Using Test/Fake
SSN’s or Records is Strictly Prohibited
DMDC regularly audits JPAS to ensure the
system meets standards of accuracy as required by the DoD Privacy Program,
DoD 5400.11-R. DMDC and JPAS Account
Management policies prohibit users from entering or using false or inaccurate
information including, entering test, fake or “dummy” personal information
into the DoD personnel security system of records. Please do not enter test or fake
SSN’s/records into the system for any purpose.
USD(I) Memorandum: Personnel Security
Clearances in Industry
On December 7, 2016 the Undersecretary of Defense for Intelligence
signed a memorandum reminding DoD Components that personnel security
clearances do not expire. Individuals with current eligibility in JPAS should
not be denied access based on an out-of-scope investigation. When the system
of record shows current adverse information, but eligibility is still valid,
access may continue. The memorandum is provided here for your ease of reference.
ATTENTION: CONTINUOUS EVALUATION ON DOD SUBJECTS:
Continuous Evaluation (CE) is defined in
Executive Order (E.O.) 13488, as amended by E.O. 13764, "means a vetting
process to review the background of an individual who has been determined to
be eligible for access to classified information or to hold a sensitive
position at any time during the period of eligibility. CE leverages a set of
automated record checks and business rules to assist in the on-going
assessment of an individual's continued eligibility. CE is intended to
complement continuous vetting efforts."
"'Vetting' is the process by which covered individuals undergo
investigation, evaluation, and adjudication of whether they are, and remain over
time, suitable or fit for Federal employment, eligible to occupy a sensitive
position, eligible for access to classified information, eligible to serve as
a nonappropriated fund employee or a contractor,
eligible to serve in the military, or authorized to be issued a Federal
credential. Vetting includes all steps in the end-to-end process, including
determining need (appropriate position designation), validating need
(existence of a current investigation or adjudication), collecting background
information via standard forms, investigative activity, adjudication,
providing administrative due process or other procedural rights, and ongoing
assessments to ensure that individuals continue to meet the applicable
standards for the position for which they were favorably adjudicated."
“'Continuous vetting' means reviewing the background of a covered individual
at any time to determine whether that individual continues to meet applicable
The above includes the following definitions
from EO 13764, which amended 13488:
"(q) 'Vetting' is the process by which
covered individuals undergo investigation, evaluation, and adjudication of
whether they are, and remain over time, suitable or fit for Federal
employment, eligible to occupy a sensitive position, eligible for access to
classified information, eligible to serve as a nonappropriated
fund employee or a contractor, eligible to serve in the military, or
authorized to be issued a Federal credential. Vetting includes all steps in
the end-to-end process, including determining need (appropriate position
designation), validating need (existence of a current investigation or
adjudication), collecting background information via standard forms,
investigative activity, adjudication, providing administrative due process or
other procedural rights, and ongoing assessments to ensure that individuals
continue to meet the applicable standards for the position for which they
were favorably adjudicated."
"(f) 'Continuous vetting' means
reviewing the background of a covered individual at any time to determine
whether that individual continues to meet applicable requirements."
DoD is now conducting Continuous Evaluation
(CE) checks on select populations.
This includes both Commercial (e.g., soft credit checks that do not
impact your credit score) and Government data sources. Subjects may receive notification from
commercial data vendors that the DoD has pulled this information. If such notification is received, this
action may be part of the CE checks.
REMINDER: Adverse Information/Incident Report (IR) Submissions in
When submitting adverse information (i.e., an IR) in JPAS, please ensure each
submission addresses AT LEAST the 5Ws (Who, What, When, Where, and Why) when the
information is unclassified.
For INDUSTRY: As required by
the National Industrial Security Program Operating Manual (NISPOM), section
1-302 a. Adverse Information: "Contractors shall report adverse
information coming to their attention concerning any of their cleared
employees. Reports based on rumor or
innuendo should not be made. The
subsequent termination of employment of an employee does not obviate the
requirement to submit this report."
Therefore, incident reports should be FACT based only and not based on
rumor or innuendo.
Additionally, if a submission is marked as "Initial" or
"Follow-up," the SMO will need to submit a "Final" IR to
allow the DoD Consolidated Adjudication Facility (CAF) to adjudicate the
incident. Per DSS guidance, Industry
will need to submit all IRs as "Final."
Users are strictly prohibited from looking up their own record (i.e. through
PSM Net), or subjects of whom they have no need-to-know or authority.
account and/or login credential sharing of any kind is prohibited.
encrypt all email traffic containing
Personally Identifiable Information (PII) to the Contact Center, do NOT mark the message as
“Private,” as this will not protect the data and will prevent the Contact
Center from reading the email.
JPAS Account Management Policy Guide and General FAQ as DMDC is continuously
auditing accounts. Any account
user/certificate holder that is violating JPAS Account Policies or DoD regulations will permanently lose their account.
by Step document that will give you instructions on how to update a subject’s
PII in JPAS or keep it from being overwritten. See the new JPAS Data Correction Checklist.
Outage Information (All times are in ET):
DMDC is serving those
who serve our country!
ACCOUNTS OR CERTIFICATES IS NOT ALLOWED
reminder, it is against DOD Regulations to share PKI certificates or allow an
individual to access another's JPAS account in any manner. In addition, JPAS accounts that are not
accessed frequently (45 days or less), or accounts of users that do not meet
the account requirements will be deleted per DOD Regulations. If an account
is required in the future, a new account will have to be established. If an account was just created and is no
longer there, the account may need to be recreated. Please see the JPAS New Account Procedures
in the Access Request section or the JPAS Account Manager Policy in the
General Information section for additional guidance.
U.S. Department of Defense is committed to making its electronic and
information technologies accessible to individuals with disabilities in
accordance with Section 508
of the Rehabilitation Act (29 U.S.C. § 794d), as amended in 1998. For persons
with disabilities experiencing difficulties accessing content on a particular
website, please email the DoD Section 508 mailbox: DoDSection508@osd.mil. In your
message, please indicate the nature of your accessibility problem, the
website address of the requested content, and your contact information so we
can address your issue. For more
information about Section 508, please visit the DoD Section 508 website.
FOR OFFICIAL USE ONLY (FOUO)
accordance with DOD Regulations and the Privacy Act of 1974, you must
safeguard personnel information retrieved through this system. DOD Regulations are: 5 USC 301 -
Departmental Regulations, DoD 5200.1-R - The Information Security Program,
Title 5, United States Code, Section 552a Public Law 93-579 (Privacy Act of
1974), DOD Directive 5400.07 - The Freedom of Information Act (FOIA) Program,
DODD 5400.11-R - DOD Privacy Program, and DTM-04-009 Security Classification
PRIVACY ACT STATEMENT
AUTHORITY: DoD 5200.2-R,
Department of Defense Personnel Security Program Regulation; E.O. 12829,
National Industrial Security Program; the JPAS Account Management Policy; and
E.O. 9397, as amended.
PRINCIPAL PURPOSE(S): To provide a
common, comprehensive medium to record, document, and identify personnel
security actions within the Department including submitting adverse
information, verification of security clearance status, requesting
investigations, and supporting Continuous Evaluation activities.
ROUTINE USE(S): The blanket routine uses found at http://dpcld.defense.gov/Privacy/SORNsIndex/Blanket-Routine-Uses/ may apply.