Managing Two CAC Cards on One Computer
You have your primary CAC and a second card—maybe you’re a contractor with multiple client organizations, or you hold a reserve component CAC alongside your civilian employment. Managing dual CAC authentication on a single system creates challenges that most IT guides ignore.
This guide covers practical approaches to switching between CAC identities without constant certificate conflicts.
The Dual CAC Challenge
Windows caches smart card certificates and associates them with specific accounts and applications. When you insert a different CAC, the cached certificates from your first card may conflict with the new card’s certificates. Symptoms include:
- Sites prompt for the wrong certificate
- Authentication failures despite valid card
- Applications remember the old CAC identity
- Outlook connects with wrong email account
- Certificate selection dialogs show expired certs
Basic Switching Procedure
For minimal conflicts when switching CACs:
Step 1: Close all applications that use certificate authentication—browsers, Outlook, VPN clients, and any DoD-specific software.
Step 2: Remove the first CAC and wait for Windows to recognize the removal (you may hear the disconnect sound).
Step 3: Insert the second CAC and wait for Windows to recognize it (reader light should indicate card activity).
Step 4: Open applications fresh. When prompted for certificate selection, carefully choose certificates from your currently inserted CAC.
This basic procedure works for occasional switching but becomes tedious for frequent transitions.
Using Separate Browser Profiles
Browsers cache certificate selections persistently. The cleanest approach is maintaining separate browser profiles for each CAC identity.
Firefox: Firefox natively supports profiles. Run firefox -P to open the Profile Manager. Create a profile for each CAC identity (e.g., “CAC-Contractor-A” and “CAC-Contractor-B”). Configure each profile’s security device and certificate settings independently.
Chrome: Chrome profiles sync with Google accounts but can be configured locally. Create separate Windows user profiles if you need fully isolated Chrome configurations.
Edge: Similar to Chrome, Edge profiles provide isolation. Access profiles through Settings > Profiles.
When using profiles, launch the appropriate profile before inserting the corresponding CAC. This prevents cross-contamination of cached credentials.
Certificate Store Management
Windows may accumulate certificates from both CACs over time. Periodically clean up:
1. Remove both CACs
2. Open certmgr.msc
3. Navigate to Personal > Certificates
4. Delete certificates that show as expired or that belong to a CAC identity you’re not currently using
Current CAC certificates regenerate automatically when you insert the card. Old cached certificates can cause selection confusion.
Using Separate Windows User Accounts
The most robust approach is maintaining separate Windows user accounts for each CAC identity. Each account maintains its own:
- Certificate store
- Browser profiles and settings
- Application credentials
- Outlook profiles
This prevents any cross-contamination but requires logging out and back in when switching. For frequent switching, this is impractical. For daily use of one CAC with occasional use of another, it works well.
Reader and Credential Provider Considerations
If you use two CAC readers simultaneously (not recommended but sometimes necessary), Windows may become confused about which reader to use for which operation.
The smart card credential provider typically presents certificates from all detected cards during login and authentication prompts. Pay attention to certificate details in selection dialogs—don’t just click the first option.
Some readers identify their serial number to Windows, allowing applications to distinguish between them. But most DoD applications aren’t designed for multi-reader scenarios.
VPN Complications
VPN clients often cache credentials aggressively. After switching CACs, you may need to:
- Disconnect existing VPN sessions
- Clear VPN client credential cache
- Restart the VPN client application
- Re-authenticate with the new CAC
Some VPN configurations bind to specific certificate serial numbers. If your second CAC wasn’t enrolled for VPN access, it may not work regardless of switching procedures.
Outlook with Multiple Exchange Accounts
If your two CACs correspond to different Exchange email accounts, Outlook handles this reasonably well with multiple profiles:
1. Open Control Panel > Mail > Show Profiles
2. Create a profile for each CAC/email combination
3. Set “Prompt for a profile to be used” at Outlook startup
4. Insert the appropriate CAC before selecting its corresponding profile
Best Practices for Dual CAC Users
- Label your CAC readers if using two (or label the cards with tape on the edge)
- Develop a consistent switching routine
- Document which profile/account corresponds to which CAC
- Keep both CACs’ certificates current in their respective environments
- Test both CACs periodically so problems are discovered before urgent deadlines
Managing dual CAC authentication isn’t seamless, but with organized profiles and consistent procedures, it’s workable. The key is preventing systems from caching the wrong identity—isolation through separate profiles is more reliable than trying to clear caches after conflicts occur.
Leave a Reply