<s>
Cryptographic	O
log-on	O
(	O
CLO	O
)	O
is	O
a	O
process	O
that	O
uses	O
Common	O
Access	O
Cards	O
(	O
CAC	O
)	O
and	O
embedded	O
Public	B-Architecture
Key	I-Architecture
Infrastructure	I-Architecture
(	O
PKI	O
)	O
certificates	O
to	O
authenticate	O
a	O
user	O
's	O
identification	O
to	O
a	O
workstation	O
and	O
network	O
.	O
</s>
