PIN and roles¶
This page summarizes PIN domains and operational roles for Pico OpenPGP workflows.
PIN domains¶
OpenPGP card workflows commonly use:
PW1: user operations contextPW3: admin operations contextRC: reset/recovery code domain
Retry counters and lock behavior are enforced by card policy and firmware state.
What each domain is typically used for¶
PW1 (user)¶
Commonly used for user-facing operations such as:
- signing/authentication flows
- regular use of already-provisioned key material
- day-to-day card usage in client applications
PW3 (admin)¶
Typically required for administrative operations such as:
- sensitive configuration changes
- key-attribute or policy-level changes
- destructive/recovery-sensitive actions
RC (reset code)¶
Recovery-oriented domain used for controlled reset/recovery paths when applicable.
Operational role split¶
In practice:
- User-context tasks are performed through
PW1 - Administrative/security-sensitive tasks require
PW3
This split is important for:
- key-management changes
- policy modifications
- reset/recovery actions
In team environments, this usually maps naturally to:
- Operator/user role: daily cryptographic use
- Security admin role: lifecycle, policy, and recovery controls
Session and unlock expectations¶
Role enforcement is not only about stored PIN values, but also current session state.
Practical implications:
- A panel can be visible but still not writable until proper unlock context is active.
- Unlocking with user context does not automatically grant admin actions.
- Reconnects/session resets can require re-authentication for protected operations.
Retry and lock handling¶
PIN retry counters are part of operational safety:
- Wrong PIN attempts reduce retries.
- Reaching limit can block the corresponding credential path.
- Recovery behavior depends on enabled card policy and available recovery credentials.
For production use, define clear operational procedures for:
- PIN rotation cadence
- secure storage of admin/recovery credentials
- lockout/recovery runbooks
PicoKey App alignment¶
For UI-level role and PIN workflows, see:
Recommended approach:
- Validate current unlock context.
- Perform read-only checks first.
- Execute admin changes only under confirmed admin context.
- Re-verify expected state after each sensitive change.