Skip to content

Initialization and policy

This page describes Pico FIDO firmware initialization and policy controls.


Firmware controls

Pico FIDO firmware supports initialization and policy settings such as:

  • PIN setup and user-verification enforcement
  • Attestation behavior
  • Minimum PIN length policy
  • RP ID restrictions for policy-controlled operations

These parameters define security posture and authenticator behavior before normal passkey/account usage.


Policy parameters

Key policy parameters include:

  • PIN: enables user verification and protects sensitive authenticator operations.
  • Attestation: controls whether attestation data is emitted in registration flows.
  • Minimum PIN length: enforces lower bound for future PIN values.
  • RP ID restrictions: limits policy scope to selected relying parties.

Operational notes

  • Initialization choices affect passkeys, credential visibility, and management operations.
  • Restrictive policy settings can block expected authentications if RP IDs are misconfigured.
  • Some changes may require reset/reprovisioning depending on current device state and policy.